Ta Thi Kim Hue, Thang Manh Hoang, Hoang Xuan Thanh, An Braeken
{"title":"Bit Plane Decomposing Image Encryption Based on Discrete Cat-Hadamard map","authors":"Ta Thi Kim Hue, Thang Manh Hoang, Hoang Xuan Thanh, An Braeken","doi":"10.1109/CCE.2018.8465711","DOIUrl":null,"url":null,"abstract":"This paper presents a public key based chaotic cryptosystem for image encryption operating in the integer field. The system is based on the discrete Cat-Hadamard map to encrypt bitmap images based on bit plane decomposing processes. The Chebyshev polynomials are used to determine the parameters of the Cat-Hadamard map. We show that the scheme offers very good resistance against exhaustive attacks, statistical attacks, and differential attacks. In addition, the computational cost of the scheme is limited, leading to a valid candidate for lightweight cryptography.","PeriodicalId":118716,"journal":{"name":"2018 IEEE Seventh International Conference on Communications and Electronics (ICCE)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 IEEE Seventh International Conference on Communications and Electronics (ICCE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCE.2018.8465711","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
This paper presents a public key based chaotic cryptosystem for image encryption operating in the integer field. The system is based on the discrete Cat-Hadamard map to encrypt bitmap images based on bit plane decomposing processes. The Chebyshev polynomials are used to determine the parameters of the Cat-Hadamard map. We show that the scheme offers very good resistance against exhaustive attacks, statistical attacks, and differential attacks. In addition, the computational cost of the scheme is limited, leading to a valid candidate for lightweight cryptography.