Home   >   CSC-OpenAccess Library   >    Manuscript Information
Full Text Available

This is an Open Access publication published under CSC-OpenAccess Policy.
Publications from CSC-OpenAccess Library are being accessed from over 74 countries worldwide.
Chaotic Block Image Scheme using Large Key Space and Message Digest Algorithm
Fahmi Nasser Ali, Mussa Mohamed Ahmed
Pages - 135 - 147     |    Revised - 31-07-2019     |    Published - 31-08-2019
Volume - 13   Issue - 4    |    Publication Date - August 2019  Table of Contents
Image Encryption, 2D-STCM, Cat Map, MD5, Confusion, Diffusion.
In this paper, chaotic block image scheme using large key space and message digest algorithm. Cat map intended for confusion and 2D-Sine Tent Composite map (2D-STCM) key generator intended for diffusion. Confusion is implemented by 2D Cat map with arbitrary block size. In the first tendency, 2D cat map use for local shuffling of indexes inside blocks, while in the second tendency, 2D cat map used for global shuffling of whole image indexes. The designed algorithm executes two confusions and one diffusion in each iteration. To increase the security level, the message digestion algorithm is used as a fingerprint for the plain image that creates the initial value of the key. After that 2D-STCM generates a large key stream. Diffusion implementation takes place by XOR operation; between a key stream and confused image. Experimental results, show that security level increases due to integration of confusion and diffusion. On the other side large key space and the high sensitivity of secret keys have been given a guarantee for the performance of the security. Performance measures reach to the top value among those in the similar researches. To verify the obtained results, authors implemented inverse chaos. All the tests are processed by MATLAB 2015a.
1 Google Scholar 
2 refSeek 
3 Doc Player 
4 Scribd 
5 SlideShare 
1 F. Nasser and M. Mohamed. "Improvement of Images Encryption Based on Multiple Chaotic Maps and 2D-STCM Key Space," presented at the 3rd Int. Conf. Computer Science and Engineering Information technology, Aden, Yemen, 2019.
2 W. Stallings. Cryptography and Network Security Principles and Practice, 4th ed. USA: Prentice Hall, 2006, pp.1-210.
3 B. Schneier. Applied Cryptography, Protocols, Algorithms, and Source Code, second ed. New York: John Wiley & Sons, Inc., 1996, pp. 370-642.
4 S. Lian. "A Block Cipher Based on Chaotic Neural Networks." Elsevier, Neuro computing, vol. 72, pp. 1296-1301, Nov. 2009.
5 M. Billal Hossain, M. Toufikur Rahman, S. Rahman and S. Islam. "A New Approach of Image Encryption Using 3D Chaotic Map to Enhance Security of Multimedia Component," presented at the 3rd Int. Conf. Communication Engineering Department, Bangladesh, 2014.
6 M. Mishra, P. Singh and C. Garg. "A New Algorithm of Encryption and Decryption of Images Using Chaotic Mapping." International Journal of Information and Computation technology, Vol. 4, pp. 741-746, 2014.
7 C.E. Shannon. Communication theory of secrecy systems. Bell. Syst. Tech. 1949, pp. 656-715.
8 K. Naik and A. Kumar Pal. "An Image Cryptosystem based on Diffusion of Significant Bit- planes of a Scrambled Image with Generated Binary Key Matrices," Proceedings of IEEE (ICCICR), 2013, pp. 15.
9 S. Som and A. Kotal. "Confusion and Diffusion of Grayscale Images Using Multiple Chaotic Maps," Proceedings of IEEE (NCCCS), 2012, pp. 15.
10 Z. Lv, L. Zhang, and J. Guo. "A Symmetric Image Encryption Scheme Based on Composite Chaotic Dispersed Dynamics System," in Proc. ISCSCT, 2009, pp.191-194.
11 S. Agarwal. "Secure Image Transmission Using Fractal and 2D-Chaotic Map." The International Journal of Imaging, pp. 17, Jan. 2018.
12 L. Hongjun and W. Xingyuan. "Color Image Encryption based on One-Time Keys and Robust Chaotic Maps." The International Journal of Computers and Mathematics with Applications, pp. 3320-3327, Mar. 2010.
13 S. Agarwal, G. Srivastava and A. Negi. " Dynamics of Mandelbrot set with transcendental function." The International Journal of Advanced Computer Science and Applications, Vol. 3, No.5, pp. 142-146, 2012.
14 X. Tong, Y. Liu, M. Zhang, H. Xu and Z. Wang. "Image Encryption Based on Hyperchaotic Liu System Algorithm." The International Journal of Eng. & Tech. Journal, Vol.33, No.17, pp.181-196, Jan. 2015.
15 R. Rivest. "MD5." Internet: https://en.wikipedia.org/wiki/MD5, May. 29, 2019.
16 R. Zahmou, R. Ejbali and M. Zaied. "Image Encryption Based on New Beta Chaotic Maps." The International Journal of Opt. Lasers Eng., Vol.96, pp. 39-49, Apr. 2017.
17 A. Belazi, A. Abd El-Latif and S. Belghith, "A Novel Image Encryption Scheme Based on Substitution-Permutation Network and Chaos." The International Journal of Signal Process pp.41, Mar. 2016.
18 X. Wang, L. Teng and X. Qin. "A Novel Colour Image Encryption Algorithm Based on Chaos." The International Journal of Signal Process, pp.1101-1108, Oct. 2011.
19 X. Wang, L. Liu and Y. Zhang. "A Novel Chaotic Block Image Encryption Algorithm Based on Dynamic Random growth Technique." The International Journal of Opt. Lasers Eng., Vol.66, pp.10-18. Aug. 2014.
20 Z. Hua, Y. Zhou, C. Pun and C.L. Philip Chen. "2D Sine Logistic Modulation Map for Image Encryption." The International Journal of Inf. Sci. Vol.297, pp.80-94, Nov, 2015.
21 XY. Wang, L. Yang, R. Liu and A. Kadir. "A Chaotic Image Encryption Algorithm Based on Perceptron Model." The International Journal of Nonlinear Dyn, pp. 615-621, Jun, 2010.
22 G. Ye* and X. Huang. "A secure Image Encryption Algorithm Based on Chaotic Maps and SHA-3." Security and Communication Networks, pp. 2015-2023, Feb. 2016.
Mr. Fahmi Nasser Ali
Department of information technology, University of Aden, Aden - Yemen
Dr. Mussa Mohamed Ahmed
Department of electronics and communication, University of Aden, Aden - Yemen