186
Views
22
CrossRef citations to date
0
Altmetric
Articles

Chaotic Image Encryption with Hash Keying as Key Generator

&

REFERENCES

  • J. Fridrich, “Symmetric cipher based on two-dimentional chaotic maps,” Int. J. Bifurcat. Chaos, Vol. 8, no. 6, pp. 1259–86, Jun. 1998.
  • M. Francois, T. Grosges, D. Barchiesi, R. Erra, “A new image encryption scheme based on a chaotic function,” Signal Process. Image Commun., Vol. 27, no. 3, pp. 249–59, Mar. 2012.
  • V. Patidar, N. K. Pareek, G. Purohit, K. K. Sud, “A robust and secure chaotic standard map based pseudorandom permutation-substitution scheme for image encryption,” Opt. Commun., Vol. 284, no. 19, pp. 4331–39, Sep. 2011.
  • M. K. Mandal, G. D. Banik, D. Chattopadhyay, D. Nandi, “An image encryption process based on chaotic logistic map,” IETE Tech. Rev., Vol. 29, no. 5, pp. 395–404, Sep. 2012.
  • C.-H. Yuen, K-W. Wong, “A Chaos-based joint image compression and encryption scheme using DCT and SHA-1,” Int. J. Appl. Soft Comput., Vol. 11, no. 8, pp. 5092–98, Dec. 2011.
  • N. K. Pareek, V. Patidar, K. K. Sud, “Diffusion–Substitution based gray image encryption scheme,” Digit. Signal Process., Vol. 23, no. 3, pp. 894–901, May 2013.
  • T. Gopalakrishnan, S. Ramakrishnan, M. Balakumar, “An image encryption using chaotic permutation and diffusion,” in IEEE Proceedings of fourth International Conference on Recent Trends in Information Technology (ICRTIT-2014), 2014, pp. 1–5.
  • K. D. Rao, K. P. Kumar, P. V. Murali Krishna, “A new and secure cryptosystem for image encryption and decryption,” IETE J. Res., Vol. 57, no. 2, pp. 165–71, Mar. 2011.
  • T. Gopalakrishnan, S. Ramakrishnan, M. Balakumar, “Image encryption using chaos and parity based pixel modification in permutation”, in IJCA Proceedings of International conference on Simulation in Computing Nexus ICSCN(1), 2014, pp. 30–5.
  • T. Gopalakrishnan, S. Ramakrishnan, R. R. Kumar, “A new chaotic image encryption scheme using random permutation and logistic map”, in International Conference Biosignals, Images and Instruments (ICBSII-2013), 2013, pp. 34–43.
  • Q. Zhang, X. Wei, “RGB color image encryption method based on lorenz chaotic system and DNA computation”, IETE Tech. Rev., Vol. 30, no. 5, pp. 404–9, Sep. 2013.
  • X. Wang, L. Teng, X. Qin, “A novel color image encryption based on chaos”, Signal Process., Vol. 92, no. 4, pp. 1101–8, Apr. 2012.
  • G. Ye, “Image scrambling encryption algorithm of pixel bit based on chaos map”, Pattern Recognit. Lett., Vol. 31, no. 5, pp. 347–54, Apr. 2010.
  • D. Xioa, X. Liao, Y. Wang, “Parallel keyed hash function construction based on chaotic neural network”, Neurocomputing, Vol. 72, no. 11-12, pp. 2288–96, Jun. 2009.
  • X. Yi, “Hash function based on chaotic tent maps”, IEEE Trans. Circuits Syst. — II: Express Briefs, Vol. 52, no. 6, pp. 354–57, Jun. 2005.
  • A. Kanso, M. Ghebleh, “A fast and efficient chaos-based keyed hash function”, Commun. Nonlinear Sci. Numer. Simulation, Vol. 18, no. 1, pp. 109–23, Jan. 2013.
  • A. Kanso, H. Yahyaoui, M. Almulla, “Keyed hash function based on a chaotic map”, Inf. Sci., Vol. 186, no. 1, pp. 249–64, Mar. 2012.
  • D. Xiao, X. Liao, S. Deng, “Parallel keyed hash function construction based on chaotic maps”, Phys. Lett. A, Vol. 372, no. 26, pp. 4682–88, Jun. 2008.
  • H. Yang, K. -W. Wong, X. Liao, Y. Wang, D. Yang, “One-way hash function construction based on chaotic map network”, Chaos Solitons Fractals, Vol. 41, no. 5, 2566–74, Sep. 2009.
  • A. Akhshani, S. Behnia, A. Akhavan, M. A. Jafarizadeh, H. Abu Hassan, Z. Hassan, “Hash function based on hierarchy of 2D piecewise nonlinear chaotic maps”, Chaos Solitons Fractals, Vol. 42, no. 4, pp. 2405–12, Nov. 2009.
  • National Institute of Standards and Technology http://csrc.nist.gov/publications/nistpubs/800-22-rev1a/SP800-22rev1a.pdf, 2010.
  • Y. Zhou, L. Bao, C. L. Philip Chen, “A new 1D chaotic system for image encryption”, Signal Process., Vol. 97, pp. 172–82, Apr. 2014.
  • Y. Zhou, L. Bao, C. L. Philip Chen, “Image encryption using a new parametric switching chaotic system,” Signal Process., Vol. 93, no. 11, pp. 3039–52, Nov. 2013.
  • N. Singh, A. Sinha, “Optical image encryption algorithm using hartley transform and logistic map”, Opt. Commun., Vol. 282, no. 6, pp. 1104–9, Mar. 2009.
  • Z. L. Zhu, W. Zhang, K. W. Wang, H. Yu, “A chaos-based symmetric image encryption scheme using bit-level permutation”, Inf. Sci., Vol. 181, no. 6, pp. 1171–86, Mar. 2011.
  • H. Liu, W. Xingyuan, “Color image encryption based on one-time keys and robust chaotic maps”, Comput. Math. Appl., Vol. 59, pp. 3320–27, May 2010.
  • Y.-Q. Zhang, X.-Y. Wang, “Analysis and improvement of a chaos-based symmetric image encryption scheme using a bit-level permutation”, Nonlinear Dyn., Vol. 77, no. 3, pp. 687–98, Mar. 2014.
  • Y.-Q. Zhang, X.-Y. Wang, “A symmetric image encryption algorithm based on mixed linear nonlinear coupled map lattice”, Inf. Sci., Vol. 273, no. 20, pp. 329–51, July 2014.
  • H. Liu, X.-Y. Wang, “Color image encryption using spatial bit-level permutation and high-dimension chaotic system”, Opt. Commun., Vol. 284, No 16-17, pp. 3895–3903, Aug. 2011.
  • X.-Y. Wang, L. Yang, R. Liu, A. Kadir, “A chaotic image encryption algorithm based on perceptron model”, Nonlinear Dyn., Vol. 62, no. 3, pp. 615–21, Jun. 2010.
  • S. G. Lian, J. Sun, Z. Wang, “A block cipher based on suitable use of chaotic standard map”, Chaos Solitons Fractals, Vol. 26, no. 1, pp. 117–29, Oct. 2009.
  • Y. Niu, X. Wang, “An anonymous key agreement protocol based on chaotic maps”, Commun. Nonlinear Sci. Numer. Simul., Vol. 16, no. 4, pp. 1986–92, Apr. 2011.
  • H. Tseng, R. Jan, W. Yang, “A chaotic map based key agreement protocol that preserves user anonymity”, in IEEE International conference on communications (ICC'09), 2009, pp. 1–6.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.