Chaos Baker-based Image Encryption in Operation Modes
This research paper study the application of chaos baker map for digital image encryption in different operation modes. The employed modes include the electronic code book (ECB), cipher block chaining (CBC), output feedback chaining (OFB), and cipher feedback chaining (CFB). The proposed method works by applying the chaos baker map in different operation modes for encrypting digital images. A group of tests were carried out to examine the impact of operation modes on chaos baker-based encryption. This is done using several encryption metrics like visual inspection, statistical measures, entropy measure, encryption quality measures, and noise resistance measures. Simulation results demonstrated the effectively of baker-based encryption in CBC mode.
 A. A. El-Latif, L. Li, and X. Niu, "A new image encryption scheme based on cyclic elliptic curve and chaotic system," Multimedia Tools and Applications, vol. 70, no. 3, pp. 1559â€“1584, 2014.
 X. Wu, H. Kan, and J. Kurths, "A new color image encryption scheme based on DNA sequences and multiple improved 1D chaotic maps," Applied Soft Computing, vol. 37, pp. 24â€“39, 2015.
 X. Zhang, X. Fan, J. Wang, and Z. Zhao, "A chaos-based image encryption scheme using 2D rectangular transform and dependent substitution," Multimedia Tools and Applications, vol. 75, no. 4, pp. 1745â€“1763, 2016.
 G. Chen, Y. Mao, and C. K. Chui, "A symmetric image encryption scheme based on 3D chaotic cat maps," Chaos, Solitons & Fractals, vol. 21, no. 3, pp. 749â€“761, 2004.
 Z. Zhu, W. Zhang, K. Wong, and H. Yu, "A chaos-based symmetric image encryption scheme using a bit-level permutation," Information Sciences, vol. 181, no. 6, pp. 1171â€“1186, 2011.
 N. Zhou, S. Pan, S. Cheng, and Z. Zhou, "Image compression-encryption scheme based on hyper-chaotic system and 2D compressive sensing," Optics & Laser Technology, vol. 82, pp. 121â€“133, 2016.
 L. Xu, Z. Li, J. Li, and W. Hua, "A novel bit-level image encryption algorithm based on chaotic maps," Optics and Lasers in Engineering, vol. 78, pp. 17â€“25, 2016.
 L. Xu, X. Gou, Z. Li, and J. Li, "A novel chaotic image encryption algorithm using block scrambling and dynamic index based diffusion," Optics and Lasers in Engineering, vol. 91, pp. 41â€“52, 2017.
 Y. Wu, G. Yang, H. Jin, and J. P. Noonan, "Image encryption using the two-dimensional logistic chaotic map," Journal of Electronic Imaging, vol. 21, no. 1, Article ID 013014, 2012.
 N. K. Pareek, V. Patidar, and K. K. Sud, "Image encryption using chaotic logistic map," Image and Vision Computing, vol. 24, no. 9, pp. 926â€“934, 2006.
 R. Boriga, A. C. Dascalescu, and A.-V. Diaconu, "A new one-dimensional chaotic map and its use in a novel real-time image encryption scheme," Advances in Multimedia, vol. 2014, Article ID 409586, 15 pages, 2014.
 D. Arroyo, R. Rhouma, G. Alvarez, S. Li, and V. Fernandez, "On the security of a new image encryption scheme based on chaotic map lattices," Chaos: An Interdisciplinary Journal of Nonlinear Science, vol. 18, no. 3, Article ID 033112, 2008.
 J. Fridrich, "Symmetric ciphers based on two-dimensional chaotic maps," International Journal of Bifurcation and Chaos, vol. 8, no. 6, pp. 1259â€“1284, 1998.
 G. Chen and X. Dong, "From Chaos to Order: Methodologies, Perspectives, and Applications," Series on Nonlinear Science, World Scientific, 1998.
 T. Ueta and G. Chen, "Bifurcation analysis of Chen's equation," International Journal of Bifurcation and Chaos, vol. 10, no. 8, pp. 1917-1931, 2000.
 Wolf, J. B. Swift, and H. L. A. Swinney, "Determining Lyapunov exponents from a time series," Physica D: Nonlinear Phenomena, vol. 16, no. 3, pp. 285â€“317, 1985.
 Zhu, "A novel image encryption scheme based on improved hyperchaotic sequences," Optics Communications, vol. 285, no. 1, pp. 29-37, 2012.
 Norouzi, S. Mirzakuchaki, S. M. Seyedzadeh, and M. R. Mosavi, "A simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion process," Multimedia Tools and Applications, vol. 71, no. 3, pp. 1469-1497, 2014.
 N. Zhou, Y. Hu, L. Gong, and G. Li, "Quantum image encryption scheme with iterative generalized Arnold transforms and quantum image cycle shift operations," Quantum Information Processing, vol. 16, no. 6, 2017.
 H.-M. Yuan, Y. Liu, T. Lin, T. Hu, and L.-H. Gong, "A new parallel image cryptosystem based on 5D hyper-chaotic system," Signal Processing: Image Communication, vol. 52, pp. 87â€“96, 2017.
 Podlubny, I. PetrÃ¡Å¡, B. M. Vinagre, and L. DorcÃ¡k, "Analogue realizations of fractional-order controllers," Nonlinear Dynamics, vol. 29, no. 1-4, pp. 281-296, 2002.
 Z. Wang, X. Huang, Y.-X. Li, and X.-N. Song, "A new image encryption algorithm based on the fractional-order hyperchaotic Lorenz system," Chinese Physics B, vol. 22, no. 1, Article ID 010504, 2013.
 Zhao, S. Wang, Y. Chang, and X. Li, "A novel image encryption scheme based on an improper fractional-order chaotic system," Nonlinear Dynamics, vol. 80, no. 4, pp. 1721-1729, 2015.
 X. Huang, T. Sun, Y. Li, and J. Liang, "A color image encryption algorithm based on a fractional-order hyperchaotic system," Entropy, vol. 17, no. 1, pp. 28â€“38, 2014.
 Kuo-Tsang Huang, Jung-Hui Chiu, and Sung-Shiou Shen, "A Novel Structure with Dynamic Operation Mode for Symmetric-Key Block Ciphers," International Journal of Network Security & Its Applications (IJNSA). vol. 5(1): 19, pp. 2-13, 2013.
 William F. Ehrsam, Carl H. W. Meyer, John L. Smith, Walter L. Tuchman, "Message verification and transmission error detection by block chaining," US Patent 4074066, 1976.
 Morris Dworkin "Recommendation for Block Cipher Modes of Operation: Methods and Techniques," NIST Special Publication 800-38A, 2001. http://dx.doi.org/10.6028/NIST.SP.800-38A
 Davies, D. W.; Parkin, G. I. P. (1983). "The average cycle size of the key stream in output feedback encipherment," Advances in Cryptology, Proceedings of CRYPTO 82. New York: Plenum Press. pp. 263â€“282. ISBN 0306413663.
 Ensherah A. Naeem, Mustafa M. Abd Elnaby, Hala S. El-sayed, Fathi E. Abd El-Samie, and Osama S. Faragallah, "Wavelet Fusion for Encrypting Images with Few Details," Computers and Electrical Engineering, vol. 60, pp. 450-470, 2016.
 Osama S. Faragallah, Ashraf Afifi, "Optical Color Image Cryptosystem Using Chaotic Baker Mapping Based-Double Random Phase Encoding", Optical and Quantum Electronics, vol. 49(3):89, pp. 1-33, 2017.
 H. Elkamchouchi and M. A. Makar, "Measuring encryption quality of Bitmap images encrypted with Rijndael and KAMKAR block ciphers," in Proceedings Twenty second National Radio Science Conference (NRSC 2005), pp. C11, Cairo, Egypt, Mar. 15,17, 2005.
 Ziedan, M. Fouad, and D. H. Salem, "Application of Data encryption standard to bitmap and JPEG images," Proceedings Twentieth National Radio Science Conference, pp. C16, Egypt, Mar. 2003.
 Osama S. Faragallah, "Optical Double Color Image Encryption Scheme in the Fresnel-based Hartley Domain Using Arnold Transform and Chaotic Logistic Adjusted Sine Phase Masks," Optical and Quantum Electronics, vol. 50(3):118, pp. 1-27, 2018.
Copyright (c) 2018 INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors retain the copyright of their manuscripts, and all Open Access articles are distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided that the original work is properly cited.
The use of general descriptive names, trade names, trademarks, and so forth in this publication, even if not specifically identified, does not imply that these names are not protected by the relevant laws and regulations. The submitting author is responsible for securing any permissions needed for the reuse of copyrighted materials included in the manuscript.
While the advice and information in this journal are believed to be true and accurate on the date of its going to press, neither the authors, the editors, nor the publisher can accept any legal responsibility for any errors or omissions that may be made. The publisher makes no warranty, express or implied, with respect to the material contained herein.