Chaos-based secure satellite imagery cryptosystem

被引:72
作者
Usama, Muhammad [1 ]
Khan, Muhammad Khurram [1 ]
Alghathbar, Khaled [1 ,3 ]
Lee, Changhoon [2 ]
机构
[1] King Saud Univ, COEIA, Riyadh 11451, Saudi Arabia
[2] Hanshin Univ, Sch Comp Engn, Hanshin, South Korea
[3] King Saud Univ, Coll Comp & Informat Sci, Dept Informat Syst, Riyadh 11451, Saudi Arabia
关键词
Satellite image; Chaos; Cryptosystem; Security; Network; CRYPTOGRAPHY; AUTHENTICATION; SCHEME;
D O I
10.1016/j.camwa.2009.12.033
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
With the large-scale development in satellite and network communication technologies, there is a great demand for preserving the secure storage and transmission of satellite imagery over internet and shared network environment. This brings new challenges to protect sensitive and critical satellite images from unauthorized access and illegal usage. In this paper, we address the aforementioned issues and develop techniques to eliminate the associated problems. To achieve this, we propose a new chaos-based symmetric-key encryption technique for satellite imagery. This scheme utilizes multiple chaotic maps e.g. Logistic, Henon, Tent, Cubic, Sine and Chebyshev for enhancing the key space, robustness and security of satellite imagery. We perform key sensitivity, statistical and performance analysis experiments to determine the security, reliability, and speed of our algorithm for satellite imagery. The proposed algorithm presents several interesting features, such as a high level of security, large enough key space, pixel distributing uniformity and an acceptable encryption speed as compared to AES, 3-DES, and DES. (C) 2010 Elsevier Ltd. All rights reserved.
引用
收藏
页码:326 / 337
页数:12
相关论文
共 29 条
[1]   New approach to chaotic encryption [J].
Alvarez, E ;
Fernández, A ;
García, P ;
Jiménez, J ;
Marcano, A .
PHYSICS LETTERS A, 1999, 263 (4-6) :373-375
[2]  
[Anonymous], 2002, CRYPTOGRAPHY THEORY
[3]   Cryptography with chaos [J].
Baptista, MS .
PHYSICS LETTERS A, 1998, 240 (1-2) :50-54
[4]  
FISHAWY NE, 2007, INT J NETWORK SECURI, V5, P241
[5]   Symmetric ciphers based on two-dimensional chaotic maps [J].
Fridrich, J .
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 1998, 8 (06) :1259-1284
[6]   A note on chaotic secure communication systems [J].
Jiang, ZP .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-FUNDAMENTAL THEORY AND APPLICATIONS, 2002, 49 (01) :92-96
[7]   Multimodal face and fingerprint biometrics authentication on space-limited tokens [J].
Khan, Muhammad Khurram ;
Zhang, Jiashu .
NEUROCOMPUTING, 2008, 71 (13-15) :3026-3031
[8]   Chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices [J].
Khan, Muhammad Khurram ;
Zhang, Jiashu ;
Wang, Xiaomin .
CHAOS SOLITONS & FRACTALS, 2008, 35 (03) :519-524
[9]   Chaotic secure content-based hidden transmission of biometric templates [J].
Khan, Muhammad Khurram ;
Zhang, Jiashu ;
Tian, Lei .
CHAOS SOLITONS & FRACTALS, 2007, 32 (05) :1749-1759
[10]  
Kotulsk Z., 1997, C NONL EV EQ DYN SYS, P1