Image encryption algorithm with compound chaotic maps

被引:20
作者
Li, Xuan [1 ]
Zhang, Guoji [2 ]
Zhang, Xiayan [3 ]
机构
[1] Guangdong Univ Finance & Econ, Dept Informat Sci, Guangzhou 510320, Guangdong, Peoples R China
[2] S China Univ Technol, Dept Sci, Guangzhou 510640, Guangdong, Peoples R China
[3] S China Univ Technol, Dept Comp Sci & Engn, Guangzhou 510640, Guangdong, Peoples R China
关键词
Image encryption; Chaotic system; Even symmetric map; Skew tent map;
D O I
10.1007/s12652-013-0217-4
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper proposes a novel image encryption scheme based on two even-symmetric chaotic maps and a skew tent chaotic map. In the permutation process, a P-box produced by sorting an even-symmetric chaotic sequence is applied to shuffle the positions of all image pixels. In the diffusion process, both even-symmetric chaotic map and skew tent map are used to generate the key stream. The pixels in the permuted image determine which of two even-symmetric chaotic maps is iterated for next byte in the keystream each time, so the keystream is closely related to the plain image. The performance and security of the proposed method are evaluated thoroughly histogram, correlation of adjacent pixels, information entropy and sensitivity analysis. Results are encouraging and suggest that the scheme is reliable to be adopted for the secure image communication application.
引用
收藏
页码:563 / 570
页数:8
相关论文
共 22 条
[1]   Cryptanalyzing a nonlinear chaotic algorithm (NCA) for image encryption [J].
Alvarez, G. ;
Li, Shujun .
COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2009, 14 (11) :3743-3749
[2]   A chaotic block cipher algorithm for image cryptosystems [J].
Amin, Mohamed ;
Faragallah, Osama S. ;
Abd El-Latif, Ahmed A. .
COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2010, 15 (11) :3484-3497
[3]  
[Anonymous], APPL SOFT COMPUT
[4]   A cyber-physical approach to secret key generation in smart environments [J].
Barsocchi, Paolo ;
Chessa, Stefano ;
Martinovic, Ivan ;
Oligeri, Gabriele .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2013, 4 (01) :1-16
[5]   Efficient Fair Conditional Payments for Outsourcing Computations [J].
Chen, Xiaofeng ;
Li, Jin ;
Susilo, Willy .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (06) :1687-1694
[6]   Multi chaotic systems based pixel shuffle for image encryption [J].
Huang, C. K. ;
Nien, H. H. .
OPTICS COMMUNICATIONS, 2009, 282 (11) :2123-2127
[7]   Statistics of chaotic binary sequences [J].
Kohda, T ;
Tsuneda, A .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1997, 43 (01) :104-112
[8]   A fast image encryption system based on chaotic maps with finite precision representation [J].
Kwok, H. S. ;
Tang, Wallace K. S. .
CHAOS SOLITONS & FRACTALS, 2007, 32 (04) :1518-1529
[9]   Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks [J].
Li, Chengqing ;
Lo, Kwok-Tung .
SIGNAL PROCESSING, 2011, 91 (04) :949-954
[10]   On the security defects of an image encryption scheme [J].
Li, Chengqing ;
Li, Shujun ;
Asim, Muhammad ;
Nunez, Juana ;
Alvarez, Gonzalo ;
Chen, Guanrong .
IMAGE AND VISION COMPUTING, 2009, 27 (09) :1371-1381