SlideShare a Scribd company logo
1 of 43
Agenda
 Encryption Introductory Concepts
 Encryption Algorithms
 Evolutionary Algorithms
 Chaos Theory
 Swarm Intelligence/Particle Swarm Model
1. Analysis and Comparison of Image Encryption Algorithms
2. From Chaos to Cryptography
3. From Chaotic Maps to Encryption Schemes
4. Survey - Image Encryption using Chaotic Cryptography Schemes
5. New Encryption Schema Based on Swarm Intelligence Chaotic Map
2
Encryption Introductory Concepts
 Encryption is the process of transforming information using an algorithm to make it
unreadable to anyone except those possessing special knowledge
 Encryption has long been used by militaries and governments to facilitate secret
communication
 Encryption is now commonly used for protecting information within many kinds of
civilian systems
 Files on computers and storage devices
 Data being transferred via networks e.g. Internet, mobile telephones, wireless
microphones, wireless intercom systems, Bluetooth devices and bank automatic teller
machines
 The harder part in encryption is to ensure that people who are supposed to
decipher the encrypted message can do so with ease, yet only those authorized
are able to decipher it
3
Encryption Algorithms (1/2)
 Encryption Algorithm is some mathematical operations to conduct substitutions
and transformations to the information to convert it to the encrypted form
 Encryption Algorithm main purpose is to provide:
 Authentication: Provding one's identity before granting access
 Privacy and Confidentiality: Ensuring that outsiders can’t read data intended for specific
parties
 Integrity: Ensuring that the message has not been modified in any way before it arrives to
the intended recipient
 Non-Repudiation: Ensuring that the message is truly originated from the sender
 Generally encryption algorithm consists of:
 Plaintext: The text message to which an algorithm is applied
 Encryption Algorithm: Mathematical operations to conduct substitutions and
transformations to the plaintext
 Secret Key(s): An input to the algorithm that dictates the encrypted outcome
 Ciphertext: The encrypted or scrambled message produced by applying the algorithm to
the plaintext message using the secret key
 Decryption Algorithm: The encryption algorithm in reverse, it uses the ciphertext and the
secret key to derive the plaintext message
4
Encryption Algorithms (2/2)
 Symmetric Algorithms (Conventional, Private Key and Single Key Encryption)
 Enquire all communicating parties to share a common key
 Use single key to encrypt and decrypt data
 Work fast and are well suited for encrypting blocks of messages at once
 It is essential that the sender and the receiver have a way to exchange secret key in a
secure manner
 Asymmetric Algorithms (Public Key Encryption)
 Each sender and recipient has a private key
 There’s a public key, which can be known by anyone
 Each encryption/decryption process requires at least one public key and one private key
 Asymmetric Algorithms tend to be slower than their symmetric counterparts
 They aren't recommended for encrypting large amounts of data
5
Evolutionary Algorithms (1/2)
 Artificial Intelligence “The study and design of intelligent agents”, it’s
the intelligence of machines, where an intelligent agent is a system that perceives
its environment and takes actions that maximize its chances of success
 Population is a set of organisms in which any pair of members can breed together,
this implies that all members belong to the same species and live near each other
 Evolutionary Computation is a subfield of artificial intelligence, it uses iterative
progress in a population such as growth or development, this population is
then selected in a guided random search using parallel processing to achieve the
desired objective
 Candidate Solution is a member of a set of possible solutions to a given problem,
a candidate solution does not have to be a likely or reasonable solution to the
problem, it is simply the set that satisfies all constraints
6
Evolutionary Algorithms (2/2)
 Metaheuristic designates a computational method that optimizes a problem
by iteratively trying to improve a candidate solution with regard to a given measure
of quality
 Fitness Function is a function that prescribes the optimality of a solution so that
any solution may be ranked against all the other solutions
 Evolutionary Algorithms (EAs)
 EAs subsets of evolutionary computation, a generic population based
metaheuristic optimization algorithms
 EAs use some mechanisms inspired by biological evolution such as reproduction, mutation,
recombination and selection
 Candidate solutions to the optimization problem play the role of individuals in a
population
 EAs often perform well approximating to all types of problems because they ideally do not
take any assumptions about the underlying fitness landscape
 EAs show successes in fields as diverse as engineering, art, biology, economics,
physics, marketing, genetics, operations research, robotics, social sciences, politics and
chemistry
 Some of the most widely used EAs techniques are Genetic Algorithms, Particle Swarm
Optimization techniques
7
Chaos Theory
 Dynamical System is a concept in mathematics where a fixed rule describes the
time dependence of a point in a geometrical space e.g. mathematical
models describing the swinging of a clock pendulum and the flow of water in a
pipe
 Chaos Theory
 Field of study in applied mathematics, with applications in several disciplines
including physics, economics, biology, and philosophy
 It studies the behavior of dynamical systems that are highly sensitive to initial conditions
 Small differences in initial conditions (such as those due to rounding errors in numerical
computation) yield widely diverging outcomes
 These systems are deterministic, meaning that their future behavior is fully determined by
their initial conditions
 Chaotic behavior can be observed in many natural systems, such as the weather
 Chaos-Based encryption technology has been studied for decades and it has
become an important branch of cryptography
 Attractiveness points of using chaos as the basis for developing cryptosystem are:
 Sensitivity to initial conditions
 The iterative values generated are completely random in nature, although limited between
bounds
8
Swarm Intelligence/Particle Swarm Model
 A completely different approach to chaotic-based encryption based on artificial
intelligence has been proposed recently
 Swarm Intelligence
 Design framework based on social insects behavior
 Social insects such as ants, bees, and wasps are unique in the way these simple individuals
cooperate to accomplish complex, difficult tasks
 This cooperation is distributed among the entire population
 Particle Swarm Model
 Consists of swarm of particles moving iteratively through the m-dimension problem space
to search the new solutions (positions)
 Each particle adjusts its position according to its own experience and according to the
experience of its neighbors, making use of the best position encountered by itself and its
neighbors
 A certain quality measure “Fitness Function” f is defined making it possible for particles to
compare different problem solutions
9
1. Analysis and Comparison of Image
Encryption Algorithms
 In this paper, we analyzed current image encryption algorithms and
compression is added for two of them (Mirror-like image encryption and
Visual Cryptography)
 A study of image compression is becoming more important since an
uncompressed image requires a large amount of storage space and high
transmission bandwidth
 Although we may use the traditional cryptosystems to encrypt images directly, it
is not a good idea for two reasons
 One is that the image size is almost always much greater than that of text
therefore, the traditional cryptosystems need much time to directly encrypt
the image data
 The other problem is that the decrypted text must be equal to the original text,
however, this requirement is not necessary for image data
 Image Encryption Algorithms
10
1. Analysis and Comparison of Image
Encryption Algorithms
 A Technique for Image Encryption using Digital Signatures
 The digital signature of the original image is added to the encoded version of the
original image. Image encoding is done by using an appropriate error control code,
such as a Bose-Chaudhuri Hochquenghem (BCH) code
 At the receiver end, after the decryption of the image, the digital signature can be used to
verify the authenticity of the image
 Lossless Image Compression and Encryption Using SCAN
 The compression and encryption schemes are based on SCAN patterns generated by
the SCAN methodology
 The SCAN is a formal language-based two-dimensional spatial-accessing methodology
which can efficiently specify and generate a wide range of scanning paths or space filling
curves
 A New Encryption Algorithm for Image Cryptosystems
 The images are first decomposed into vectors and then sequentially encoded vector by
vector
 Then traditional cryptosystems from commercial applications can be used
11
1. Analysis and Comparison of Image
Encryption Algorithms
 A New Mirror-Like Image Encryption Algorithm and Its VLSI Architecture
 Based on a binary sequence generated from a chaotic system, an image is scrambled
according to the algorithm
 Rearranging image pixels using swap function according to the binary sequence
 Color Image Encryption Using Double Random Phase Encoding
 New method to encrypt color images using existing optical encryption systems for gray-
scale images
 The color images are converted to their indexed image formats before they are
encoded
 In the encoding subsystem, image is encoded to stationary white noise with two random
phase masks, one in the input plane and the other in the Fourier plane
 At the decryption end, the color images are recovered by converting the decrypted
indexed images back to their RGB (Red-Green-Blue) formats
 Visual Cryptography for Color Images
1. Analysis and Comparison of Image
Encryption Algorithms
 Comparison of Current
Algorithms
 Adding compression to MIE and VC
algorithms
13
1. Analysis and Comparison of Image
Encryption Algorithms
 Compression is more important issue for visual cryptography because it produces 2
or more sharing images which are twice in size of dimensions of the original image
 JPEG (Joint Photographic Experts Group) is a standard compression algorithm
used to reduce memory requirement for the storage of digital images
 The JPEG standard allows to specify the desired quality of the encoded image by
varying a quality factor between 0 (lowest quality) and 100 (best quality)
 PNG is an extensible file format for the lossless, portable, well-compressed
storage of raster images
 While the jpeg compression has losses in the compressed image, in PNG
compression there is neither a change of colors nor a reduction of color depth
 Mean square error (MSE) is the cumulative squared error between original
and recovered image
 Lower value of MSE means lesser error
14
1. Analysis and Comparison of Image
Encryption Algorithms
 EXPERIMENTAL RESULTS
15
1. Analysis and Comparison of Image
Encryption Algorithms
 As we can see from the experimental results jpeg with quality parameter set
to 100 does not compress grayscale image, besides size of the grayscale image
increases, because noise in the image can not be compressed productively
 Quality setting set to 90 or below reaches good compression ratios
 However jpeg is not suitable for color images (even with quality set to 100)
because of the loss in the color
 Lossless PNG compression with VC for gray-level and color images has a big
compression ratio because it has only one color plane to encrypt and saves
storage space and network bandwidth up to 92,4%
16
2. From Chaos to Cryptography
17
2. From Chaos to Cryptography
18
2. From Chaos to Cryptography
19
2. From Chaos to Cryptography
20
2. From Chaos to Cryptography
21
2. From Chaos to Cryptography
22
2. From Chaos to Cryptography
23
2. From Chaos to Cryptography
24
2. From Chaos to Cryptography
25
2. From Chaos to Cryptography
26
3. From Chaotic Maps to Encryption
Schemes
 Many fundamental concepts in chaos theory such as:
 Mixing
 Measure Preserving Transformations
 Sensitivity to changes in initial conditions and parameters have been already applied for
a long time in cryptography
 Encryption algorithms are usually written in form of transformations:
where plaintext X, cryptogram Y and secret key Z are sequences of letters in
finite alphabets L x , L y , L z ,respectively, which are not necessarily equal to each
other
 A very common approach to creating diffusion and confusion is to use a product
cipher, a cipher that is implemented as a composition of simple ciphers
 Most commonly, product ciphers employ both permutation and substitution
ciphers as their component ciphers
27
3. From Chaotic Maps to Encryption
Schemes
 Deterministic chaotic discrete time dynamical systems
 k in Encryption Algorithm case was the key
 Considering maps which possess only unstable periodic orbits and chaotic
trajectories
 Two general principles which guide the design of practical ciphers are
 Diffusion
○ Diffusion means spreading out of the influence of a single plaintext digit over many ciphertext digits
so as to hide the statistical structure of the plaintext
 Confusion
○ Confusion means use of transformations which complicate dependence of the
statistics of ciphertext on the statistics of plaintext
28
3. From Chaotic Maps to Encryption
Schemes
 Such maps usually have mixing property: any set of initial conditions of
nonzero measure will eventually spread over the whole phase space as the
system evolves
 We also assume that mixing property holds for a large set of parameters
 Most ciphers achieve the mixing property by means of round repetition
 Same logic applies when a chaotic map serves as a cipher’s basis, mixing property
of the chaotic map is not sufficient
 Mixing property of chaotic maps is closely related to property of diffusion in
encryption transformations (algorithms)
 The keys of an encryption algorithm represent its parameters
 Kind of “mixing property” should hold also in the parameter space of the
map, if we would like to use chaotic maps as encryption algorithm
 We should look for maps that have only chaotic trajectories in a large parameter
region
29
3. From Chaotic Maps to Encryption
Schemes
 Mixing maps are good candidates for encryption algorithms because both diffusion
and confusion are their immanent properties
 Every encryption algorithm possesses properties of confusion, diffusion, mixing
and sensitivity to changes in plaintext and secret key
 This almost guarantees that an extension of the domain of an encryption
algorithm from a N-dimensional lattice to a N-dimensional continuum will give
rise to a chaotic map
 Therefore, sensitivity to changes in initial conditions and parameters, and
mixing property of a chaotic map do not guarantee that its discrete version is a
good crypto-algorithm
 The notion of cryptographic security has no counterpart in chaos theory, and
the cryptographic security of a chaos-derived encryption algorithm can be
checked up only by means of crypto-tools
 Still, the area of cryptanalysis provides us with certain cryptanalytic tools and
attacks against which any encryption algorithm must be resistant
30
4. Survey - Image Encryption using Chaotic
Cryptography Schemes
 This paper contributes by comparing and analyzing the performance of the past
chaotic image encryption schemes
 Properties of chaos including deterministic dynamics, unpredictable behavior and
non-linear transform
31
5. New Encryption Schema Based on Swarm
Intelligence Chaotic Map
 A new Swarm Intelligence Chaotic Map (SICM) is proposed to construct a robust
encryption algorithm
 The proposed scheme is described in details, along with the analysis of the
possibility to be used in image cryptography field
 Visual and computational experimental results are presented to demonstrate the
encryption quality of the proposed schema
32
5. New Encryption Schema Based on Swarm
Intelligence Chaotic Map
 At each time step t the velocity is
updated and the particle is moved to
a new position
 This new position is simply
calculated as the sum of the
previous position and the new
velocity
 The update of the velocity from the
previous velocity to the new velocity
is determined by:
 For a single individual particle swarm
the system is completely defined by
 The objective is to find pair of values
(c, t) so that M = I (where I is the
identity matrix) with long period t
 It means in particular that if we
generate a sequence of points in
this simplified particle swarm model
by using c values between 0 and 4,
we will obtain a pure random
sequence
33
5. New Encryption Schema Based on Swarm
Intelligence Chaotic Map
 Most of the existing Chaos-Based
encryption systems are built upon
m-dimensional mapping functions
called Chaotic Maps
 The procedure of the proposed
SICM cryptographic algorithm for
encryption and decryption
processes is all about:
 Obtaining a chaotic key
 This key is used for chaotic mixing of:
○ Image colors
○ Pixel position permutation
34
PSO Only
35
PSO
Vo
K(w,h,3)
Calculation
Yo Yt
Vt
R,G,B
Substitution
Position
Permutation
Cipher
Paper Algorithm – PSO + Logistic Map
36
PSO
Vo
Logistic
Map
K(w,h,3)
Calculation
Yo
cXo
Yt
Vt
R,G,B
Substitution
Position
Permutation
Cipher
3 Particles PSO + Logistic Map
37
PSO - RED
Vo
Logistic
Map
K(w,h,3)
Calculation
Yo Yt
Vt
R,G,B
Substitution
Position
Permutation
Cipher
PSO - GREEN
Vo
Yo Yt
Vt
PSO - BLUE
Vo
Yo Yt
Vt
Xo C
5. New Encryption Schema Based on Swarm
Intelligence Chaotic Map
 Step 1 Generate Binary 192 bit
secret Key
 The secret key is divided into six
blocks KI (I=1: 6) of 32-bit each
 K00, K12, K34 and K56 are divided
into 16 blocks kjk (j=1:4, k=1:4) of
8-bit each
 The initial values for logistic map
and each dimension of SICM are
calculated
 Step 2 Encryption (Masking Step)
 Initialize Logistic Map by x0
 Initialize SICM by (v0[1], v0[2], y0[1],
y0[2])
 Get next value of Logistic Map to be
the parameter (c) of SICM
 For Each Pixel pi (i=1 to
Block Height X Block Width)
 Iterate SICM to get ith outputs vi[1],
vi[2], yi[1],and yi[2]
 Convert these outputs to the
equivalent binary form of 32 bit
length
38
5. New Encryption Schema Based on Swarm
Intelligence Chaotic Map
 Map the binary version of SICM
output
 Divide K1, K2 and K3 into 12 blocks
kjk (j=1:3, k=1:4) of 8-bit each and
Calculate encryption Keys for R, G
and B channels
 Encrypt/Decrypt the ith plain pixel
 Step 2 Encryption (Permutation)
 Fill the xpermutation vector by vi[1]
and the ypermutation vector by vi[2]
 Arrange xpermutation and
ypermutation vectors from large to
small values
 Permutate whole Image by
xpermutation and ypermutation
indexes
39
5. New Encryption Schema Based on Swarm
Intelligence Chaotic Map
 Detailed security analysis of the proposed image encryption scheme is
presented
 Key Space Analysis: Key space size is 2^192, which is large enough to resist all kinds of
brute-force attacks with the current computing technology
 Statistical Analysis: Below histograms of R, G, and B channels confirms that ciphered
image looks completely random
40
5. New Encryption Schema Based on Swarm
Intelligence Chaotic Map
 Correlation Coefficient Analysis: The correlation coefficient of the adjacent pixels in
original Lena image is very high, and the correlation coefficient in ciphered image
processed is very low, close to 0
41
5. New Encryption Schema Based on Swarm
Intelligence Chaotic Map
 Key Sensitivity Analysis: Ideally a single bit of difference between encrypting and
decrypting key should make it unable to decrypt ciphered image
42
5. New Encryption Schema Based on Swarm
Intelligence Chaotic Map
 The possibility of using simplified model of swarm intelligence as a chaotic map is
proposed
 The SICM parameter is controlled throw another logistic map to make the
proposed schema more robust
 The presented schema is applied in image encryption
 Experimental results demonstrated that the proposed schema has enough key
space to resist all kinds of brute-force attacks
 The encryption image has good statistical properties shown in histogram and two
adjacent pixel correlation analysis
 Although the proposed encryption schema presented in this paper focuses on
image encryption field, it can be used for secure transmission of various
information forms
43

More Related Content

What's hot

Audio Cryptography System
Audio Cryptography SystemAudio Cryptography System
Audio Cryptography SystemRaju Raj
 
Image encryption
Image encryptionImage encryption
Image encryptionrakshit2105
 
Image and text Encryption using RSA algorithm in java
Image and text Encryption using RSA algorithm in java  Image and text Encryption using RSA algorithm in java
Image and text Encryption using RSA algorithm in java PiyushPatil73
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansionSreeda Perikamana
 
Image encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithmImage encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithmIAEME Publication
 
(Sample) image encryption
(Sample) image encryption(Sample) image encryption
(Sample) image encryptionAnsabArshad
 
Application of bpcs steganography to wavelet compressed video (synopsis)
Application of bpcs steganography to wavelet compressed video (synopsis)Application of bpcs steganography to wavelet compressed video (synopsis)
Application of bpcs steganography to wavelet compressed video (synopsis)Mumbai Academisc
 
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...Bikash Chandra Prusty
 
A novel secure combination technique of steganography and cryptography
A novel secure combination technique of steganography and cryptographyA novel secure combination technique of steganography and cryptography
A novel secure combination technique of steganography and cryptographyZac Darcy
 
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...IJCSIS Research Publications
 
A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...
A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...
A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...IJERA Editor
 
steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...Aparna Nk
 
DIP Using Image Encryption and XOR Operation Affine Transform
DIP Using Image Encryption and XOR Operation Affine TransformDIP Using Image Encryption and XOR Operation Affine Transform
DIP Using Image Encryption and XOR Operation Affine Transformiosrjce
 
Learnable Image Encryption
Learnable Image EncryptionLearnable Image Encryption
Learnable Image EncryptionMasayuki Tanaka
 
Steganography using visual cryptography
Steganography using visual cryptographySteganography using visual cryptography
Steganography using visual cryptographySaurabh Nambiar
 

What's hot (20)

Audio Cryptography System
Audio Cryptography SystemAudio Cryptography System
Audio Cryptography System
 
Image encryption
Image encryptionImage encryption
Image encryption
 
Image and text Encryption using RSA algorithm in java
Image and text Encryption using RSA algorithm in java  Image and text Encryption using RSA algorithm in java
Image and text Encryption using RSA algorithm in java
 
Image encryption using aes key expansion
Image encryption using aes key expansionImage encryption using aes key expansion
Image encryption using aes key expansion
 
Image encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithmImage encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithm
 
Secure image encryption using aes
Secure image encryption using aesSecure image encryption using aes
Secure image encryption using aes
 
(Sample) image encryption
(Sample) image encryption(Sample) image encryption
(Sample) image encryption
 
Steganography
SteganographySteganography
Steganography
 
Application of bpcs steganography to wavelet compressed video (synopsis)
Application of bpcs steganography to wavelet compressed video (synopsis)Application of bpcs steganography to wavelet compressed video (synopsis)
Application of bpcs steganography to wavelet compressed video (synopsis)
 
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
Dual Layer Security Of Data Using LSB Image Steganography And AES Encryption ...
 
Ew4301904907
Ew4301904907Ew4301904907
Ew4301904907
 
A novel secure combination technique of steganography and cryptography
A novel secure combination technique of steganography and cryptographyA novel secure combination technique of steganography and cryptography
A novel secure combination technique of steganography and cryptography
 
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
A SECURE STEGANOGRAPHY APPROACH FOR CLOUD DATA USING ANN ALONG WITH PRIVATE K...
 
A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...
A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...
A novel chaotic system for Video Cryptography using 2D logistics Sine-Cosine ...
 
steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...
 
DIP Using Image Encryption and XOR Operation Affine Transform
DIP Using Image Encryption and XOR Operation Affine TransformDIP Using Image Encryption and XOR Operation Affine Transform
DIP Using Image Encryption and XOR Operation Affine Transform
 
Learnable Image Encryption
Learnable Image EncryptionLearnable Image Encryption
Learnable Image Encryption
 
Visual cryptography
Visual cryptographyVisual cryptography
Visual cryptography
 
Steganography using visual cryptography
Steganography using visual cryptographySteganography using visual cryptography
Steganography using visual cryptography
 
Steganography
SteganographySteganography
Steganography
 

Similar to Image Encryption Algorithm Analysis and Comparison

Chaos Image Encryption Methods: A Survey Study
Chaos Image Encryption Methods: A Survey StudyChaos Image Encryption Methods: A Survey Study
Chaos Image Encryption Methods: A Survey StudyjournalBEEI
 
Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...IJCNCJournal
 
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...CSCJournals
 
Biometric Hashing technique for Authentication
Biometric  Hashing technique for  AuthenticationBiometric  Hashing technique for  Authentication
Biometric Hashing technique for AuthenticationAnIsh Kumar
 
Chaotic cryptography and multimedia security
Chaotic cryptography and multimedia securityChaotic cryptography and multimedia security
Chaotic cryptography and multimedia securityFatima Azeez
 
SYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTS
SYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTSSYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTS
SYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTSacijjournal
 
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEMEDESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEMEIJNSA Journal
 
IJSRED-V2I2P13
IJSRED-V2I2P13IJSRED-V2I2P13
IJSRED-V2I2P13IJSRED
 
SOM-PAD: Novel Data Security Algorithm on Self Organizing Map
SOM-PAD: Novel Data Security Algorithm on Self Organizing Map SOM-PAD: Novel Data Security Algorithm on Self Organizing Map
SOM-PAD: Novel Data Security Algorithm on Self Organizing Map cscpconf
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...editor1knowledgecuddle
 
Implementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithmImplementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithmeSAT Publishing House
 
Design and Implementation of New Encryption algorithm to Enhance Performance...
Design and Implementation of New Encryption algorithm to  Enhance Performance...Design and Implementation of New Encryption algorithm to  Enhance Performance...
Design and Implementation of New Encryption algorithm to Enhance Performance...IOSR Journals
 
A novel steganographic scheme based on
A novel steganographic scheme based onA novel steganographic scheme based on
A novel steganographic scheme based onacijjournal
 
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...IRJET Journal
 
Techniques of lattice based
Techniques of lattice basedTechniques of lattice based
Techniques of lattice basedijcsa
 
final_Paper_springer_final
final_Paper_springer_finalfinal_Paper_springer_final
final_Paper_springer_finalJoseph Emmanuel
 

Similar to Image Encryption Algorithm Analysis and Comparison (20)

Public key cryptography
Public key cryptographyPublic key cryptography
Public key cryptography
 
Chaos Image Encryption Methods: A Survey Study
Chaos Image Encryption Methods: A Survey StudyChaos Image Encryption Methods: A Survey Study
Chaos Image Encryption Methods: A Survey Study
 
H42063743
H42063743H42063743
H42063743
 
Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...
 
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...
Secure Image Encryption Using Filter Bank and Addition Modulo 28 with Exclusi...
 
Biometric Hashing technique for Authentication
Biometric  Hashing technique for  AuthenticationBiometric  Hashing technique for  Authentication
Biometric Hashing technique for Authentication
 
Chaotic cryptography and multimedia security
Chaotic cryptography and multimedia securityChaotic cryptography and multimedia security
Chaotic cryptography and multimedia security
 
SYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTS
SYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTSSYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTS
SYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTS
 
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEMEDESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
DESIGN AND ANALYSIS OF A NOVEL DIGITAL IMAGE ENCRYPTION SCHEME
 
IJSRED-V2I2P13
IJSRED-V2I2P13IJSRED-V2I2P13
IJSRED-V2I2P13
 
SOM-PAD: Novel Data Security Algorithm on Self Organizing Map
SOM-PAD: Novel Data Security Algorithm on Self Organizing Map SOM-PAD: Novel Data Security Algorithm on Self Organizing Map
SOM-PAD: Novel Data Security Algorithm on Self Organizing Map
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
 
Implementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithmImplementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithm
 
Design and Implementation of New Encryption algorithm to Enhance Performance...
Design and Implementation of New Encryption algorithm to  Enhance Performance...Design and Implementation of New Encryption algorithm to  Enhance Performance...
Design and Implementation of New Encryption algorithm to Enhance Performance...
 
A novel steganographic scheme based on
A novel steganographic scheme based onA novel steganographic scheme based on
A novel steganographic scheme based on
 
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
IRJET-Survey of Highly Secured Methods for Image Transmission using Image Seg...
 
Techniques of lattice based
Techniques of lattice basedTechniques of lattice based
Techniques of lattice based
 
4.content (stenography)
4.content (stenography)4.content (stenography)
4.content (stenography)
 
final_Paper_springer_final
final_Paper_springer_finalfinal_Paper_springer_final
final_Paper_springer_final
 

Image Encryption Algorithm Analysis and Comparison

  • 1.
  • 2. Agenda  Encryption Introductory Concepts  Encryption Algorithms  Evolutionary Algorithms  Chaos Theory  Swarm Intelligence/Particle Swarm Model 1. Analysis and Comparison of Image Encryption Algorithms 2. From Chaos to Cryptography 3. From Chaotic Maps to Encryption Schemes 4. Survey - Image Encryption using Chaotic Cryptography Schemes 5. New Encryption Schema Based on Swarm Intelligence Chaotic Map 2
  • 3. Encryption Introductory Concepts  Encryption is the process of transforming information using an algorithm to make it unreadable to anyone except those possessing special knowledge  Encryption has long been used by militaries and governments to facilitate secret communication  Encryption is now commonly used for protecting information within many kinds of civilian systems  Files on computers and storage devices  Data being transferred via networks e.g. Internet, mobile telephones, wireless microphones, wireless intercom systems, Bluetooth devices and bank automatic teller machines  The harder part in encryption is to ensure that people who are supposed to decipher the encrypted message can do so with ease, yet only those authorized are able to decipher it 3
  • 4. Encryption Algorithms (1/2)  Encryption Algorithm is some mathematical operations to conduct substitutions and transformations to the information to convert it to the encrypted form  Encryption Algorithm main purpose is to provide:  Authentication: Provding one's identity before granting access  Privacy and Confidentiality: Ensuring that outsiders can’t read data intended for specific parties  Integrity: Ensuring that the message has not been modified in any way before it arrives to the intended recipient  Non-Repudiation: Ensuring that the message is truly originated from the sender  Generally encryption algorithm consists of:  Plaintext: The text message to which an algorithm is applied  Encryption Algorithm: Mathematical operations to conduct substitutions and transformations to the plaintext  Secret Key(s): An input to the algorithm that dictates the encrypted outcome  Ciphertext: The encrypted or scrambled message produced by applying the algorithm to the plaintext message using the secret key  Decryption Algorithm: The encryption algorithm in reverse, it uses the ciphertext and the secret key to derive the plaintext message 4
  • 5. Encryption Algorithms (2/2)  Symmetric Algorithms (Conventional, Private Key and Single Key Encryption)  Enquire all communicating parties to share a common key  Use single key to encrypt and decrypt data  Work fast and are well suited for encrypting blocks of messages at once  It is essential that the sender and the receiver have a way to exchange secret key in a secure manner  Asymmetric Algorithms (Public Key Encryption)  Each sender and recipient has a private key  There’s a public key, which can be known by anyone  Each encryption/decryption process requires at least one public key and one private key  Asymmetric Algorithms tend to be slower than their symmetric counterparts  They aren't recommended for encrypting large amounts of data 5
  • 6. Evolutionary Algorithms (1/2)  Artificial Intelligence “The study and design of intelligent agents”, it’s the intelligence of machines, where an intelligent agent is a system that perceives its environment and takes actions that maximize its chances of success  Population is a set of organisms in which any pair of members can breed together, this implies that all members belong to the same species and live near each other  Evolutionary Computation is a subfield of artificial intelligence, it uses iterative progress in a population such as growth or development, this population is then selected in a guided random search using parallel processing to achieve the desired objective  Candidate Solution is a member of a set of possible solutions to a given problem, a candidate solution does not have to be a likely or reasonable solution to the problem, it is simply the set that satisfies all constraints 6
  • 7. Evolutionary Algorithms (2/2)  Metaheuristic designates a computational method that optimizes a problem by iteratively trying to improve a candidate solution with regard to a given measure of quality  Fitness Function is a function that prescribes the optimality of a solution so that any solution may be ranked against all the other solutions  Evolutionary Algorithms (EAs)  EAs subsets of evolutionary computation, a generic population based metaheuristic optimization algorithms  EAs use some mechanisms inspired by biological evolution such as reproduction, mutation, recombination and selection  Candidate solutions to the optimization problem play the role of individuals in a population  EAs often perform well approximating to all types of problems because they ideally do not take any assumptions about the underlying fitness landscape  EAs show successes in fields as diverse as engineering, art, biology, economics, physics, marketing, genetics, operations research, robotics, social sciences, politics and chemistry  Some of the most widely used EAs techniques are Genetic Algorithms, Particle Swarm Optimization techniques 7
  • 8. Chaos Theory  Dynamical System is a concept in mathematics where a fixed rule describes the time dependence of a point in a geometrical space e.g. mathematical models describing the swinging of a clock pendulum and the flow of water in a pipe  Chaos Theory  Field of study in applied mathematics, with applications in several disciplines including physics, economics, biology, and philosophy  It studies the behavior of dynamical systems that are highly sensitive to initial conditions  Small differences in initial conditions (such as those due to rounding errors in numerical computation) yield widely diverging outcomes  These systems are deterministic, meaning that their future behavior is fully determined by their initial conditions  Chaotic behavior can be observed in many natural systems, such as the weather  Chaos-Based encryption technology has been studied for decades and it has become an important branch of cryptography  Attractiveness points of using chaos as the basis for developing cryptosystem are:  Sensitivity to initial conditions  The iterative values generated are completely random in nature, although limited between bounds 8
  • 9. Swarm Intelligence/Particle Swarm Model  A completely different approach to chaotic-based encryption based on artificial intelligence has been proposed recently  Swarm Intelligence  Design framework based on social insects behavior  Social insects such as ants, bees, and wasps are unique in the way these simple individuals cooperate to accomplish complex, difficult tasks  This cooperation is distributed among the entire population  Particle Swarm Model  Consists of swarm of particles moving iteratively through the m-dimension problem space to search the new solutions (positions)  Each particle adjusts its position according to its own experience and according to the experience of its neighbors, making use of the best position encountered by itself and its neighbors  A certain quality measure “Fitness Function” f is defined making it possible for particles to compare different problem solutions 9
  • 10. 1. Analysis and Comparison of Image Encryption Algorithms  In this paper, we analyzed current image encryption algorithms and compression is added for two of them (Mirror-like image encryption and Visual Cryptography)  A study of image compression is becoming more important since an uncompressed image requires a large amount of storage space and high transmission bandwidth  Although we may use the traditional cryptosystems to encrypt images directly, it is not a good idea for two reasons  One is that the image size is almost always much greater than that of text therefore, the traditional cryptosystems need much time to directly encrypt the image data  The other problem is that the decrypted text must be equal to the original text, however, this requirement is not necessary for image data  Image Encryption Algorithms 10
  • 11. 1. Analysis and Comparison of Image Encryption Algorithms  A Technique for Image Encryption using Digital Signatures  The digital signature of the original image is added to the encoded version of the original image. Image encoding is done by using an appropriate error control code, such as a Bose-Chaudhuri Hochquenghem (BCH) code  At the receiver end, after the decryption of the image, the digital signature can be used to verify the authenticity of the image  Lossless Image Compression and Encryption Using SCAN  The compression and encryption schemes are based on SCAN patterns generated by the SCAN methodology  The SCAN is a formal language-based two-dimensional spatial-accessing methodology which can efficiently specify and generate a wide range of scanning paths or space filling curves  A New Encryption Algorithm for Image Cryptosystems  The images are first decomposed into vectors and then sequentially encoded vector by vector  Then traditional cryptosystems from commercial applications can be used 11
  • 12. 1. Analysis and Comparison of Image Encryption Algorithms  A New Mirror-Like Image Encryption Algorithm and Its VLSI Architecture  Based on a binary sequence generated from a chaotic system, an image is scrambled according to the algorithm  Rearranging image pixels using swap function according to the binary sequence  Color Image Encryption Using Double Random Phase Encoding  New method to encrypt color images using existing optical encryption systems for gray- scale images  The color images are converted to their indexed image formats before they are encoded  In the encoding subsystem, image is encoded to stationary white noise with two random phase masks, one in the input plane and the other in the Fourier plane  At the decryption end, the color images are recovered by converting the decrypted indexed images back to their RGB (Red-Green-Blue) formats  Visual Cryptography for Color Images
  • 13. 1. Analysis and Comparison of Image Encryption Algorithms  Comparison of Current Algorithms  Adding compression to MIE and VC algorithms 13
  • 14. 1. Analysis and Comparison of Image Encryption Algorithms  Compression is more important issue for visual cryptography because it produces 2 or more sharing images which are twice in size of dimensions of the original image  JPEG (Joint Photographic Experts Group) is a standard compression algorithm used to reduce memory requirement for the storage of digital images  The JPEG standard allows to specify the desired quality of the encoded image by varying a quality factor between 0 (lowest quality) and 100 (best quality)  PNG is an extensible file format for the lossless, portable, well-compressed storage of raster images  While the jpeg compression has losses in the compressed image, in PNG compression there is neither a change of colors nor a reduction of color depth  Mean square error (MSE) is the cumulative squared error between original and recovered image  Lower value of MSE means lesser error 14
  • 15. 1. Analysis and Comparison of Image Encryption Algorithms  EXPERIMENTAL RESULTS 15
  • 16. 1. Analysis and Comparison of Image Encryption Algorithms  As we can see from the experimental results jpeg with quality parameter set to 100 does not compress grayscale image, besides size of the grayscale image increases, because noise in the image can not be compressed productively  Quality setting set to 90 or below reaches good compression ratios  However jpeg is not suitable for color images (even with quality set to 100) because of the loss in the color  Lossless PNG compression with VC for gray-level and color images has a big compression ratio because it has only one color plane to encrypt and saves storage space and network bandwidth up to 92,4% 16
  • 17. 2. From Chaos to Cryptography 17
  • 18. 2. From Chaos to Cryptography 18
  • 19. 2. From Chaos to Cryptography 19
  • 20. 2. From Chaos to Cryptography 20
  • 21. 2. From Chaos to Cryptography 21
  • 22. 2. From Chaos to Cryptography 22
  • 23. 2. From Chaos to Cryptography 23
  • 24. 2. From Chaos to Cryptography 24
  • 25. 2. From Chaos to Cryptography 25
  • 26. 2. From Chaos to Cryptography 26
  • 27. 3. From Chaotic Maps to Encryption Schemes  Many fundamental concepts in chaos theory such as:  Mixing  Measure Preserving Transformations  Sensitivity to changes in initial conditions and parameters have been already applied for a long time in cryptography  Encryption algorithms are usually written in form of transformations: where plaintext X, cryptogram Y and secret key Z are sequences of letters in finite alphabets L x , L y , L z ,respectively, which are not necessarily equal to each other  A very common approach to creating diffusion and confusion is to use a product cipher, a cipher that is implemented as a composition of simple ciphers  Most commonly, product ciphers employ both permutation and substitution ciphers as their component ciphers 27
  • 28. 3. From Chaotic Maps to Encryption Schemes  Deterministic chaotic discrete time dynamical systems  k in Encryption Algorithm case was the key  Considering maps which possess only unstable periodic orbits and chaotic trajectories  Two general principles which guide the design of practical ciphers are  Diffusion ○ Diffusion means spreading out of the influence of a single plaintext digit over many ciphertext digits so as to hide the statistical structure of the plaintext  Confusion ○ Confusion means use of transformations which complicate dependence of the statistics of ciphertext on the statistics of plaintext 28
  • 29. 3. From Chaotic Maps to Encryption Schemes  Such maps usually have mixing property: any set of initial conditions of nonzero measure will eventually spread over the whole phase space as the system evolves  We also assume that mixing property holds for a large set of parameters  Most ciphers achieve the mixing property by means of round repetition  Same logic applies when a chaotic map serves as a cipher’s basis, mixing property of the chaotic map is not sufficient  Mixing property of chaotic maps is closely related to property of diffusion in encryption transformations (algorithms)  The keys of an encryption algorithm represent its parameters  Kind of “mixing property” should hold also in the parameter space of the map, if we would like to use chaotic maps as encryption algorithm  We should look for maps that have only chaotic trajectories in a large parameter region 29
  • 30. 3. From Chaotic Maps to Encryption Schemes  Mixing maps are good candidates for encryption algorithms because both diffusion and confusion are their immanent properties  Every encryption algorithm possesses properties of confusion, diffusion, mixing and sensitivity to changes in plaintext and secret key  This almost guarantees that an extension of the domain of an encryption algorithm from a N-dimensional lattice to a N-dimensional continuum will give rise to a chaotic map  Therefore, sensitivity to changes in initial conditions and parameters, and mixing property of a chaotic map do not guarantee that its discrete version is a good crypto-algorithm  The notion of cryptographic security has no counterpart in chaos theory, and the cryptographic security of a chaos-derived encryption algorithm can be checked up only by means of crypto-tools  Still, the area of cryptanalysis provides us with certain cryptanalytic tools and attacks against which any encryption algorithm must be resistant 30
  • 31. 4. Survey - Image Encryption using Chaotic Cryptography Schemes  This paper contributes by comparing and analyzing the performance of the past chaotic image encryption schemes  Properties of chaos including deterministic dynamics, unpredictable behavior and non-linear transform 31
  • 32. 5. New Encryption Schema Based on Swarm Intelligence Chaotic Map  A new Swarm Intelligence Chaotic Map (SICM) is proposed to construct a robust encryption algorithm  The proposed scheme is described in details, along with the analysis of the possibility to be used in image cryptography field  Visual and computational experimental results are presented to demonstrate the encryption quality of the proposed schema 32
  • 33. 5. New Encryption Schema Based on Swarm Intelligence Chaotic Map  At each time step t the velocity is updated and the particle is moved to a new position  This new position is simply calculated as the sum of the previous position and the new velocity  The update of the velocity from the previous velocity to the new velocity is determined by:  For a single individual particle swarm the system is completely defined by  The objective is to find pair of values (c, t) so that M = I (where I is the identity matrix) with long period t  It means in particular that if we generate a sequence of points in this simplified particle swarm model by using c values between 0 and 4, we will obtain a pure random sequence 33
  • 34. 5. New Encryption Schema Based on Swarm Intelligence Chaotic Map  Most of the existing Chaos-Based encryption systems are built upon m-dimensional mapping functions called Chaotic Maps  The procedure of the proposed SICM cryptographic algorithm for encryption and decryption processes is all about:  Obtaining a chaotic key  This key is used for chaotic mixing of: ○ Image colors ○ Pixel position permutation 34
  • 36. Paper Algorithm – PSO + Logistic Map 36 PSO Vo Logistic Map K(w,h,3) Calculation Yo cXo Yt Vt R,G,B Substitution Position Permutation Cipher
  • 37. 3 Particles PSO + Logistic Map 37 PSO - RED Vo Logistic Map K(w,h,3) Calculation Yo Yt Vt R,G,B Substitution Position Permutation Cipher PSO - GREEN Vo Yo Yt Vt PSO - BLUE Vo Yo Yt Vt Xo C
  • 38. 5. New Encryption Schema Based on Swarm Intelligence Chaotic Map  Step 1 Generate Binary 192 bit secret Key  The secret key is divided into six blocks KI (I=1: 6) of 32-bit each  K00, K12, K34 and K56 are divided into 16 blocks kjk (j=1:4, k=1:4) of 8-bit each  The initial values for logistic map and each dimension of SICM are calculated  Step 2 Encryption (Masking Step)  Initialize Logistic Map by x0  Initialize SICM by (v0[1], v0[2], y0[1], y0[2])  Get next value of Logistic Map to be the parameter (c) of SICM  For Each Pixel pi (i=1 to Block Height X Block Width)  Iterate SICM to get ith outputs vi[1], vi[2], yi[1],and yi[2]  Convert these outputs to the equivalent binary form of 32 bit length 38
  • 39. 5. New Encryption Schema Based on Swarm Intelligence Chaotic Map  Map the binary version of SICM output  Divide K1, K2 and K3 into 12 blocks kjk (j=1:3, k=1:4) of 8-bit each and Calculate encryption Keys for R, G and B channels  Encrypt/Decrypt the ith plain pixel  Step 2 Encryption (Permutation)  Fill the xpermutation vector by vi[1] and the ypermutation vector by vi[2]  Arrange xpermutation and ypermutation vectors from large to small values  Permutate whole Image by xpermutation and ypermutation indexes 39
  • 40. 5. New Encryption Schema Based on Swarm Intelligence Chaotic Map  Detailed security analysis of the proposed image encryption scheme is presented  Key Space Analysis: Key space size is 2^192, which is large enough to resist all kinds of brute-force attacks with the current computing technology  Statistical Analysis: Below histograms of R, G, and B channels confirms that ciphered image looks completely random 40
  • 41. 5. New Encryption Schema Based on Swarm Intelligence Chaotic Map  Correlation Coefficient Analysis: The correlation coefficient of the adjacent pixels in original Lena image is very high, and the correlation coefficient in ciphered image processed is very low, close to 0 41
  • 42. 5. New Encryption Schema Based on Swarm Intelligence Chaotic Map  Key Sensitivity Analysis: Ideally a single bit of difference between encrypting and decrypting key should make it unable to decrypt ciphered image 42
  • 43. 5. New Encryption Schema Based on Swarm Intelligence Chaotic Map  The possibility of using simplified model of swarm intelligence as a chaotic map is proposed  The SICM parameter is controlled throw another logistic map to make the proposed schema more robust  The presented schema is applied in image encryption  Experimental results demonstrated that the proposed schema has enough key space to resist all kinds of brute-force attacks  The encryption image has good statistical properties shown in histogram and two adjacent pixel correlation analysis  Although the proposed encryption schema presented in this paper focuses on image encryption field, it can be used for secure transmission of various information forms 43