{"title":"Digital image chaotic encryption and transmission using UIO","authors":"V. Sharma, B. Sharma, R. Nath","doi":"10.1109/COMPTELIX.2017.8003933","DOIUrl":null,"url":null,"abstract":"In present work, secure communication scheme for digital images based on discrete time unknown input observer (UIO) design blended with discrete time chaotic encryption is presented. Chaotic signals are pseudo random signals with no periodicity over infinite length. However, the series can be generated with the precise knowledge of the few parameters like system parameters and initial conditions of the chaotic system. With the given nature of pseudo-randomness and extreme sensitivity to parameters, chaotic sequences are ideal for encryption. In literature, these chaotic sequences are generally generated using continuous time chaotic systems. Since image data to be transmitted is in digital form and encryption algorithms are also executed on digital devices, so it is proposed to use discrete time chaotic communication scheme. Further, its effectiveness for encryption of digital images is also analyzed. To further enhance the security encrypted data is embedded in the dynamics of discrete time chaotic transmitter system. To recover the message at the receiver, design of discrete time UIO along with a procedure to recover unknown message signal using estimated states is given. Existence conditions for the UIO are analytically derived in terms of LMIs. Solution of these LMIs gives the observer design matrices. Robustness of UIO based chaotic communication scheme against attacks is analyzed by studying return maps of the transmitted signal. It is reported that security of chaotic communication scheme can be compromised by studying the return maps of the transmitted signal. To validate the proposed approach results of simulation and security analysis are presented.","PeriodicalId":6917,"journal":{"name":"2017 International Conference on Computer, Communications and Electronics (Comptelix)","volume":"10 1","pages":"32-37"},"PeriodicalIF":0.0000,"publicationDate":"2017-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 International Conference on Computer, Communications and Electronics (Comptelix)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/COMPTELIX.2017.8003933","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
In present work, secure communication scheme for digital images based on discrete time unknown input observer (UIO) design blended with discrete time chaotic encryption is presented. Chaotic signals are pseudo random signals with no periodicity over infinite length. However, the series can be generated with the precise knowledge of the few parameters like system parameters and initial conditions of the chaotic system. With the given nature of pseudo-randomness and extreme sensitivity to parameters, chaotic sequences are ideal for encryption. In literature, these chaotic sequences are generally generated using continuous time chaotic systems. Since image data to be transmitted is in digital form and encryption algorithms are also executed on digital devices, so it is proposed to use discrete time chaotic communication scheme. Further, its effectiveness for encryption of digital images is also analyzed. To further enhance the security encrypted data is embedded in the dynamics of discrete time chaotic transmitter system. To recover the message at the receiver, design of discrete time UIO along with a procedure to recover unknown message signal using estimated states is given. Existence conditions for the UIO are analytically derived in terms of LMIs. Solution of these LMIs gives the observer design matrices. Robustness of UIO based chaotic communication scheme against attacks is analyzed by studying return maps of the transmitted signal. It is reported that security of chaotic communication scheme can be compromised by studying the return maps of the transmitted signal. To validate the proposed approach results of simulation and security analysis are presented.