Skip to main content
Top
Published in: Automatic Control and Computer Sciences 5/2020

01-09-2020

Satellite Image Encryption Based on AES and Discretised Chaotic Maps

Authors: E. Bensikaddour, Y. Bentoutou

Published in: Automatic Control and Computer Sciences | Issue 5/2020

Login to get access

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Satellite images have key features such as; large data size, strong correlation between adjacent pixels and high redundancy. Unfortunately, traditional operation modes used to implement the Advanced Encryption Standard (AES) encrypt data without taking into account these specific image features. As a result, the traditional modes are not suitable for image encryption. In this paper, we present a robust satellite image encryption scheme based on discretized chaotic maps and AES. The discretized chaotic maps are used to achieve a confusion and key generation in order to improve the performance of security, especially the sensitivity to plain image. The simulation results show that the proposed technique presents attractive features, including a high level of security, large key space with improved sensitivities to key and plain image.
Literature
1.
go back to reference Security Threats against Space Missions, Washington, DC: CCSDS, 2015. Security Threats against Space Missions, Washington, DC: CCSDS, 2015.
2.
go back to reference Lian, S., Multimedia Content Encryption: Techniques and Applications 2008, Auerbach Publ., 2008.CrossRef Lian, S., Multimedia Content Encryption: Techniques and Applications 2008, Auerbach Publ., 2008.CrossRef
3.
go back to reference El Assad, S., Farajallah, M., and Vladeanu, C., Chaos-based block ciphers: An overview, IEEE 2014 10th International Conference on in Communications (COMM), 2014. El Assad, S., Farajallah, M., and Vladeanu, C., Chaos-based block ciphers: An overview, IEEE 2014 10th International Conference on in Communications (COMM), 2014.
4.
go back to reference Muhaya, F.B., Usama, M., and Khan, M.K., Modified AES using chaotic key generator for satellite imagery encryption, International Conference on Intelligent Computing, 2009. Muhaya, F.B., Usama, M., and Khan, M.K., Modified AES using chaotic key generator for satellite imagery encryption, International Conference on Intelligent Computing, 2009.
5.
go back to reference Muhaya, F.T.B., Chaotic and AES cryptosystem for satellite imagery, Telecommun. Syst., 2013, vol. 52, pp. 573–581. Muhaya, F.T.B., Chaotic and AES cryptosystem for satellite imagery, Telecommun. Syst., 2013, vol. 52, pp. 573–581.
6.
go back to reference Abdulwahed, N.B., Chaos-Based Advanced Encryption Standard, Master’s Thesis, King Abdullah Univ. Sci. Technol., 2013. Abdulwahed, N.B., Chaos-Based Advanced Encryption Standard, Master’s Thesis, King Abdullah Univ. Sci. Technol., 2013.
7.
go back to reference Fridrich, J., Image encryption based on chaotic maps, 1997 IEEE International Conference on Systems, Man, and Cybernetics. Computational Cybernetics and Simulation, 1997. Fridrich, J., Image encryption based on chaotic maps, 1997 IEEE International Conference on Systems, Man, and Cybernetics. Computational Cybernetics and Simulation, 1997.
8.
go back to reference Fridrich, J., Symmetric ciphers based on two-dimensional chaotic maps, Int. J. Bifurcation Chaos, 1998, vol. 8, no. 6, pp. 1259–1284.MathSciNetCrossRef Fridrich, J., Symmetric ciphers based on two-dimensional chaotic maps, Int. J. Bifurcation Chaos, 1998, vol. 8, no. 6, pp. 1259–1284.MathSciNetCrossRef
9.
go back to reference Furht, B., Socek, D., and Magliveras, S.S., Enhanced 1-D chaotic key-based algorithm for image encryption, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM’05), 2004. Furht, B., Socek, D., and Magliveras, S.S., Enhanced 1-D chaotic key-based algorithm for image encryption, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM’05), 2004.
10.
go back to reference Hua, Z. and Zhou, Y., Image encryption using 2D logistic-adjusted-Sine map, Inf. Sci., 2016, vol. 339, pp. 237–253.CrossRef Hua, Z. and Zhou, Y., Image encryption using 2D logistic-adjusted-Sine map, Inf. Sci., 2016, vol. 339, pp. 237–253.CrossRef
11.
go back to reference Kassem, A., et al., Efficient neural chaotic generator for image encryption, Digital Signal Process., 2014, vol. 25, pp. 266–274.CrossRef Kassem, A., et al., Efficient neural chaotic generator for image encryption, Digital Signal Process., 2014, vol. 25, pp. 266–274.CrossRef
12.
go back to reference Kumar, M., Powduri, P., and Reddy, A., An RGB image encryption using diffusion process associated with chaotic map, J. Inf. Secur. Appl., 2015, vol. 21, pp. 20–30. Kumar, M., Powduri, P., and Reddy, A., An RGB image encryption using diffusion process associated with chaotic map, J. Inf. Secur. Appl., 2015, vol. 21, pp. 20–30.
13.
go back to reference Lian, S., Sun, J., and Wang, Z., A block cipher based on a suitable use of the chaotic standard map, Chaos Solitons Fractals, 2005, vol. 26, no. 1, pp. 117–129.CrossRef Lian, S., Sun, J., and Wang, Z., A block cipher based on a suitable use of the chaotic standard map, Chaos Solitons Fractals, 2005, vol. 26, no. 1, pp. 117–129.CrossRef
14.
go back to reference Struss, K., A chaotic image encryption, Math. Senior Semin., 2009, vol. 4901. Struss, K., A chaotic image encryption, Math. Senior Semin., 2009, vol. 4901.
15.
go back to reference Wong, K.-W., Kwok, B.S.-H., and Law, W.-S., A fast image encryption scheme based on chaotic standard map, Phys. Lett. A, 2008, vol. 372, no. 15, pp. 2645–2652.CrossRef Wong, K.-W., Kwok, B.S.-H., and Law, W.-S., A fast image encryption scheme based on chaotic standard map, Phys. Lett. A, 2008, vol. 372, no. 15, pp. 2645–2652.CrossRef
16.
go back to reference Zhang, Y. and Hou, W., A fast image encryption algorithm using plaintext-related confusion, in IEEE Information Technology, Networking, Electronic and Automation Control Conference, 2016. Zhang, Y. and Hou, W., A fast image encryption algorithm using plaintext-related confusion, in IEEE Information Technology, Networking, Electronic and Automation Control Conference, 2016.
17.
go back to reference Kadir, A., Hamdulla, A., and Guo, W.-Q., Color image encryption using skew tent map and hyper chaotic system of 6th-order CNN, Optik, 2014, vol. 125, no. 5, pp. 1671–1675.CrossRef Kadir, A., Hamdulla, A., and Guo, W.-Q., Color image encryption using skew tent map and hyper chaotic system of 6th-order CNN, Optik, 2014, vol. 125, no. 5, pp. 1671–1675.CrossRef
18.
go back to reference Rannou, F., Numerical study of discrete plane area-preserving mappings, Astron. Astrophys., 1974, vol. 31, p. 289.MATH Rannou, F., Numerical study of discrete plane area-preserving mappings, Astron. Astrophys., 1974, vol. 31, p. 289.MATH
19.
go back to reference Noura, H., Conception et Simulation des Générateurs, Crypto-Systèmes et Fonctions de Hachage Basés Chaos Performants, Universite De Nantes, 2012. Noura, H., Conception et Simulation des Générateurs, Crypto-Systèmes et Fonctions de Hachage Basés Chaos Performants, Universite De Nantes, 2012.
20.
go back to reference Masuda, N. and Aihara, K., Cryptosystems with discretized chaotic maps, IEEE Trans. Circuits Syst. I: Fundam. Theory Appl., 2002, vol. 49, no. 1, pp. 28–40.MathSciNetCrossRef Masuda, N. and Aihara, K., Cryptosystems with discretized chaotic maps, IEEE Trans. Circuits Syst. I: Fundam. Theory Appl., 2002, vol. 49, no. 1, pp. 28–40.MathSciNetCrossRef
21.
go back to reference Peng, J., et al., Research on a block encryption cipher based on chaotic dynamical system, Third International Conference on Natural Computation (ICNC 2007), 2007. Peng, J., et al., Research on a block encryption cipher based on chaotic dynamical system, Third International Conference on Natural Computation (ICNC 2007), 2007.
22.
go back to reference Digital Globe Product Samples. https://www.digitalglobe.com/resources/product-samples. Accessed January 10, 2019. Digital Globe Product Samples. https://​www.​digitalglobe.​com/​resources/​product-samples.​ Accessed January 10, 2019.
23.
go back to reference Jolfaei, A., Wu, X.-W., and Muthukkumarasamy, V., Comments on the security of “Diffusion–substitution based gray image encryption” scheme, Digital Signal Process., 2014, vol. 32, pp. 34–36.CrossRef Jolfaei, A., Wu, X.-W., and Muthukkumarasamy, V., Comments on the security of “Diffusion–substitution based gray image encryption” scheme, Digital Signal Process., 2014, vol. 32, pp. 34–36.CrossRef
24.
go back to reference Yang, Y.-G., et al., Novel image encryption based on quantum walks, Sci. Rep., 2015, vol. 5. Yang, Y.-G., et al., Novel image encryption based on quantum walks, Sci. Rep., 2015, vol. 5.
25.
go back to reference Zhu, H., Zhao, Y., and Song, Y., 2D Logistic-modulated-Sine-coupling-Logistic chaotic map For Image Encryption, IEEE Access, 2019, vol. 7. Zhu, H., Zhao, Y., and Song, Y., 2D Logistic-modulated-Sine-coupling-Logistic chaotic map For Image Encryption, IEEE Access, 2019, vol. 7.
26.
go back to reference Parvin, Z., Seyedarabi, H., and Shamsi, M., A new secure and sensitive image encryption scheme based on new substitution with chaotic function, Multimedia Tools Appl., 2016, vol. 75, no. 17, pp. 10631–10648.CrossRef Parvin, Z., Seyedarabi, H., and Shamsi, M., A new secure and sensitive image encryption scheme based on new substitution with chaotic function, Multimedia Tools Appl., 2016, vol. 75, no. 17, pp. 10631–10648.CrossRef
27.
go back to reference Wu, Y., Noonan, J.P., and Agaian, S., NPCR and UACI randomness tests for image encryption. Cyber journals: Multidisciplinary journals in science and technology, J. Sel. Areas Telecommun., 2011, vol. 1, no. 2, pp. 31–38. Wu, Y., Noonan, J.P., and Agaian, S., NPCR and UACI randomness tests for image encryption. Cyber journals: Multidisciplinary journals in science and technology, J. Sel. Areas Telecommun., 2011, vol. 1, no. 2, pp. 31–38.
Metadata
Title
Satellite Image Encryption Based on AES and Discretised Chaotic Maps
Authors
E. Bensikaddour
Y. Bentoutou
Publication date
01-09-2020
Publisher
Pleiades Publishing
Published in
Automatic Control and Computer Sciences / Issue 5/2020
Print ISSN: 0146-4116
Electronic ISSN: 1558-108X
DOI
https://doi.org/10.3103/S014641162005003X

Other articles of this Issue 5/2020

Automatic Control and Computer Sciences 5/2020 Go to the issue