A Novel Image Cascaded Encryption Algorithm Based on Chaos with Related Security Evaluation Scheme

被引:0
作者
Zheng, Yifeng [1 ]
Wang, Chen [2 ]
机构
[1] S China Univ Technol, Sch Elect & Informat Engn, Guangzhou 510640, Guangdong, Peoples R China
[2] Univ Edinburgh, Sch Engn, Edinburgh EH8 9YL, Midlothian, Scotland
来源
PROCEEDINGS OF 2012 IEEE 14TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY | 2012年
关键词
Image encryption; Cascaded chaotic system; Henon map; Logistic map; Scrambling degree; MAP;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, a novel image cascaded encryption algorithm based on chaotic system is proposed. Henon-Logistic Cascaded Algorithm (HLCA) is implemented by Henon map and Logistic map which can simultaneously perform in two processes of image encryption, via pixel value substitution and pixel position permutation. More importantly, with the assistance of extra secret key, enormous cipher capacity is realized as to make the cipher more robust against any attack. Experimental results show good performance of this cipher algorithm in aspects of key space, key sensitivity, pixel disordering and anti-attack ability. On the other hand, a new image scrambling degree evaluation criterion is introduced in this paper which can assess the security of the cipher algorithm proposed effectively, shown by related experimental results.
引用
收藏
页码:768 / 772
页数:5
相关论文
共 12 条
[1]  
Chen gang, 2005, J SOFTWARE, V6, P562
[2]   Image encryption algorithm based on reciprocally-disordered diploid chaotic sequences alternated in subsection [J].
Chen Y.-F. ;
Li Y.-F. .
Huanan Ligong Daxue Xuebao/Journal of South China University of Technology (Natural Science), 2010, 38 (05) :27-33
[3]  
Guo Lin-qin, 2010, COMPUTER MODERNIZATI, P53
[4]   2-DIMENSIONAL MAPPING WITH A STRANGE ATTRACTOR [J].
HENON, M .
COMMUNICATIONS IN MATHEMATICAL PHYSICS, 1976, 50 (01) :69-77
[5]   A digital secure image communication scheme based on the chaotic Chebyshev map [J].
Liao, XF ;
Li, XM ;
Pen, J ;
Chen, GR .
INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2004, 17 (05) :437-445
[6]   Image encryption using chaotic logistic map [J].
Pareek, N. K. ;
Patidar, Vinod ;
Sud, K. K. .
IMAGE AND VISION COMPUTING, 2006, 24 (09) :926-934
[7]   A new substitution-diffusion based image cipher using chaotic standard and logistic maps [J].
Patidar, Vinod ;
Pareek, N. K. ;
Sud, K. K. .
COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2009, 14 (07) :3056-3075
[8]  
[杨钒 YANG Fan], 2009, [合肥工业大学学报. 自然科学版, Journal of Hefei University of Technology. Natural Science], V32, P1128
[9]  
[张小华 Zhang Xiaohua], 2003, [中国图象图形学报. A, Journal of image and graphics], V8, P374
[10]  
Zheng Fan, 2008, Journal of Beijing University of Posts and Telecommunications, V31, P66