Article details

Title: Android Application for Confidential Image Communication Using
Author(s): Jean Nkapkop de Dieu   Claudiu Cioara   George Nicolae Matei   Joseph Yves Effa   Romulus Terebes   Monica Borda   

Abstract: In today’s world, in all public telecommunication networks, such as TV cable, mobile phones, satellite, the Internet, etc., digital image encryption became a field that has drawn much attention. As a result, their security has become increasingly important in many applications in which real time, fast, secure and reliable monitoring are essential requirements. For this purpose, we had earlier developed and implemented a permutation-diffusion algorithm for a fast and secure symmetric image encryption using the chaotic maps. This paper presents the development of an Android application for confidential image communication for the developed algorithm. The proposed application was designed using the Java programming language and the Android Software Development Kit, for transmission and reception of any type of image in a secrete manner before it is transmitted over the network to another user via smart mobile phones or tablets running Android operating system. For communication and also for transferring of an image file from one device to another, the TCP/IP protocol is used. By using the proposed mobile image encryption application, efficient image file transfer between two mobile devices is achieved with a high security mechanism to protect the users’ private image leakage to the unauthorized end-user, which renders it very suitable for the real-time communication of confidential images encryption on at least two Android mobile devices.

Keywords: Image encryption, chaotic maps, Java, Android, mobile devices.

References:

[1] A. UHL, A. POMMER – Application Scenarios for the Encryption of Still Visual Data, In “Image and Video Encryption”, Advances in Information Security, Vol. 15, pp. 31-43, 2005
[2] S. LIAN, X. CHEN – On the Design of Partial Encryption Scheme for Multimedia Content, Mathematical and Computer Modelling, Vol. 57, No. 11-12, pp. 2613-2624, Jun. 2013
[3] F.-G. JENG, W.-L. HUANG, T-H. CHEN – Cryptanalysis and Improvement of Two Hyper-Chaos-Based Image Encryption Schemes, Signal Processing: Image Communication, Vol. 34, Issue C, pp. 45-51, May 2015
[4] C. FU, J.J. CHEN, H. ZOU, W.H. MENG, Y.F. ZHAN, Y.W. YU – A Chaos-Based Digital Image Encryption Scheme with an Improved Diffusion Strategy, Optics Express, Vol. 20, No. 3, pp. 2363-2378, Jan. 2012
[5] K. GUPTA, S. SILAKARI – New Approach for Fast Color Image Encryption Using Chaotic Map, Journal of Information Security, Vol. 2, No. 4, pp. 139-150, Oct. 2011
[6] C. LI, S. LI, K.-T. LO – Breaking a Modified Substitution-Diffusion Image Cipher Based on Chaotic Standard and Logistic Maps, Communications in Nonlinear Science and Numerical Simulation, Vol. 16, No. 2, pp. 837-843, Feb. 2011
[7] L. KOCAREV – Chaos-Based Cryptography: A Brief Overview, IEEE Circuits and Systems Magazine, Vol. 1, No. 3, pp. 6-21, 2001
[8] L. KOCAREV, G. JAKIMOSKI Pseudorandom Bits Generated by Chaotic Maps, IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications, Vol. 50, No. 1, pp. 123-126, Jan. 2003
[9] A. SRIVASTAVAA Survey Report on Different Techniques of Image Encryption, International Journal of Emerging Technology and Advanced Engineering, Vol. 2, No. 6, pp. 163-167, Jun. 2012
[10] J. WANG, G. CHENDesign of a Chaos-Based Digital Image Encryption Algorithm in Time Domain, Proc. of the IEEE International Conference on Computational Intelligence & Communication Technology, CICT 2015, pp. 26-28, Ghaziabad, India, Feb. 13-14, 2015
[11] J.D.D. NKAPKOP, J.Y. EFFA, M. BORDA, R. TEREBESA Novel Fast and Secure Chaos-Based Algorithm for Image Encryption, In I. Bica et al. (Eds), “Innovative Security Solutions for Information Technology and Communications”, Lecture Notes in Computer Science, Vol. 9522, pp. 87-101, 2015
[12] J. FRIDRICHSymmetric Ciphers Based on Two-Dimentional Chaotic Maps, International Journal of Bifurcation and Chaos, Vol. 8, No. 6, pp. 1259-1284, Jun. 1998
[13] Android N. developper, http://developer.android.com/index.html.
[14] Android Tutorial, http://www.tutorialspoint.com/android/android_tutorial
[15] Y. WANG, K-W. WONG, X. LIAO, G. CHENA New Chaos-Based Fast Image Encryption Algorithm, Applied Soft Computing, Vol. 11, No. 1, pp. 514-522, Jan. 2011