ISSN 2278-9723
 

Technical Note 


A chaos based image encryption algorithm using Shimizu- Morioka system

Yakubu H. J., Aboiyar T..

Abstract
Recent research on image encryption schemes has focused on chaotic systems in order to meet the demand for real-time secure image
transmission over the Internet. In this paper, we propose a new image encryption scheme based on Shimizu-Morioka chaotic system.
The scheme consists of two stages: the confusion (mixing) stage and the diffusion stage. In the confusion stage, we utilized the rich chaotic
properties of the Shimizu-Morioka chaotic system by solving the system N timeís steps using Eulerís method and scrambled the
positions of the pixel values of the image using the randomness of the solutions obtained from the chaotic system. In the diffusion stage,
we generate N (where N is the size of image per colour) random integer numbers that is non-periodic and performed MOD and bitXOR
operations on the shuffled image using the random numbers to obtain encrypted (diffused) image. The proposed algorithm is tested on a
standard RGB image that is of size 256x256 and is stored with TIFF file format. Performance analysis on the proposed scheme such as
the statistical analysis and the sensitivity analysis show that the proposed encryption scheme is reliable and strong enough to withstand
different attacks.

Key words: Chaos: Cryptosystem: Equilibrium Point: Image Encryption: Shimizu-Morioka System.


 
ARTICLE TOOLS
Abstract
PDF Fulltext
How to cite this articleHow to cite this article
Citation Tools
Related Records
 Articles by Yakubu H. J.
Articles by Aboiyar T.
on Google
on Google Scholar
Article Statistics
 Viewed: 2302
Downloaded: 248


How to Cite this Article
Pubmed Style

J. YH, T. A. A chaos based image encryption algorithm using Shimizu- Morioka system. . 2018; 6(1): 7-11. doi:10.31838/ijccts/06.01.02


Web Style

J. YH, T. A. A chaos based image encryption algorithm using Shimizu- Morioka system. http://www.ijccts.org/?mno=302643577 [Access: January 27, 2020]. doi:10.31838/ijccts/06.01.02


AMA (American Medical Association) Style

J. YH, T. A. A chaos based image encryption algorithm using Shimizu- Morioka system. . 2018; 6(1): 7-11. doi:10.31838/ijccts/06.01.02



Vancouver/ICMJE Style

J. YH, T. A. A chaos based image encryption algorithm using Shimizu- Morioka system. . (2018), [cited January 27, 2020]; 6(1): 7-11. doi:10.31838/ijccts/06.01.02



Harvard Style

J., Y. H. & T., . A. (2018) A chaos based image encryption algorithm using Shimizu- Morioka system. , 6 (1), 7-11. doi:10.31838/ijccts/06.01.02



Turabian Style

J., Yakubu H., and Aboiyar T.. 2018. A chaos based image encryption algorithm using Shimizu- Morioka system. International Journal of Communication and Computer Technologies, 6 (1), 7-11. doi:10.31838/ijccts/06.01.02



Chicago Style

J., Yakubu H., and Aboiyar T.. "A chaos based image encryption algorithm using Shimizu- Morioka system." International Journal of Communication and Computer Technologies 6 (2018), 7-11. doi:10.31838/ijccts/06.01.02



MLA (The Modern Language Association) Style

J., Yakubu H., and Aboiyar T.. "A chaos based image encryption algorithm using Shimizu- Morioka system." International Journal of Communication and Computer Technologies 6.1 (2018), 7-11. Print. doi:10.31838/ijccts/06.01.02



APA (American Psychological Association) Style

J., Y. H. & T., . A. (2018) A chaos based image encryption algorithm using Shimizu- Morioka system. International Journal of Communication and Computer Technologies, 6 (1), 7-11. doi:10.31838/ijccts/06.01.02





Most Viewed Articles
  • DESIGN OF AUTOMATIC NUMBER PLATE RECOGNITION SYSTEM FOR MOVING VEHICLE
    A. ANCI MANON MARY, M. BHUVANESWARI, N. HARITHA, V. KRISHNAVENI, B. PUNITHAVATHISIVATHANU
    . 2019; 7(Supplement 1): 1-5
    » Abstract » doi: 10.31838/ijccts/07.SP01.01

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • IMPROVEMENT OF POWER QUALITY USING PQ THEORY BASED SERIES HYBRID ACTIVE POWER FILTER
    Dr.K.Sundararaju, Preetha Sukumar
    . 2016; 4(1): 7-11
    » Abstract » doi: 10.31838/ijccts/04.01.10

  • CONTROL ANALYSIS OF STATCOM UNDER POWER SYSTEM FAULTS
    Dr.K.Sundararaju, T.Rajesh
    . 2016; 4(1): 1-6
    » Abstract » doi: 10.31838/ijccts/04.01.09

  • Digital Signature Manager
    K. Gopalakrishnan R. Lakshmanan V. Naveen S. TamilKumaran and S. Venkatesh
    . 2017; 5(2): 53-57
    » Abstract » doi: 10.31838/ijccts/05.02.04

  • Automatic Robotic ARM using Hand Gestures
    R. Balamurugan AP/ECE, K. Ramakrishnan College of Engineering N.R. Nagarajan, AP/ECE, K. Ramakrishnan College of Engineering Trichy
    . 2017; 5(2): 43-45
    » Abstract » doi: 10.31838/ijccts/05.02.01

  • PADDY LEAF DISEASE DETECTION USING SVM CLASSIFIER
    S.Pavithra, A.Priyadharshini, V.Praveena and T.Monika Electronics & Communication Engineering, VSB Engineering College, Karur
    . 2015; 3(1): 16-20
    » Abstract » doi: 10.31838/ijccts/03.01.04

  • A NEW APPROACH TO SECURE DATA AGGREGATION IN WIRELESS SENSOR NETWORKS
    V.Bindu and Dr.P.Senguttuvan Research Scholar V.M.K.V.Engineering College, Salem. Dean of Electronics Sciences & Vice Principal, V.M.K.V.Engineering College,Salem
    . 2015; 3(1): 01-04
    » Abstract » doi: 10.31838/ijccts/03.01.01

  • Most Downloaded
  • A Research Study On Packet Forwarding Attacks In Mobile Ad-Hoc Networks
    Bhaskar Kumawat, Dev Kumar
    . 2012; 1(1): 34-38
    » Abstract » doi: 10.31838/ijccts/01.01.05

  • A Survey of Rendezvous planning Algorithms for Wireless Sensor Networks
    V.Senthilkumar K.Prashanth
    . 2016; 4(1): 29-34
    » Abstract » doi: 10.31838/ijccts/04.01.05

  • An improved RSA image encryption algorithm using 1-D logistic map
    Yakubu H. J., Aboiyar T., Zirra P. B.
    . 2018; 6(1): 1-6
    » Abstract » doi: 10.31838/ijccts/06.01.01

  • A chaos based image encryption algorithm using Shimizu- Morioka system
    Yakubu H. J., Aboiyar T.
    . 2018; 6(1): 7-11
    » Abstract » doi: 10.31838/ijccts/06.01.02

  • Integrated platform and response system For healthcare using Alexa
    V. Sakthive, Mr. P.V.Kesaven, J.Martin William, S.K.Madan Kumar
    . 2019; 7(1): 14-22
    » Abstract » doi: 10.31838/ijccts/07.01.04

  • Design and implementation of modeling and tuning of first or-der process with dead time using PID controller
    Yuvaraj.D, Saravanakumar.G, Prasath. J.S, Sathish Kumar.S
    . 2019; 7(1): 1-6
    » Abstract » doi: 10.31838/ijccts/07.01.01

  • Proximity Coupled Microstrip Antenna for Bluetooth, WIMAX and WLAN Applications
    S. Rohini, M. Sharanya, 3A. Vidhya, 4S. Viji and 5P. Poornima
    . 2017; 5(2): 48-52
    » Abstract » doi: 10.31838/ijccts/05.02.03

  • 6-bit, 180nm Digital to Analog Converter (DAC) Using Tanner EDA Tool for Low Power Applications
    S.Surender K.Venkatachalam and V.Gowrishankar
    . 2017; 5(2): 82-88
    » Abstract » doi: 10.31838/ijccts/05.02.08

  • Survey of load balancing routing protocols in MANET
    V.Kalaiyarasi, Dr.M.Tamilarasi PG student, Asst.Prof, Department of Computer Science Engineering , K.S.R.College of Engineering
    . 2015; 3(2): 58-62
    » Abstract » doi: 10.31838/ijccts/03.02.02

  • Design of planar antenna using micro strip feed for biomedical applications
    Ms Keerthana R. Ms Subashini S. Ms Susmita G.and Ms Vinotha V.
    . 2017; 5(2): 76-81
    » Abstract » doi: 10.31838/ijccts/05.02.07

  • Most Cited Articles