Loading

Securing Digital Image using Chaotic-Based Cryptosystem
Zinabu Haile Abirha1, Eyerusalem Dagnew Gebru2

1Zinabu Haile Abirha*, Faculty of Computing Technology, Aksum Institute of Technology, Aksum, Ethiopia.
2Eyerusalem Dagnew Gebru, Faculty of Computing Technology, Aksum Institute of Technology, Aksum, Ethiopia.
Manuscript received on February 10, 2020. | Revised Manuscript received on February 27, 2020. | Manuscript published on March 10, 2020. | PP: 2265-2268 | Volume-9 Issue-5, March 2020. | Retrieval Number: E2733039520 /2020©BEIESP | DOI: 10.35940/ijitee.E2733.039520
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: As the unfold boom of Internet get entry to the need for multimedia specifically digital images are widely applicable in various areas such as military, medical, science, education, advertising, entertainment and many others. As human beings around the world exchange these digital images assuring the privacy and reliability of images has turn out to be a principal concern. Thus ciphering the image comes into account. The relationship between the pixel values of neighboring pixels of a plain digital image is strong. The proposed cryptosystem breaks the relationship of neighboring pixel values by altering its position with the use of Arnold cat map equation. Then the shuffled image is diffused using a symmetric keys to yield an encrypted image. The experimental result shows that our cryptosystem effectively cipher/decipher the digital image with external secret key. The experimental result of the proposed cryptosystem was done using MATLAB R2018a and shows it is capable of producing an encrypted image with extremely low relationship coefficients of neighboring pixels. We also found that it is very sensitive to any input key and parameters change. Consequently the proposed cryptosystem has strong encryption quality and invulnerable way for a colored image. Considering the security necessities, this work can have a focus in securing medical end results, country wide secrets and plenty of others which are exchanged over the Internet. 
Keywords: Cryptography, Confusion, Diffusion, Image, Arnold cat map, Chaos.
Scope of the Article: Cryptography and Applied Mathematics