Image Encryption Based on Parallel Algorithm via Zigzag Manner with a New Chaotic System

Khalid Ali Hussein, Sadiq A. Mehdi, Salam Ayad Hussein

Abstract

Information safety has become a vital issue and data encryption and decryption have lately been vastly researched and developed. There is a need for a powerful encryption and decryption which is very tough to crack, so cryptography plays a major role to fulfill these demands. Moreover, parallel algorithm is rapidly becoming cost and resource-efficient as a result of a unified approach to solve computer problems and wide-ranging problems encountered in applied sciences and engineering applications. In this paper, a parallel environment has been utilized to construct a new encryption system, based on involving the so-called 'zig-zag' ordering that is used in JPEG data compression. A new chaotic system of three dimensions will be produced to eliminate the common encryption systems problems.

 

Keywords: Cryptography, Parallel Computing, Zig-Zag Ordering, Chaos System, Encryption Image.

 

DOI:https://doi.org/10.35741/issn.0258-2724.54.4.29

 

 


Full Text:

PDF


References


BROER, H. and TAKENS, F. (2010) Dynamical Systems and Chaos. Springer, New York.

MEHDI, S.A. and QASIM, H.A. (2017) Analysis of a New Hyper Chaotic System with six cross-product nonlinearities terms. American Journal of Engineering Research, 6(5), pp. 248-252.

LU, J., CHEN, G., YU, X.H., and LEUNG, H. (2004) Design and analysis of multi-scroll chaotic attractors from saturated function series. IEEE Transactions on Circuits and Systems I: Regular Papers, 51(12), pp. 2476-2490.

MEHDI, S.A. and KAREEM, R.S. (2017) Using Fourth-Order Runge-Kutta Method to Solve Lü Chaotic System. American Journal of Engineering Research, 6(1), pp. 72-77.

WANG, X., LI, J., and FANG, J. (2011) Si’lnikov chaos of a 3-D quadratic autonomous system with a four-wing chaotic attractor. Proceedings of the 30th Chinese Control Conference, pp. 22-24.

HATTAB, A.A. and MEHDI, S.A. (2018) A Novel Steganography Method Based on 4 Dominations Standard Chaotic Map in Spatial Domain. Journal of Theoretical and Applied Information Technology, 96(16), pp. 5280-5290.

SUNEEL, M. (2009) Cryptographic Pseudo-Random Sequences from the Chaotic Henon Map. Sadhana, 34(5), pp. 689–701.

GUAN, Z.H., HUANG, F., and GUAN, W. (2005) Chaos Based Image Encryption Algorithm. Physics Letters A, 346, pp. 153– 157.

PARHAMI, B. (2002) Introduction to Parallel Processing. Algorithms and Architectures. Kluwer Academic Publishers.

GRAMA, A., GUPTA, A., KARYPIS, G., and KUMAR, V. (2003) Introduction to Parallel Computing. 2nd Edition, Addison Wesley.

SCOTT, L.R., CLARK, T.W., and BAGHERI, B. (2005) Scientific Parallel Computing. Princeton University Press, Princeton.

REINGOLD, O., VADHAN, S., and WIGDERSON, A. (2002) Entropy Waves, the Zig-Zag Graph Product, and New Constant-Degree Expanders. Annals of Mathematics, 155(1), pp. 157-187.


Refbacks

  • There are currently no refbacks.