ebook img

Multimedia Security Using Chaotic Maps: Principles and Methodologies PDF

271 Pages·2020·19.884 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Multimedia Security Using Chaotic Maps: Principles and Methodologies

Studies in Computational Intelligence 884 Khalid M. Hosny   Editor Multimedia Security Using Chaotic Maps: Principles and Methodologies Studies in Computational Intelligence Volume 884 Series Editor Janusz Kacprzyk, Polish Academy of Sciences, Warsaw, Poland The series “Studies in Computational Intelligence” (SCI) publishes new develop- mentsandadvancesinthevariousareasofcomputationalintelligence—quicklyand with a high quality. The intent is to cover the theory, applications, and design methods of computational intelligence, as embedded in the fields of engineering, computer science, physics and life sciences, as well as the methodologies behind them. The series contains monographs, lecture notes and edited volumes in computational intelligence spanning the areas of neural networks, connectionist systems, genetic algorithms, evolutionary computation, artificial intelligence, cellular automata, self-organizing systems, soft computing, fuzzy systems, and hybrid intelligent systems. Of particular value to both the contributors and the readership are the short publication timeframe and the world-wide distribution, which enable both wide and rapid dissemination of research output. The books of this series are submitted to indexing to Web of Science, EI-Compendex, DBLP, SCOPUS, Google Scholar and Springerlink. More information about this series at http://www.springer.com/series/7092 Khalid M. Hosny Editor Multimedia Security Using Chaotic Maps: Principles and Methodologies 123 Editor KhalidM. Hosny Department ofInformation Technology Faculty of Computers andInformatics Zagazig University Zagazig,Egypt ISSN 1860-949X ISSN 1860-9503 (electronic) Studies in Computational Intelligence ISBN978-3-030-38699-3 ISBN978-3-030-38700-6 (eBook) https://doi.org/10.1007/978-3-030-38700-6 ©SpringerNatureSwitzerlandAG2020 Thisworkissubjecttocopyright.AllrightsarereservedbythePublisher,whetherthewholeorpart of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission orinformationstorageandretrieval,electronicadaptation,computersoftware,orbysimilarordissimilar methodologynowknownorhereafterdeveloped. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publicationdoesnotimply,evenintheabsenceofaspecificstatement,thatsuchnamesareexemptfrom therelevantprotectivelawsandregulationsandthereforefreeforgeneraluse. The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, expressed or implied, with respect to the material contained hereinorforanyerrorsoromissionsthatmayhavebeenmade.Thepublisherremainsneutralwithregard tojurisdictionalclaimsinpublishedmapsandinstitutionalaffiliations. ThisSpringerimprintispublishedbytheregisteredcompanySpringerNatureSwitzerlandAG Theregisteredcompanyaddressis:Gewerbestrasse11,6330Cham,Switzerland Preface Multimedia could be defined as a combination of different data types such as text, audio, image, and video. Every day, a huge amount of data is transmitted through theInternetandotheropennetworks.Securingthetransmitteddataandpreventing any misuse of it are a big challenge. Various security techniques such as digital watermarking, data encryption, steganography, and data hiding have been devel- oped for securing multimedia data. During the last decade, several remarkable methodologies have been developed to improve the levels of multimedia security. Recently, chaotic maps were con- sidered a promising tool and have been successfully utilized in digital water- marking, data encryption, steganography, and data hiding techniques. The interest in using different kinds of chaotic maps and systems in multimedia security has been steadily increasing through the last few years where the number of published papers in archived journals and conference’ proceedings was monotonically increased. However, according to the best knowledge of the editor, no books covering multimedia security using chaotic maps have been published, which motivates the idea of this edited book under the title Multimedia Security Using Chaotic Maps: Principles and Methodologies. The book provides the readers with a comprehensive overview of principles, methodologies, and recent advances in multimedia security using different chaotic maps through a collection of high-quality chapters. This edited book contains 10 chapters. These chapters present original and previously unpublished work of well-known researches from several countries dealing with different issues of multimediasecurityusingchaoticmaps.Eachchapterincludesanintroductionthat reviews up-to-date techniques, presents outcomes, and points out challenges and future directions.Inthisbook,illustrative figures, tables,andexamplesareusedto improve the presentation and the analysis of the covered security problem. Also, each chapter includes a list of references for further exploration of the considered security problem. The book is a valuable reference for researchers, engineers, IT specialists, developers, postgraduate students, and senior undergraduate students with majors in data security. v vi Preface A brief overview of the contents of the book is as follows: In the first chapter entitled“ASurveyonChaosBasedImageEncryptionTechniques,”authorspresent an elegant review of the different chaos-based image encryption techniques. The authorsclearlyshowthatproposingafullysecuremethodmaynotbeaneasytask due to a growing number of image deciphering techniques. Therefore, there is a furtherneedfortheimprovementoftheexistingencryptionmethods.Inthesecond chapter entitled “Chaotic Maps for Image Encryption: An Assessment Study,” authorspresentaperformanceanalysisofthechaoticmap-basedmethodsforimage encryption.Inthiscomparativestudy,chaoticmapsareusedinthepermutationand diffusionoperationstoencrypttheplainimage.Theycarefullyselecttheevaluation criteria to evaluate the performance of the image encryption methods in terms of NPCR,UACI,PSNR,correlationcoefficient,entropy,andcomputationaltime.For future work, the author intends to study the effect of using two different chaotic maps in confusion and diffusion processes instead of using the same map and extend their study to encrypt the full color images. In the third chapter entitled “Optical Cryptosystem Using Chaotic/Hyperchaotic System,” authors present new optical cryptosystems which based on chaotic/hyperchaotic system. They proved the validity and capability of the proposed chaotic/hyperchaotic systems through numerical simulations. Experiments were performed using symmetric encryption, asymmetric encryption, color image encryption, and hyperspectral image encryp- tion where the results of the performed experiments show that the security of the proposed cryptosystem is improved due to the high randomness of the utilized chaotic/hyperchaoticsystem. Theauthorsconcludedthatthis chapteraddsa useful contribution to the optical security technologies in storage and transmission. They alsoconcludedthattherapiddevelopmentofmoderntechnologies,opticalsystems using chaotic/hyperchaotic system, can attract more and more attention in the practical application. In the fourth chapter entitled “Secure Image Transmission BasedonaProposedChaoticMaps,”authorsproposedanewchaoticsystemcalled “Nahrain.” The proposed chaotic-based encryption technique provides a secured imagetransmissionsystemwithhighimmunityagainstchannelimpairments.They tested the proposed chaotic-based system and concluded that the proposed chaotic system could be used to improve effective encryption and synchronization algo- rithms for secure image transmission applications. In the fifth chapter entitled “A Chaotic Encryption Algorithm for Image Privacy Based on Two Pseudorandomly EnhancedLogisticMaps,”authorsintroducedachaotic-basedencryptionalgorithm by using two pseudorandomly enhanced logistic maps (PELM) for color RGB image privacy. Experiments were performed using MATLAB to evaluate the per- formanceoftheproposedchaoticsystem.Theobtainedresultsvalidatethesecurity and the effectiveness of the proposed scheme where this scheme is suitable for implementation in biometric systems, telemedicine, and military use of satellite images. In the sixth chapter entitled “Improved Color Image Watermarking Using Logistic Maps and Quaternion Legendre-Fourier Moments,” authors proposed an improvedwatermarkingalgorithmforRGBcolorimagesbyutilizinglogisticmaps with the quaternion Legendre–Fourier moments (logistic maps—QLFMs). The selected QLFMs are quantized to embed the binary digital watermark in the host Preface vii color image. Experiments were performed where the performance of proposed, logistic maps—QLFMs, method is compared with the existing quaternion moment-basedcolorwatermarkingmethodsintermsofvisualimperceptibilityand robustnessagainstdifferentattacks.Theproposed,logisticmaps—QLFMs,method has outperformed the classical QLFM-based color watermarking method and the existing quaternion moment-based color watermarking methods. In the seventh chapter entitled “Chaos-Based Gary Image Encryption Using Two Coupled CompetitionTypeMaps,”authorspresentedanalyticalstudyofnonlineardynamics that exist in two coupled competition maps and explored the possible existence of various types of bifurcation in the model including flip bifurcation, pitchfork bifurcation, and Neimark–Sacker bifurcation. They performed numerical simula- tionstoprovetheoreticalanalysisandpresentedachaos-basedencryptionalgorithm for grayscale images as an application for the competition map. The proposed chaos-based encryption algorithm was tested in terms of security analysis, sensi- tivity to mismatch in parameters, correlation coefficients for pixels, entropy anal- ysis, and immunity to differential attacks. Comparison with related encryption algorithms shows that the proposed scheme has a large security keys’ space, high sensitivitytotinyvariationsincriticalparameters,andnegligiblesmallcoefficients of correlation between adjacent pixels in cipher images. In the eighth chapter entitled “An Effective Encryption Scheme Based on Chaotic Maps Applied to Digital Image,” the author presented a simple and effective chaotic map-based encryption method for grayscale images. The proposed approach is a combination of the Fibonacci sequence with the chaotic logistic map to create the secret key in order to improve encryption quality. A set of image benchmarks was used in theperformed experiments where theobtained results showedthe capability ofthe proposed encryption method to produce a better image security compared with the existing similar encryption methods. In the ninth chapter entitled “FPGA Implementation of Integer/Fractional Chaotic Systems,” authors present a FPGA implementation of different integer- and fractional-order chaotic systems. The authors investigated the Chua double scroll and the modified Chua N-scroll integer-order chaotic systems. Also, they investigated the Chua, Yalcin et al., Ozuogosetal.,andTangetal.fractional-orderchaoticsystems.Theyimplemented and simulated the selected systems using the Grunwald–Letnikov (GL) definition withdifferentwindowsizeswheresomeinterestingchaoticbehaviorsareobtained. The results of the performed experiments showed that the proposed FPGA implementationneedsfewerresourcesandhashighthroughput.Inthetenthchapter entitled “Embedded Hardware Implementation for Image Security Using Chaotic Maps,” authors proposed an efficient embedded hardware implementation of a chaotic map-based image security system. The proposed color image encryption system contains two stages. The first stage is scrambling pixel position, and the second stage is diffusing bit value. A color image encryption is simulated in soft- ware via MATLAB and implemented via Cyclone V GX Starter Kit FPGA viii Preface platform. The results of the performed simulation showed that the presented color imageencryptionsystemisresilientandrobust.Finally,Ihopethatthiseditedbook is interesting and useful for the prospective readers. Also, I wish that its contents inspire researcher for making more theoretical addition and practical contributions to the field of multimedia security. Zagazig, Egypt Khalid M. Hosny Acknowledgements Theeditorwouldliketotakethisopportunitytoexpresshissinceregratitudetothe authors of the chapters for extending their wholehearted support in sharing some of their latest results and findings. Without their significant contribution, this book volume could not have fulfilled its mission. The reviewers deserve our thanks for their constructive and timely input. The editor is very grateful to Editor-in-Chief, Prof. Janusz Kacprzyk, Dr. Thomas Ditzinger, Senior Editor, and Holger Schpe, Editorial Assistant of the Studies in Computational Intelligence series. Finally, the editor and the authors would like to acknowledge the efforts of the Studies in Computational Intelligence team at Springer for their support and cooperation in publishing the book as a volume in the SCI series. Really, the editorial staff at Springer has done a meticulous job and working with them was a pleasant expe- rience. Zagazig, Egypt Khalid M. Hosny ix

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.