Efficient Chaotic Permutations For Image Encryptio
Efficient Chaotic Permutations For Image Encryptio
net/publication/45534483
CITATIONS READS
13 192
2 authors:
All content following this page was uploaded by Hakim Saadane on 15 January 2014.
1
Outlines of presentation
1. Introduction
2. Chaotic maps
3. Chaotic permutation methods
4. Conclusions and perspectives
2
Outlines of presentation
1. Introduction
2. Chaotic maps
3. Chaotic permutation methods
4. Conclusions and perspectives
3
Introduction
Introduction
Eve
Attack
Alice Bob
Transmission Channel
Encryption Decryption
original data Encrypted data Encrypted data Decrypted data
4
Introduction
Encryption chaotic algorithm:
Descriptive Diagram
Chaotic map
Substitution
Clear information
Permutation
SP box
Encryption algorithm
Encrypted information 5
Outlines of presentation
1. Introduction
2. Chaotic maps
Chaotic signal
PWLCM chaotic map
Finite Precision effect
Proposed perturbation technique
3. Chaotic permutation methods
5. Conclusions and perspectives
6
Chaotic maps
Chaotic signal
pwlcm perturbé autocorrelation
1
0.9
0.8
0.8
0.7
0.6
0.6
0.5 0.4
0.4
0.2
0.3
0.2
0
0.1
0 -0.2
0 100 200 300 400 500 600 700 800 900 1000 -8 -6 -4 -2 0 2 4 6 8
4
x 10
x n F [ x n 1]
0.9
0.8
1
if 0 x n 1 p
0.7
x n 1 0.6
p
0.5
1
x n 1 p if p x n 1 0.5 0.4
0.5 p 0.3
F [1 x n 1] if 0.5 x n 1 1
0.2
0.1
0
0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1
• where the positive control parameter p є (0; 0.5) and x(i) є (0; 1).
8
Chaotic maps
x1 x2 xl
xl n
9
Chaotic maps
11
Chaotic permutation methods
Permutation
12
Chaotic permutation methods
13
Chaotic permutation methods
R1: Original a b c d e f g h
bits
0 0 - - - -
m1=2 1 1
e b c h a f g d
m2=1 1
0 - -
1
0 - -
R3: Permuted
c b e h g f a d 14
bits
Chaotic permutation methods
Socek Permutation
R3= Socek (x, R1)
x: chaotic value (control)
Indices of R1 bits
(to permute) 1 2 3 4 5 6 7 8
Permuted 4 6 7 1 3 8 2 5
Indices
15
Chaotic permutation methods
Permutation Results
Original image
16
Chaotic permutation methods
M 1 N 1
1
D(i, j )
if P1 (i, j ) C1 (i, j ) D(i, j)
i 0 j 0
NPCR 100
0 else M N
17
Chaotic permutation methods
M 1 N 1
P1 (i, j ) C1 (i, j )
1
UACI x100
MxN i 0 j 0
255
18
Chaotic permutation methods
250 250
250
200 200
200
150 150
150
50 50 50
0 0 0
0 50 100 150 200 250 300 0 50 100 150 200 250 300 0 50 100 150 200 250 300
300 300
250 250
200 Socek
Socek 200
+
+ 150 150
perturbed
PWLCM 100 100
50 50
map
0
0 50 100 150 200 250 300
0 21
0 50 100 150 200 250 300
Chaotic permutation methods
Histogram analysis
Original image Grp + PWLCM Grp + perturbed map
2000 2000
2000
0 0 0
-50 0 50 100 150 200 250 300 -50 0 50 100 150 200 250 300 -50 0 50 100 150 200 250 300
2000 2000
1800 1800
1600 1600
Socek
Socek 1400 1400
1200
1200
+
+ 1000
1000
800
800
perturbed
PWLCM 600
600
400
400 map
200
200
0 22
0 -50 0 50 100 150 200 250 300
-50 0 50 100 150 200 250 300
Chaotic permutation methods
2 N 1
1
H m p mi log 2
i 0
p mi
23
Outlines of presentation
1. Introduction
2. Chaotic maps
3. Chaotic permutation methods
4. Conclusions and perspectives
24
Conclusions
Novel chaotic permutation technique
26
Thank you
27
View publication stats