Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

A Novel Approach to Improve Image Storage and Security By Using Chaotic Image Encryption Method And Lossless Compression Method


Affiliations
1 Department of Computer Science and Engineering, NIMS University Rajasthan, India
     

   Subscribe/Renew Journal


In present day life, even common men share confidential information among themselves through social media. This research work could be developed as a plug-in module which performs encryption and decryption and added to those presently available apps. This ensures a high-level end to end encryption. Besides the encryption performed in Adhoc networks where local nodes are interconnected to establish a communication, this research proposal could be added into the existing encryption layer. Such embedded encryption would increase the security levels in industries whose processes are controlled and operated via WIFI networks. Even RFID reader and tags could enjoy this encryption scheme. In chaotic based systems, usually logistic maps are used and the lattice values are modified through several iterations and finally forms a spatio-temporal system. Since linear coupling of lattices results in easy guessing of pixels, non-linear coupling is getting popular among chaotic based encryption systems. Such non-linear spatio-temporal chaotic systems are able to provide sufficient amount of security to the host image. However, intruders have their own way to decrypt either using ‘Trial and Error’ methods or through mathematical analysis of the encrypted images. So, the task of the researcher is to improve the chaotic metrics ideally by realizing the key space (to be of infinite size) and zero amount of information to be stolen except the encrypted pixels in the hands of intruders. Further decryption by the intended users is still a challenge even though the keys are known because; the quality of the host image should be preserved. Another challenge to the researcher is, to perform compression in order to save the storage area in concerned servers. Naturally compression and decompression are considered to be a valid attack on encryption methods. But in our Case, compression is done intentionally for saving storage area and bandwidth.

Keywords

Chaotic Systems, ACGLML, Bifurcation Diagram, Arnold’s Cat Map, Lattice Variation.
Subscription Login to verify subscription
User
Notifications
Font Size

Abstract Views: 223

PDF Views: 0




  • A Novel Approach to Improve Image Storage and Security By Using Chaotic Image Encryption Method And Lossless Compression Method

Abstract Views: 223  |  PDF Views: 0

Authors

Pradheep Manisekarana
Department of Computer Science and Engineering, NIMS University Rajasthan, India
Prachi Dhankhar
Department of Computer Science and Engineering, NIMS University Rajasthan, India
Parveen Kumar
Department of Computer Science and Engineering, NIMS University Rajasthan, India

Abstract


In present day life, even common men share confidential information among themselves through social media. This research work could be developed as a plug-in module which performs encryption and decryption and added to those presently available apps. This ensures a high-level end to end encryption. Besides the encryption performed in Adhoc networks where local nodes are interconnected to establish a communication, this research proposal could be added into the existing encryption layer. Such embedded encryption would increase the security levels in industries whose processes are controlled and operated via WIFI networks. Even RFID reader and tags could enjoy this encryption scheme. In chaotic based systems, usually logistic maps are used and the lattice values are modified through several iterations and finally forms a spatio-temporal system. Since linear coupling of lattices results in easy guessing of pixels, non-linear coupling is getting popular among chaotic based encryption systems. Such non-linear spatio-temporal chaotic systems are able to provide sufficient amount of security to the host image. However, intruders have their own way to decrypt either using ‘Trial and Error’ methods or through mathematical analysis of the encrypted images. So, the task of the researcher is to improve the chaotic metrics ideally by realizing the key space (to be of infinite size) and zero amount of information to be stolen except the encrypted pixels in the hands of intruders. Further decryption by the intended users is still a challenge even though the keys are known because; the quality of the host image should be preserved. Another challenge to the researcher is, to perform compression in order to save the storage area in concerned servers. Naturally compression and decompression are considered to be a valid attack on encryption methods. But in our Case, compression is done intentionally for saving storage area and bandwidth.

Keywords


Chaotic Systems, ACGLML, Bifurcation Diagram, Arnold’s Cat Map, Lattice Variation.