Open Access

Efficient Image Cipher Based on Baker Map in the Discrete Cosine Transform


Cite

1. Daemen, J., V. Rijmen. The Design of Rijndael: AES – the Advanced Encryption Standard. Springer Science & Business Media, 2013.Search in Google Scholar

2. Rivest, R. L. The RC5 Encryption Algorithm. – In: Proc. of 2nd International Workshop, Fast Software Encryption, Springer-Verlag, 1995, pp. 86-96.10.1007/3-540-60590-8_7Search in Google Scholar

3. Rivest, R., M. Robshaw, R. Sidney, Y. L. Yin. The RC6 Block Cipher. – In: NIST AES Proposal, 1998.Search in Google Scholar

4. Fridrich, J. Symmetric Ciphers Based on Two-Dimensional Chaotic Maps. – Int. J. Bifurc. Chaos, Vol. 8, 1998, pp. 1259-1284.10.1142/S021812749800098XSearch in Google Scholar

5. Wang, X., L. Teng. An Image Blocks Encryption Algorithm Based on Spatiotemporal Chaos. – Nonlinear Dyn., Vol. 67, 2011, pp. 365-371.10.1007/s11071-011-9984-7Search in Google Scholar

6. Ye, G. D., K. W. Wong. An Efficient Chaotic Image Encryption Algorithm Based on a Generalized Arnold Map. – Nonlinear Dyn., Vol. 69, 2012, pp. 2079-2087.10.1007/s11071-012-0409-zSearch in Google Scholar

7. Tong, Z. Novel Bilateral-Diffusion Image Encryption Algorithm with Compound Chaos and LFSR. – J. Imaging Sci., Vol. 60, 2012, pp. 294-304.10.1179/1743131X11Y.0000000042Search in Google Scholar

8. Wang, X., D. Luan. A Novel Image Encryption Algorithm Using Chaos and Reversible Cellular Automata. – Commun. Nonlinear Sci. Numer. Simul., Vol. 18, 2013, pp. 3075-3085.10.1016/j.cnsns.2013.04.008Search in Google Scholar

9. Shannon, C. Communication Theory of Secrecy Systems. – Bell System Technical Journal, Vol. 28, 1949, pp. 656-715.10.1002/j.1538-7305.1949.tb00928.xSearch in Google Scholar

10. Tong, X. Design of an Image Encryption Scheme Based on a Multiple Chaotic Map. – Commun. Nonlinear Sci. Numer. Simul., Vol. 18, 2013, pp. 1725-1733.10.1016/j.cnsns.2012.11.002Search in Google Scholar

11. Tong, X., Z. Wang, M. Zhang. A New Algorithm of the Com-Bination of Image Compression and Encryption Technology Based on Cross Chaotic Map. – Nonlinear Dyn., Vol. 72, 2013, pp. 229-241.10.1007/s11071-012-0707-5Search in Google Scholar

12. Wang, X., K. Guo. A New Image Alternate Encryption Algorithm Based on Chaotic Map. – Nonlinear Dyn., Vol. 76, 2014, pp. 1943-1950.10.1007/s11071-014-1259-7Search in Google Scholar

13. Ye, R., W. Guo. A Chaos-Based Image Encryption Scheme Using Multimodal Skew Tent Maps. – J. Emerg. Trends Comput. Inf. Sci., Vol. 4, 2013, No 10.10.5815/ijcnis.2012.01.05Search in Google Scholar

14. Ye, R., W. Zhou. A Chaos-Based Image Encryption Scheme Using 3D Skew Tent Map and Coupled Map Lattice. – Int. J. Comput. Netw. Inf. Secur., Vol. 4, 2012, No 1, pp. 25-28.10.5815/ijcnis.2012.01.05Search in Google Scholar

15. Kanso, A. Self-Shrinking Chaotic Stream Ciphers. – Commun. Nonlinear Sci. Numer. Simul., Vol. 16, 2011, No 2, pp. 822-836.10.1016/j.cnsns.2010.04.039Search in Google Scholar

16. Akhavan, A., A. Samsudin, A. Akhshani. A Symmetric Image Encryption Scheme Based on Combination of Nonlinear Chaotic Maps. – J. Frankl. Inst., Vol. 348, 2011, No 8, pp. 1797-1813.10.1016/j.jfranklin.2011.05.001Search in Google Scholar

17. Jakimoski, G., L. Kocarev et al. Chaos and Cryptography: Block Encryption Ciphers Based on Chaotic Maps. – IEEE Trans. Circuits Syst. I Fundam. Theory Appl., Vol. 48, 2001, No 2, pp. 163-169.10.1109/81.904880Search in Google Scholar

18. Li, C., G. Luo, K. Qin, C. Li. An Image Encryption Scheme Based on Chaotic Tent Map. – Nonlinear Dyn., Vol. 87, 2017, No 1, pp. 127-133.10.1007/s11071-016-3030-8Search in Google Scholar

19. Pareek, N. K., V. Patidar, K. K. Sud. Image Encryption Using Chaotic Logistic Map. – Image and Vision Computing, Vol. 24, 2006, No 9, pp. 926-934.10.1016/j.imavis.2006.02.021Search in Google Scholar

20. Mondal, B., P. Kumar, S. Singh. A Chaotic Permutation and Diffusion-Based Image Encryption Algorithm for Secure Communications. – Multimedia Tools and Applications, 2018. DOI:10.1007/s11042-018-6214-z.10.1007/s11042-018-6214-zSearch in Google Scholar

21. Luo, Y., J. Yu, W. Lai, L. Liu. A Novel Chaotic Image Encryption Algorithm Based on Improved Baker Map and Logistic Map. – Multimedia Tools and Applications, 2019. DOI:10.1007/s11042-019-7453-3.10.1007/s11042-019-7453-3Search in Google Scholar

22. Cheng, L. Z. On Computing the Two-Dimensional (2-D) Type IV Discrete Cosine Transform (2-D DCT-IV). – IEEE Signal Processing Letters, Vol. 8, 2011, pp. 239-241.10.1109/97.935741Search in Google Scholar

23. Prasad, B., K. Mishra. A Combined Encryption Compression Scheme Using Chaotic Maps. – Cybernetics and Information Technologies, Vol. 13, 2013, No 2, pp. 75-81.10.2478/cait-2013-0016Search in Google Scholar

24. Verma, M., R. Ranim. Significant Secret Image Sharing Scheme Based on Boolean Operation. – Cybernetics and Information Technologies, Vol. 17, 2017, No 2, pp. 134-150.10.1515/cait-2017-0022Search in Google Scholar

25. Brindha, K., N. Jeyanthi. Secret Image Enhanced Sharing Using Visual Cryptography. – Cybernetics and Information Technologies, Vol. 17, 2017, No 3, pp. 128-139.10.1515/cait-2017-0034Search in Google Scholar

26. Borissov, Y., P. Boyvalenkov, R. Tsenkov. On a Linear Cryptanalysis of a Family of Modified DES Ciphers with Even Weight S-Boxes. – Cybernetics and Information Technologies, Vol. 16, 2016, No 4, pp. 3-12.10.1515/cait-2016-0063Search in Google Scholar

27. Brindha, K., N. Jeyanthi. Secured Document Sharing Using Visual Cryptography in Cloud Data Storage. – Cybernetics and Information Technologies, Vol. 15, 2015, No 4, pp. 111-123.10.1515/cait-2015-0058Search in Google Scholar

28. Yang, Z., M. Jia, W. Wang, J. Zhang. Multi-Stage Encoding Scheme for Multiple Audio Objects Using Compressed Sensing. – Cybernetics and Information Technologies, Vol. 15, 2015, No 6, pp. 135-146.10.1515/cait-2015-0074Search in Google Scholar

29. Sastry, V. U. K., N. R. Shankar, S. D. Bhavani. A Large Block Cipher Involving Key Dependent Permutation, Interlacing and Iteration. – Cybernetics and Information Technologies, Vol. 13, 2013, No 3, pp. 50-63.10.2478/cait-2013-0025Search in Google Scholar

30. Priya, R., R. Vidhyapriya, K. Seifedine, D. Robertas, B. Tomas. An Image Encryption Scheme Based on Block Scrambling, Modified Zigzag Transformation and Key Generation Using Enhanced Logistic-Tent Map. – Entropy, Vol. 21, 2019, 656, pp. 1-17.10.3390/e21070656751515233267370Search in Google Scholar

31. Sallam, A. I., M. El-Sayed, El-Rabaie, O. S. Faragallah. CABAC-Based Selective Encryption for HEVC Using RC6 in Different Operation Modes. – Multimedia Tools and Applications, Vol. 77, 2018, No 21, pp. 28395-28416.10.1007/s11042-018-5994-5Search in Google Scholar

32. Faragallah, O. S. Optical Double Color Image Encryption Scheme in the Fresnel-Based Hartley Domain Using Arnold Transform and Chaotic Logistic Adjusted Sine Phase Masks. – Optical and Quantum Electronics, Vol. 50, 2018, No 3:118, pp. 1-27.10.1007/s11082-018-1363-xSearch in Google Scholar

33. Sallam, A. I., M. El-Sayed, El-Rabaie, O. S. Faragallah. HEVC Selective Encryption Using RC6 Block Cipher Technique. – IEEE Transactions on Multimedia, Vol. 20, 2018, No 7, pp. 1636-1644.10.1109/TMM.2017.2777470Search in Google Scholar

34. Faragallah, O. S., M. A. Alzain, H. S. El-Sayed, J. F. Al-Amri, W. El-Shafai, A. Afifi, E. A. Naeem, B. Soh. Block-Based Optical Color Image Encryption Based on Double Random Phase Encoding. – IEEE Access, Vol. 7, 2018, pp. 4184-4194.10.1109/ACCESS.2018.2879857Search in Google Scholar

35. Hemdan, A. M., O. S. Faragallah, O. Elshakankiry, A. Elmhalaway. A Fast Hybrid Image Cryptosystem Based on Random Generator and Modified Logistic Map. – Multimedia Tools and Applications, Vol. 78, 2019, No 12, pp. 16177-16193.10.1007/s11042-018-6948-7Search in Google Scholar

eISSN:
1314-4081
Language:
English
Publication timeframe:
4 times per year
Journal Subjects:
Computer Sciences, Information Technology