**Commenced**in January 2007

**Frequency:**Monthly

**Edition:**International

**Paper Count:**30835

##### Real-Time Image Encryption Using a 3D Discrete Dual Chaotic Cipher

**Authors:**
M. F. Haroun,
T. A. Gulliver

**Abstract:**

**Keywords:**
FPGA,
Chaotic systems,
Image Encryption,
non-autonomous modulation

**Digital Object Identifier (DOI):**
doi.org/10.5281/zenodo.1126169

**References:**

[1] G. Álvarez, S. Li, "Some basic cryptographic requirements for chaos-based cryptosystems," Int. J. of Bifurcation and Chaos, 2006;16, pp. 2129–2151.

[2] T. Carroll, L. Pecora, "Synchronizing chaotic circuits," IEEE Trans Circuits Systems I, 1991;38, pp. 453–456.

[3] L. Kocarev, K.S. Halle, K. Eckert, L.O. Chua, U. Parlitz, "Experimental demonstration of secure communications via chaotic synchronization," Int. J. of Bifurcation and Chaos, 1992;2, pp. 709-713.

[4] H. Dedieu, M.P. Kennedy, M. Hasler, "Chaos shift keying: modulation and demodulation of a chaotic carrier using self-synchronizing Chua’s circuits," IEEE Trans Circuits Systems II: Analog Digital Signal Process, 1993;40, pp. 634-642.

[5] T. Yang, L. Chua, "Secure communication via chaotic parameter modulation," IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications, 1996;43, pp. 817-819.

[6] L. Kocarev, U. Parlitz, "General approach for chaotic synchronization with applications to communications," Phys. Rev. Lett., 1995;74, pp. 5028-5031.

[7] M. Sobhy, A. Shehata, "Secure computer communication using chaotic algorithms," Int. J. of Bifurcation and Chaos, 2000;10, pp. 2831-2839.

[8] G. Alvarez, S. Li, F. Montoya, G. Pastor, M. Romera, "Breaking projective chaos synchronization secure communication using filtering and generalized synchronization," Chaos, Solitons and Fractals, 2005;24, pp. 775–783.

[9] T. Yang, L. Yang, C. Yang, "Breaking chaotic switching using generalized synchronization," IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications, 1998;45, pp. 1062–1067.

[10] Y. Zhang, Y. Wang, "A Parameter Modulation Chaotic Secure Communication Scheme with Channel Noises," Chinese Physics Letters, 2011;28, pp. 020505.

[11] S. Li, G. Chen, G. Alvarez, "Return-map cryptanalysis revisited," Int. J. of Bifurcation and Chaos, 2006;16, pp. 1157–1168.

[12] G. Alvarez, F. Montoya, M. Romera, G. Pastor, "Breaking parameter modulated chaotic secure communication system," Chaos, Solitons and Fractals, 2004;21, pp. 783–787.

[13] K. Short, "Unmasking a modulated chaotic communications scheme," Int. J. of Bifurcation and Chaos, 1996;06, pp. 367.

[14] S. Li, G. Álvarez, G. Chen, "Breaking a chaos-based secure communication scheme designed by an improved modulation method," Chaos, Solitons and Fractals, 2005;25, pp. 109–120.

[15] A. Orue, V. Fernandez, G. Alvarez, G. Pastor, M. Romera, S. Li, F. Montoya, "Determination of the parameters for a Lorenz system and application to break the security of two-channel chaotic cryptosystems," Physical Letters A, 2008;372, pp. 5588–5592.

[16] T. Yang, C. Wu, L. Chua, "Cryptography based on chaotic systems," IEEE Transaction on Circuits and Systems—I: fundamental theory and applications, 1997;44, pp. 469-472.

[17] Y. Zhang, Di. Xiao, H. Liu, H. Nan, "GLS coding based security solution to JPEG with the structure of aggregated compression and encryption," Communications in Nonlinear Science and Numerical Simulation, 2013;19, pp. 1366.

[18] Y. Zhang and Y. Wang, "Analysis and improvement of a chaos-based symmetric image encryption scheme using a bit-level permutation," Nonlinear Dynamics, 2014;77, pp. 687-698.

[19] Y. Zhang, Di. Xiao, "An image encryption scheme based on rotation matrix bit-level permutation and block diffusion," Communications in Nonlinear Science and Numerical Simulation, 2014;19, pp. 74.

[20] Y. Zhang, Di. Xiao, "Self-adaptive permutation and combined global diffusion for chaotic color image encryption," International Journal of Electronics and Communications, 2014;68, pp. 361-368.

[21] N. Masuda, K. Aihara, "Dynamical characteristics of discretized chaotic permutations," Int. J. of Bifurcation and Chaos, 2002;12, pp. 2087-2103.

[22] S. LI, G. CHEN, X. MOU, "On the dynamical degradation of digital piecewise linear chaotic maps," Tutorial-Review Section of Int. J. of Bifurcation and Chaos, 2005;15, pp. 119-151.

[23] D. Socek, S. Li, S. Magliveras, B. Furht, "Enhanced 1-D chaotic key-based algorithm for image encryption," In: Proceedings of the first international conference on security and privacy for emerging areas in communications networks (SECURECOMM’05), 2005, pp. 406–407.

[24] H. Gao, Y. Zhang, S. Liang, D. Li, "A new chaotic algorithm for image encryption," Chaos, Solitons & Fractals, 2006;29, pp. 393–9.

[25] N. Pareek, V. Patidar, K. Sud, "Image encryption using chaotic logistic map," Image and Vision Computing, 2006;24, pp. 926–934.

[26] C. Li, S. Li, M. Asim, J. Nunez, G. Alvarez, G. Chen, "On the security defects of an image encryption scheme," Image and Vision Computing, 2009;27, pp. 1371-1381.

[27] C. Li, S. Li, G. Alvarez, G. Chen, K. Lo, "Cryptanalysis of a chaotic block cipher with external key and its improved version," Chaos, Solitons & Fractals, 2008;37, pp. 299–307.

[28] D. Arroyo, R. Rhouma R, G. Alvarez, S. Li, V. Fernandez, "On the security of a new image encryption scheme based on chaotic map lattices," Chaos: An Interdisciplinary Journal of Nonlinear Science, 2008;18, pp. 033112.

[29] M.F. Haroun and T.A. Gulliver, "New Low Complexity Discrete 3D Chaotic Generators for Communication and Security Applications," IET information security Journal, submitted.

[30] T. Yang, L. Yang, C. Yang, "Cryptanalyzing chaotic secure communications using return maps," Physics Letters A, 1998;245, pp. 495-510.

[31] X. Wu, H. Hu, B. Zhang, "Analyzing and improving a chaotic encryption method," Chaos, Solitons and Fractals, 2004;22, pp. 367–373.

[32] A. Orue, G. Alvarez, G. Pastor, M. Romera, F. Montoya, S. Li, "A new parameter determination method for some double-scroll chaotic systems and its applications to chaotic cryptanalysis," Communications in Nonlinear Science and Numerical Simulation, 2010;15, pp. 3471-3483.

[33] T. Stojanovski, L. Kocarev, U. Parlitz, "A simple method to reveal the parameters of the Lorenz system," Int. J. of Bifurcation and Chaos, 1996;6, pp. 2645–2652.

[34] B. Schneier, "Applied cryptography: protocols, algorithms, and source code in C," 2nd ed. Wiley, New York, 1996.

[35] H. Liu, X. Wang, "Color image encryption based on one-time keys and robust chaotic maps," Computers and Mathematics with Applications, 2010;59, pp. 3320–3327.

[36] A. abdel-latif, X. Niu, "A hybrid chaotic system and cyclic elliptic curve for image encryption," Int. J. Electronics and Commun., 2013;67, pp. 136–143.

[37] V. Patidar, N. Pareek, G. Purohit, K. Sud, "A robust and secure Chaotic Standard Map-Based Pseudorandom Permutation-substitution Scheme for Image Encryption," optics communications, 2011;284, pp. 4331–4339.

[38] S. Sayedzadeh, S. Mirzakuchaki, "A fast color image encryption algorithm based on Coupled two dimensional Piecewise chaotic map," Signal Processing, 2012;92, pp. 1202–1215.

[39] G. Chen, Y. Mao, C. Chui, "A symmetric image encryption scheme based on 3D chaotic cat maps," Chaos, Solitons and Fractals, 2004;21, pp. 749–761.

[40] A. Kanso, M. Ghebleh, "A novel image encryption algorithm based on a 3D chaotic map," Comm. Nonlinear sci. Numer simulate, 2012;17, pp. 2943-2959.