Image encryption algorithms based on chaos through dual scrambling of pixel position and bit

被引:22
作者
Deng, Xiao-Heng [1 ]
Liao, Chun-Long [1 ]
Zhu, Cong-Xu [1 ]
Chen, Zhi-Gang [1 ]
机构
[1] School of Information Science and Engineering, Central South University
来源
Tongxin Xuebao/Journal on Communications | 2014年 / 35卷 / 03期
关键词
Bit scrambling; Chaotic system; Image encryption; Pixels scrambling;
D O I
10.3969/j.issn.1000-436x.2014.03.025
中图分类号
学科分类号
摘要
As the current popular chaos-based image encryption algorithms with the permutation-diffusion structure have security flaws of no immunity to attack. A new image encryption algorithm was proposed based on the analysis of current algorithms, which can well resist the chosen-plaintext and the chosen-ciphertext attacks. The algorithm uses Kent chaotic map to generate key streams, and produces the parameters of the chaotic system and the iteration times according to the characteristics of plaintext pixels and input key. Firstly, the positions of pixels were shuffled totally with the chaotic sequence. Secondly, the 0 and 1 bit positions of image pixels were scrambled by using another chaotic sequence generated by the input key. The experimental results show that the algorithm cannot only resist the chosen plaintext attack and chosen ciphertext attack but also achieve better cryptographic properties, such as key space, statistical analysis.
引用
收藏
页码:216 / 223
页数:7
相关论文
共 25 条
[1]  
Pisarchik A.N., Zanin M., Image encryption with cha-otically coupled chaotic maps, Physics Letters, 372, pp. 2645-2652, (2008)
[2]  
Gao T.G., Chen Z.Q., Image encryption base on a new total shuffling algorithm, Chaos, Solitons & Fractals, 38, pp. 213-220, (2008)
[3]  
Guan Z.H., Huang F.J., Guan W.J., Chaos based image encryption algorithm, Physics Letters A, 346, 1-3, pp. 153-157, (2005)
[4]  
Liao X.F., Chen Y., Xiao D., Et al., Theory and Aapplication of Chaotic Cryptography, (2009)
[5]  
Sempere V., Albero T., Silvestre J., Analysis of communication alternatives in a heterogeneous network for a supervision and control system, Computer Communications, 29, 8, pp. 1133-1145, (2006)
[6]  
Tenny R., Tsimring L.S., Larry I., Et al., Using distributed nonlinear dynamics for public key encryption, Physical Review Letters, 90, 4, (2003)
[7]  
Kocarev L., Tasev Z., Public-key encryption based on Chebyshev maps, Proceedings of the IEEE International Symposium on Circuits and Systems, 1, 3, pp. 28-31, (2003)
[8]  
Cao J.Q., Xiao H.R., Lan Z.L., Chaos encryption algorithm based on dual scrambling of pixel position and value, Computer Engineering and Applications, 46, 28, pp. 192-195, (2010)
[9]  
Wang X.Y., Lei Y., A novel chaotic image encryption algorithm based on water wave motion and water drop diffusion models, Optics Communications, 285, 20, pp. 4033-4042, (2012)
[10]  
Teng L., Wang X.Y., A bit-level image encryption algorithm based on spatiotemporal chaotic system and self-adaptive, Optics Communications, 285, 20, pp. 4048-4054, (2012)