Skip to main content
Log in

An Experimental Comparison of Chaotic and Non-chaotic Image Encryption Schemes

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

During last few years, transmission of digital multimedia data (images, audios and videos) over Internet, wireless cell phones, television broadcasting etc., has been significantly evolved. The provision of security to store and transmit data with confidentiality, integrity, and authentication for multimedia data over wireless medium is attaining importance these days. Over a few decades, a number of image encryption schemes have been implemented, each with various features, pros and cons. So there is a need to carry out security analysis of these schemes through some standard parameters. In this paper, an effort is being made for comparison of traditional encryption algorithms via some security parameters rather than using just visual inspection. Through these security parameters, one can determine a better and highly secure image encryption scheme. Comparative analysis of Advanced Encryption Standard, Compression Friendly Encryption Scheme, Chaotically Coupled Chaotic Map Encryption Scheme and a Bernoulli Map Based Encryption Scheme are done. Results are finally compiled to conclude the optimum scheme to be used feasibly with high security level.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Ahmad, J., & Ahmed, F. (2012). Efficiency analysis and security evaluation of image encryption schemes. International Journal of Video & Image Processing and Network Security, 12(04), 18–31. ISSN: 2077–1207.

    Google Scholar 

  2. Jakimoski, G., & Subbalakshmi, K. (2008). Cryptanalysis of some multimedia encryption schemes. Multimedia, IEEE Transactions on, 10(3), 330–338.

    Article  Google Scholar 

  3. Acharya, B., Patra, S., & Panda, G. (2008). Image encryption by novel cryptosystem using matrix transformation. In Emerging trends in engineering and technology, 2008. ICETET’08. First international conference on (pp. 77–81), IEEE.

  4. Furht, B., & Socek, D. (2003). A survey of multimedia security. Comprehensive report on.

  5. Lian, S., Liu, Z., Ren, Z., & Wang, H. (2006). Secure advanced video coding based on selective encryption algorithms. Consumer Electronics, IEEE Transactions on, 52(2), 621–629.

    Article  Google Scholar 

  6. Mohanty, S.P., Ramakrishnan, K., & Kankanhalli, M. (1999). A dual watermarking technique for images. In Proceedings of the seventh ACM international conference on Multimedia (Part 2) (pp. 49–51). ACM.

  7. Hartung, F., & Girod, B. (1998). Watermarking of uncompressed and compressed video. Signal processing, 66(3), 283–301.

    Article  MATH  Google Scholar 

  8. Hartung, F., & Girod, B. (1996). Digital watermarking of raw and compressed video. In Proceedings of European EOS/SPIE Symposium on Advanced Imaging and Network Technologies vol. 2952, (pp. 205–213). Citeseer.

  9. Van De Ville, D., Philips, W., Van de Walle, R., & Lemahieu, I. (2004). Image scrambling without bandwidth expansion. Circuits and Systems for Video Technology, IEEE Transactions on, 14(6), 892–897.

    Article  Google Scholar 

  10. Chen, Y., & Chang, L. (2001). A secure and robust digital watermarking technique by the block cipher rc6 and secure hash algorithm. In Image processing, 2001. Proceedings. 2001 international conference on vol. 2, (pp. 518–521). IEEE.

  11. Chandramouli, R., Memon, N., & Rabbani, M. (2002). Digital watermarking. Encyclopedia of Imaging Science and Technology.

  12. Furht, B., & Kirovski, D. (2005). Multimedia security handbook (Vol. 4). Boca Raton: CRC.

    Google Scholar 

  13. Stallings, W. (2010). Cryptography and network security: Principles and practice (Vol. 998). New Jersey: Prentice Hall.

    Google Scholar 

  14. Abdul, D., Elminaam, H., & Hadhoud, M. Performance evaluation of symmetric encryption algorithms. Communications, 8.

  15. Mao, Y., & Chen, G. (2005). Chaos-based image encryption. Handbook of Geometric Computing (pp. 231–265).

  16. Schneier, B. (1996). Applied cryptography. USA: Wiley.

    Google Scholar 

  17. Ahmed, F., Siyal, M., & Abbas, V. (2010). A perceptually scalable and jpeg compression tolerant image encryption scheme. In Image and video technology (PSIVT), 2010 Fourth Pacific-Rim Symposium on (pp. 232–238). IEEE.

  18. Elashry, I. E. (2010). Digital image encryption. MS Thesis, Department of Computer Science and Engineering, Faculty of Electronic Engineering Menofia University.

  19. Lian, S. (2008). Multimedia content encryption: Techniques and applications. Boca Raton: Auerbach Publications.

    Google Scholar 

  20. Elkamchouchi, H., & Makar, M. (2005). Measuring encryption quality for bitmap images encrypted with rijndael and kamkar block ciphers. In Radio science conference, 2005. NRSC 2005. Proceedings of the twenty-second national (pp. 277–284). IEEE.

  21. Pisarchik, A., & Zanin, M. (2008). Image encryption with chaotically coupled chaotic maps. Physica D: Nonlinear Phenomena, 237(20), 2638–2648.

    Article  MATH  MathSciNet  Google Scholar 

  22. Ye, R. (2011). An image encryption scheme with efficient permutation and diffusion processes. In Advances in computer science and education applications (pp. 32–39). Springer.

  23. Aes, N. (2001). Advanced encryption standard. Federal Information Processing Standard, FIPS-197, vol. 12.

  24. Wong, K.-W. (2002). A fast chaotic cryptographic scheme with dynamic look-up table. Physics Letters A, 298(4), 238–242.

    Article  MATH  MathSciNet  Google Scholar 

  25. El-Fishawy, N., & Zaid, O. (2007). Quality of encryption measurement of bitmap images with rc6, mrc6, and rijndael block cipher algorithms. International Journal of Network Security, 5(3), 241–251.

    Google Scholar 

  26. Kamali, S., Shakerian, R., Hedayati, M., & Rahmani, M. (2010). A new modified version of advanced encryption standard based algorithm for image encryption. In Electronics and Information Engineering (ICEIE), 2010 International Conference On vol. 1, (pp. V1–141). IEEE.

  27. Carter, T. (2007). An introduction to information theory and entropy. Santa Fe: Complex Systems Summer School.

    Google Scholar 

  28. Liang, J., & Shi, Z. (2004). The information entropy, rough entropy and knowledge granulation in rough set theory. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 12(01), 37–46.

    Article  MATH  MathSciNet  Google Scholar 

  29. Ahmed, H., Kalash, H., & Allah, O. Implementation of rc5 block cipher algorithm for image cryptosystems. International Journal of Information Technology 3(4)

  30. Enayatifar, R. (2011). Image encryption via logistic map function and heap tree. International Journal of Physcical Science, 6(2), 221.

    Google Scholar 

  31. Han, Z., Feng, W., Hui, L., Da Hai, L., & Chou, L. (2003). A new image encryption algorithm based on chaos system. In Robotics, intelligent systems and signal processing, 2003. Proceedings. 2003 IEEE international conference on, vol. 2, (pp. 778–782). IEEE.

  32. Ahmed, H., Kalash, H., & Allah, O. (2007). Encryption efficiency analysis and security evaluation of rc6 block cipher for digital images. In Electrical engineering, 2007. ICEE’07. International conference on (pp. 1–7). IEEE.

  33. Dhawan, S. (2011). A review of image compression and comparison of its algorithms. International Journal of electronics & Communication technology, 2(1).

  34. Li, S., Chen, G., & Zheng, X. (2006). Chaos-based encryption for digital image and video. Multimedia Encryption and Authentication Techniques and Applications (p. 129).

  35. Kumar, A., & Tiwari, M. N. (2012). Effective implementation and avalanche effect of aes. International Journal of Security, Privacy and Trust Management (IJSPTM), 1(3/4), 31–35.

    Article  Google Scholar 

  36. El-Wahed, M.A., Mesbah, S., & Shoukry, A. (2008). Efficiency and security of some image encryption algorithms. In Proceedings of the world congress on engineering vol. 1, (pp. 2–4). London.

  37. Mohamed, A., Zaibi, G., & Kachouri, A. (2011). Implementation of rc5 and rc6 block ciphers on digital images. In Systems, signals and devices (SSD), 2011 8th international multi-conference on (pp. 1–6). IEEE.

  38. Cheddad, A., Condell, J., Curran, K., & McKevitt, P. (2008). Securing information content using new encryption method and steganography. In Digital information management, 2008. ICDIM 2008. Third international conference on (pp. 563–568), IEEE.

  39. Liehuang, Z., Wenzhuo, L., Lejian, L., & Hong, L. (2006). A novel image scrambling algorithm for digital watermarking based on chaotic sequences. International Journal of Computer Science and Network Security, 6(8B), 125–130.

    Google Scholar 

  40. Sethi, N., & Sharma, D. (2012). A novel method of image encryption using logistic mapping. International Journal of Computer Science Engineering, 1(2), 115–119.

    Google Scholar 

  41. Nien, H., Changchien, S., Wu, S., & Huang, C. (2008). A new pixel-chaotic-shuffle method for image encryption. In Control, automation, robotics and vision, 2008. ICARCV 2008. 10th International conference on (pp. 883–887). IEEE.

Download references

Acknowledgments

It was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (2014R1A1A2054174) and the MSIP (Ministry of Science, ICT and Future Planning), Korea, under the Global IT Talent support program (NIPA-2014-H0905-14-1004) supervised by the NIPA (National IT Industry Promotion Agency).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Seong Oun Hwang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Ahmad, J., Hwang, S.O. & Ali, A. An Experimental Comparison of Chaotic and Non-chaotic Image Encryption Schemes. Wireless Pers Commun 84, 901–918 (2015). https://doi.org/10.1007/s11277-015-2667-9

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-015-2667-9

Keywords

Navigation