Abhilash Ashok Bhadke, Surender Kannaiyan, V. Kamble
{"title":"基于SHA-256的对称混沌图像位平面加密技术","authors":"Abhilash Ashok Bhadke, Surender Kannaiyan, V. Kamble","doi":"10.1109/NCC.2018.8600222","DOIUrl":null,"url":null,"abstract":"With development of communication technology, popularity of internet and various facilities like cloud storage, social media etc., the security of transmitted data has become an area on concern. Majority of the data is in the form of multimedia which can be protected through various encryption techniques. In this paper, we propose an encryption technique for images which is hybrid of Lorentz attractor and Secure Hash Algorithm (SHA-2) applied on separated bit planes of the image. Our research utilize the chaotic nature of the Lorenz attractor and has significantly improved the entropy, which is an important parameter to measure the randomness. We also introduce a new method of implementing chaotic scheme. SHA-2 and Lorentz attractor are used to generate the key matrix. Bit-plane slicing is carried out on the plain image to decompose it to 1- D data and then X-OR operation with the key matrix is performed. The encrypted file is subjected to various analysis and attacks. The results demonstrate that the algorithm is resistant to various known attacks along with desirable security performance. Both encryption and decryption in the proposed algorithm are loss less. The proposed algorithm shows significant increase in Entropy, improved differential attack analysis results, desirable histogram and are comparable with the state of the art algorithms.","PeriodicalId":121544,"journal":{"name":"2018 Twenty Fourth National Conference on Communications (NCC)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"Symmetric Chaos-Based Image Encryption Technique on Image Bit-Planes using SHA-256\",\"authors\":\"Abhilash Ashok Bhadke, Surender Kannaiyan, V. Kamble\",\"doi\":\"10.1109/NCC.2018.8600222\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With development of communication technology, popularity of internet and various facilities like cloud storage, social media etc., the security of transmitted data has become an area on concern. Majority of the data is in the form of multimedia which can be protected through various encryption techniques. In this paper, we propose an encryption technique for images which is hybrid of Lorentz attractor and Secure Hash Algorithm (SHA-2) applied on separated bit planes of the image. Our research utilize the chaotic nature of the Lorenz attractor and has significantly improved the entropy, which is an important parameter to measure the randomness. We also introduce a new method of implementing chaotic scheme. SHA-2 and Lorentz attractor are used to generate the key matrix. Bit-plane slicing is carried out on the plain image to decompose it to 1- D data and then X-OR operation with the key matrix is performed. The encrypted file is subjected to various analysis and attacks. The results demonstrate that the algorithm is resistant to various known attacks along with desirable security performance. Both encryption and decryption in the proposed algorithm are loss less. The proposed algorithm shows significant increase in Entropy, improved differential attack analysis results, desirable histogram and are comparable with the state of the art algorithms.\",\"PeriodicalId\":121544,\"journal\":{\"name\":\"2018 Twenty Fourth National Conference on Communications (NCC)\",\"volume\":\"28 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-02-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 Twenty Fourth National Conference on Communications (NCC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/NCC.2018.8600222\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 Twenty Fourth National Conference on Communications (NCC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NCC.2018.8600222","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Symmetric Chaos-Based Image Encryption Technique on Image Bit-Planes using SHA-256
With development of communication technology, popularity of internet and various facilities like cloud storage, social media etc., the security of transmitted data has become an area on concern. Majority of the data is in the form of multimedia which can be protected through various encryption techniques. In this paper, we propose an encryption technique for images which is hybrid of Lorentz attractor and Secure Hash Algorithm (SHA-2) applied on separated bit planes of the image. Our research utilize the chaotic nature of the Lorenz attractor and has significantly improved the entropy, which is an important parameter to measure the randomness. We also introduce a new method of implementing chaotic scheme. SHA-2 and Lorentz attractor are used to generate the key matrix. Bit-plane slicing is carried out on the plain image to decompose it to 1- D data and then X-OR operation with the key matrix is performed. The encrypted file is subjected to various analysis and attacks. The results demonstrate that the algorithm is resistant to various known attacks along with desirable security performance. Both encryption and decryption in the proposed algorithm are loss less. The proposed algorithm shows significant increase in Entropy, improved differential attack analysis results, desirable histogram and are comparable with the state of the art algorithms.