A novel encryption scheme for colored image based on high level chaotic maps

被引:80
作者
Mollaeefar, Majid [1 ]
Sharif, Amir [1 ]
Nazari, Mahboubeh [2 ]
机构
[1] Imam Reza Int Univ, Dept Comp & Informat Technol, Mashhad, Iran
[2] Ferdowsi Univ Mashhad, Dept Math, Mashhad, Iran
关键词
Chaos; Image cryptography; Lyapunov exponent; Security; ALGORITHM; SYSTEM;
D O I
10.1007/s11042-015-3064-9
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the following paper, the novel method for color image encryption has proposed based on high level chaotic maps . We introduced two novel chaotic maps "Cosinus-Arcsinus (CA)" and "Sinus-Power Logistic (SPL)", which have better chaotic behaviour against other available chaotic maps. Our scheme like other image encryption schemes has two main phases, which are pixel shuffling and pixel diffusion. We made an efficient chaotic permutation method, which is extremely dependent on plain image. The proposed method compared with other availabale permutation methods in pixel shuffling stage has a better performance with a lower computational overhead. Another advantage of our permutation method is less correlation between adjacent pixels in the permuted image, which causes high confusion levels with lower iterations. In pixel diffusion phase, we introduced coupled map based on SPL map to change each color component distinctly. Moreover, we used CA map to generate three chaotic sequences for deriving initial seeds of coupled map in a random manner. Followed by three chaotic matrix will be created to change pixels color component values. The proposed diffusion phase implies desirable uniformly distributation in color histogram of encrypted image and makes the scheme robust against statistical attacks. In addition, creating secret keys in a large size and high sensitivity to the original pictures leads acceptable results in the average of NPCR (99.67), UACI (33.45), and resistance against brute-force attack. The experimental results reveal that the new image encryption scheme has the charectristics of 'secure encryption algorithm' such as, large key space, high security and high sensitivity.
引用
收藏
页码:607 / 629
页数:23
相关论文
共 28 条
[1]  
[Anonymous], 2014, 3D RES
[2]  
[Anonymous], 2010, IJ NETWORK SECURITY
[3]   An efficient and secure authentication and key agreement scheme for session initiation protocol using ECC [J].
Arshad, Hamed ;
Nikooghadam, Morteza .
MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (01) :181-197
[4]   Security analysis and improvement of two authentication and key agreement schemes for session initiation protocol [J].
Arshad, Hamed ;
Nikooghadam, Morteza .
JOURNAL OF SUPERCOMPUTING, 2015, 71 (08) :3163-3180
[5]   On the Security of a Two-Factor Authentication and Key Agreement Scheme for Telecare Medicine Information Systems [J].
Arshad, Hamed ;
Teymoori, Vahid ;
Nikooghadam, Morteza ;
Abbassi, Hassan .
JOURNAL OF MEDICAL SYSTEMS, 2015, 39 (08)
[6]   Three-Factor Anonymous Authentication and Key Agreement Scheme for Telecare Medicine Information Systems [J].
Arshad, Hamed ;
Nikooghadam, Morteza .
JOURNAL OF MEDICAL SYSTEMS, 2014, 38 (12)
[7]   A Modified Chaos-Based Joint Compression and Encryption Scheme [J].
Chen, Jianyong ;
Zhou, Junwei ;
Wong, Kwok-Wo .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2011, 58 (02) :110-114
[8]   Color image encryption using one-time keys and coupled chaotic systems [J].
Dong, Chang'e .
SIGNAL PROCESSING-IMAGE COMMUNICATION, 2014, 29 (05) :628-640
[9]   A new chaotic algorithm for image encryption [J].
Gao, HJ ;
Zhang, YS ;
Liang, SY ;
Li, DQ .
CHAOS SOLITONS & FRACTALS, 2006, 29 (02) :393-399
[10]   Multi chaotic systems based pixel shuffle for image encryption [J].
Huang, C. K. ;
Nien, H. H. .
OPTICS COMMUNICATIONS, 2009, 282 (11) :2123-2127