A new image encryption scheme based on a chaotic function

被引:119
作者
Francois, M. [1 ]
Grosges, T. [1 ]
Barchiesi, D. [1 ]
Erra, R. [2 ]
机构
[1] Univ Technol Troyes, INRIA, UTT Gamma3, Grp Automat Mesh Generat & Adv Methods, F-10010 Troyes, France
[2] ESIEA, Dept Network & Informat Secur, F-75005 Paris, France
关键词
Image encryption; Chaotic function; Statistical analysis; Confusion; Diffusion; Indistinguishability; CRYPTANALYSIS; ALGORITHM; CIPHERS;
D O I
10.1016/j.image.2011.11.003
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In recent years, several methods of secure image encryption were studied and developed through chaotic processes or functions. In this paper, a new image encryption scheme based on a coupling of chaotic function and xor operator is presented. The main advantages of such a method are the abilities to produce a large key space to resist brute-force attacks, and to encrypt securely images with any entropy structure assuring indistinguishability, confusion and diffusion properties in the corresponding cipher-images. The results of several statistical analysis about randomness, sensitivity and correlation of the cipher-images show that the proposed cryptosystem is efficient and secure enough to be used for the image encryption and transmission. Moreover, the implementation of the corresponding algorithm is easy and only integers are used. (C) 2011 Elsevier B.V. All rights reserved.
引用
收藏
页码:249 / 259
页数:11
相关论文
共 26 条
[1]  
Acharya AK, 2011, P INT C COMM NY US, P577
[2]   Some basic cryptographic requirements for chaos-based cryptosystems [J].
Alvarez, Gonzalo ;
Li, Shujun .
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2006, 16 (08) :2129-2151
[3]   Predictability in the large: An extension of the concept of Lyapunov exponent [J].
Aurell, E ;
Boffetta, G ;
Crisanti, A ;
Paladin, G ;
Vulpiani, A .
JOURNAL OF PHYSICS A-MATHEMATICAL AND GENERAL, 1997, 30 (01) :1-26
[4]   A SIMPLE UNPREDICTABLE PSEUDORANDOM NUMBER GENERATOR [J].
BLUM, L ;
BLUM, M ;
SHUB, M .
SIAM JOURNAL ON COMPUTING, 1986, 15 (02) :364-383
[5]   PICTURE DATA ENCRYPTION USING SCAN PATTERNS [J].
BOURBAKIS, N ;
ALEXOPOULOS, C .
PATTERN RECOGNITION, 1992, 25 (06) :567-581
[6]   A new encryption algorithm for image cryptosystems [J].
Chang, CC ;
Hwang, MS ;
Chen, TS .
JOURNAL OF SYSTEMS AND SOFTWARE, 2001, 58 (02) :83-91
[7]   A linear quadtree compression scheme for image encryption [J].
Chang, HKC ;
Liu, JL .
SIGNAL PROCESSING-IMAGE COMMUNICATION, 1997, 10 (04) :279-290
[8]   A symmetric image encryption scheme based on 3D chaotic cat maps [J].
Chen, GR ;
Mao, YB ;
Chui, CK .
CHAOS SOLITONS & FRACTALS, 2004, 21 (03) :749-761
[9]   Partial encryption of compressed images and videos [J].
Cheng, H ;
Li, XB .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2000, 48 (08) :2439-2451
[10]   Symmetric ciphers based on two-dimensional chaotic maps [J].
Fridrich, J .
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 1998, 8 (06) :1259-1284