With the advancements of mobile communication technologies, the utilization of audio-visual information in addition to textual information becomes more prevalent than the past. Cryptographic approaches are therefore necessary for secure multimedia content storage and distribution over open networks such as the Internet. A traditional way to resist statistical and differential cryptanalyses is to employ permutation and diffusion alternatively. Recently, research on image encryption using chaos theory has been emerged. Some chaotic image encryption schemes use a multi-dimensional chaotic map for pixel permutation in the spatial domain while taking another one-dimensional (1D) chaotic map for keystream generation in the diffusion function. Various image encryption schemes under this architecture have been proposed in the literature. There are still two realization constraints of the above architecture which hinder the system performance. First, the confusion and diffusion effect is solely contributed by the permutation and the diffusion stage, respectively. Consequently, more overall rounds than necessary are required to achieve a certain level of security. Second, in particular to diffusion stage, real-valued chaotic sequence is commonly treated as a pseudo-random keystream. However, a considerable amount of computation load is sacrificed for real-valued computation and consequent integer quantization…
Contents
Chapter 1 Introduction
1.1 Motivation and Objective
1.2 Outline of the Thesis
Chapter 2 Fundamentals of Cryptography
2.1 Background
2.2 Private-key Cryptography
2.2.1 The Encryption Process
2.2.2 Typical Private-key Cryptosystems
2.2.3 Brief Review on Some Existing Image Encryption Schemes
2.3 Public-key Cryptography
2.3.1 Principle of Public-key Encryption
2.3.2 Typical Public-key Cryptosystems
2.4 Summary
Chapter 3 Chaotic Cryptography
3.1 Introduction to Chaotic Maps
3.1.1 One-dimensional Chaotic Maps
3.1.2 Two-dimensional Chaotic Maps
3.2 The Important Properties of Chaotic Maps
3.2.1 Sensitive Dependence on Initial Conditions
3.2.2 Sensitive Dependence on System Parameters
3.2.3 Ergodicity
3.3 Relationship between Cryptosystems and Chaotic Systems
3.4 Chaotic Encryption Schemes for Digital Images
3.4.1 Review of Some Existing Chaotic Image Encryption Schemes
3.4.2 Architecture of Generic Chaos-based Image Cryptosystems
3.4.3 Other Issues in Chaos-based Image Cryptosystems
3.4.4 Cryptanalysis of Chaos-based Image Cryptosystems
3.5 Summary
Chapter 4 Chaotic Confusion Process for Image Encryption
4.1 Overview of an Image Encryption Scheme Using 2D Standard Map
4.2 Some Observations
4.3 Modified Confusion Process with Pixel Value Mixing
4.3.1 Investigation of Some Possible Operations on Pixel Value
4.3.2 Encryption Procedure
4.3.3 Decryption Procedure
4.3.4 Hardware Implementation
4.4 Security Analysis
4.4.1 Histogram
4.4.2 Key Space
4.4.3 Differential Analysis with Time Performance
4.4.4 Correlation Analysis of Two Adjacent Pixels
4.5 Summary
Chapter 5 Efficient Image Diffusion Using Table Operations
5.1 Diffusion Algorithms Based on 1D Logistic map
5.1.1 Diffusion Techniques Based on “XOR plus mod” Operations
5.1.2 Diffusion Techniques Based on XOR with Substitutions
5.2 Practical Problems of the Algorithms
5.3 The Proposed Cryptosystem
5.3.1 Diffusion Based on Table Lookup and Entries Swapping
5.3.2 The Overall Encryption Procedure
5.3.3 Hardware Implementation
5.4 Experimental Results and Analysis
5.4.1 Diffusion Key Analysis
5.4.2 Correlation Analysis of Two Adjacent Pixels
5.4.3 NPCR & UACI Analyses
5.5 Summary
Chapter 6 Conclusion and Further Developments
6.1 Conclusion
6.2 Further Developments
6.2.1 Joint Compression-encryption Approach to Reduce Cipher Image Size
6.2.2 Extension to Chaos-based Video Encryption
6.2.3 Incorporation of Public-key with Private-key Schemes
References
List of Publications
Author: Kwok, Sin Hung
Source: City University of Hong Kong
Download URL 2: Visit Now
please I need the full report of EFFICIENT CHAOTIC IMAGE ENCRYPTION SCHEMES PROJECT