The International Arab Journal of Information Technology (IAJIT)

..............................
..............................
..............................


Generation of Chaotic Signal for Scrambling Matrix Content

Very well evolved, information technology made so easy the transfer of all types of data over public channels. For this reason, ensuring data security is certainly a necessary requirement. Scrambling data is one solution to hide information from non authorized users. Presenting matrix content, image scrambling can be made by only adding a mask to the real content. A user, having the appropriate mask, can recognize the image content by only subtracting it. Chaotic function is recently used for image encryption. In this paper, an algorithm of image scrambling based on three logistic chaotic functions is proposed. Defined by its initial condition and parameter, each chaotic function will generate a random signal. The set of initial conditions and parameters is the encryption key. The performance of this technique is ensured for two great reasons. First, using masks on the image makes unintelligible its content. Second, using three successive encryption processes makes so difficult attacks. This point reflects, in one hand, a sufficient key length to resist to brute force attack. In the other hand, it reflects the random aspect of the pixel distribution in the scrambled image. That means, the randomness in one mask minimizes the correlations really existent between neighboring pixels. That makes our proposed approach resistant to known attacks and suitable for applications requiring secure data transfer such as medical image exchanged between doctors.


[1] Apeksha W., Abhishek B., Abhishek S., and Sanuj K., “Chaos Based Image Encryption and Decryption,” International Journal of Advanced Research in Computer and Communication Engineering, vol. 5, no. 4, pp. 64-68, 2016.

[2] Chakraborty SH., Seal A., Roy M. and Mali K., “A Novel Lossless Image Encryption Method using DNA Substitution and Chaotic Logistic Map,” International Journal of Security and Its Applications, vol. 10, no. 2, pp. 205-216, 2016.

[3] Chen W., Wang T., and Wang B., “Design of Digital Image Encryption Algorithm Based on Mixed Chaotic Sequences,” International Journal on Smart Sensing and Intelligent Systems, vol. 7, no. 4, pp. 1453-1469, 2014. Generation of Chaotic Signal for Scrambling Matrix Content 553

[4] Chen X. and Hu C., “Adaptive Medical Image Encryption Algorithm Based on Multiple Chaotic Mapping,” Saudi Journal of Biological Sciences, vol. 24, no. 8, pp. 1821-1827, 2017.

[5] Khlif N., Damak T., Kammoun F., and Masmoudi N., “Joint Selective Encryption of CAVLC and Signs of Motion Vectors for H.264/AVC,” Journal of Testing and Evaluation, vol. 44, no. 1, pp. 160-174, 2016.

[6] Khlif N., Masmoudi A., Kammoun F., and Masmoudi N., “Secure Chaotic Dual Encryption Scheme for H.264/AVC Video Conferencing Protection,” IET Image Processing, vol. 12, no. 1, pp. 42-52, 2018.

[7] Mondal B. and Mandal T., “A Nobel Chaos based Secure Image Encryption Algorithm,” International Journal of Applied Engineering Research, vol. 11, no. 5, pp. 3120-3127, 2016.

[8] May R., “Simple Mathematical Models with Very Complicated Dynamics,” Nature, vol. 261, pp. 459-467, 1976.

[9] Poobathy D. and Chezian R., “Edge Detection Operators: Peak Signal to Noise Ratio Based Comparison,” International Journal of Image, Graphics and Signal Processing, vol. 6, no. 10, pp. 55-61, 2014.

[10] Rathore D. and Suryavanshi A., “A proficient Image Encryption using Chaotic Map Approach,” International Journal of Computer Applications, vol. 134, no. 10, pp. 20-24, 2016.

[11] Schneier B., Applied Cryptography: Protocols, Algorithms, and Source Code in C, Wiley Computer Publishing, 1996.

[12] Tedmori S. and Al-Najdawi N., “Lossless Image Cryptography Algorithm Based on Discrete Cosine Transform” The International Arab Journal of Information Technology, vol. 9, no 5, pp. 471-478, 2012.

[13] Wang D., Chang C., Liu Y., Song G., and Liu Y., “Digital Image Scrambling Algorithm Based on Chaotic Sequence and Decomposition and Recombination of Pixel Values,” International Journal of Network Security, vol. 17, no. 3, pp. 322-327, 2015.

[14] Wang Z., Bovik A., Sheikh H., and Simoncelli E., “Image Quality Assessment: From Error Visibility to Structural Similarity,” IEEE Transactions on Image Processing, vol. 13, no. 4, pp. 1-14, 2004.

[15] Wu Y., Noonan J., and Agaian S., “NPCR and UACI Randomness Tests for Image Encryption,” Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications JSAT, vol. 1, no. 2, pp. 31-38, 2011.

[16] Zhang Q., Guo Y., Li W., and Ding Q., “Image Encryption Method Based on Discrete Lorenz Chaotic Sequences,” Journal of Information Hiding and Multimedia Signal Processing, vol. 7, no. 3, pp. 576-586, 2016. Naziha Khlif received her diploma in Electrical Engineering in 2006, the master degree in Electronics in 2011 and the PhD in Electrical Engineering in 2016 from the National Engineering School of Sfax University of Sfax. She is currently a postdoctoral research fellow at Sfax University. Her research interests include image processing, video coding, cryptography and data security. Ahmed Ghorbel received his diploma in Electrical and Automation Engineering in 2012 and the master degree in Automation and intelligent technology in 2013 from the National Engineering School of Gabes University of Gabes. He is currently a PhD student at the National Engineering School of Sfax, Sfax University since September 2014. His research interests include face recognition. Walid Aydi received the degree of Engineering in Electrical Engineering in 2008, Masters Degree in Engineering in the major of electronics and telecommunication 2009, and a Ph.D degree in Electronic Engineering in 2013, from the National Engineering School of Sfax. From 2014 to 2017, he held the position of Assistant Professor in the Higher Institute of Computer Science and Multimedia, Gabes, Tunisia. He has been employed as an assistant professor in The Prince Sattam bin Abdullaziz University in Saudi Arabia since 2017. His research interests focus on image processing, pattern recognition, and computer vision. Nouri Masmoudi received his electrical engineering degree from the Faculty of Sciences and Techniques Sfax University in 1982, the DEA degree from the National Institute of Applied Sciences Claude Bernard University Lyon in 1984. He received his PhD degree from the National Engineering School of Tunis (ENIT) in 1990. He is currently a professor in the electrical engineering department in the National Engineering School of Sfax. His research activities include Design, Telecommunication, Embedded Systems, Information Technology, Video Coding and Image Processing.