Image encryption by chaos mixing

被引:73
作者
Abanda, Yannick [1 ]
Tiedeu, Alain [1 ]
机构
[1] Natl Adv Sch Engn, LETS, POB 8390, Yaounde, Cameroon
关键词
image processing; cryptography; chaos; oscillators; image encryption; chaos mixing; chaos-based encryption technique; mixed chaotic maps; Colpitts oscillators; Duffing oscillators; encryption time; Lena; NebulaM83; Mandrill; Clown; ALGORITHM; SECURITY;
D O I
10.1049/iet-ipr.2015.0244
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The need for image encryption is constantly on the rise and has led to the emergence of many techniques in literature. In recent years, many chaos-based encryption techniques have developed with more or less success. In this study, we suggest one such approach using two oscillators. Mixed chaotic maps from the Colpitts and Duffing oscillators were used to encrypt images, which helped to increase the key space to 2(448)similar or equal to 7.26x10(134). The authors also succeeded to reduce the encryption time by saving the mixed chaotic maps and reusing them as need arose. The proposed system was tested on well-known images like Lena, NebulaM83, Mandrill and Clown.
引用
收藏
页码:742 / 750
页数:9
相关论文
共 31 条
[1]  
Ahmed A., 2013, SIGNAL PROCESS, V93, P2986
[2]  
Alsafasfeh Q. H., 2011, J INTELL LEARN SYST, V3, P198
[3]   Cryptanalyzing an improved security modulated chaotic encryption scheme using ciphertext absolute value [J].
Alvarez, G ;
Montoya, F ;
Romera, M ;
Pastor, G .
CHAOS SOLITONS & FRACTALS, 2005, 23 (05) :1749-1756
[4]   A robust hybrid method for image encryption based on Hopfield neural network [J].
Bigdeli, Nooshin ;
Farid, Yousef ;
Afshar, Karim .
COMPUTERS & ELECTRICAL ENGINEERING, 2012, 38 (02) :356-369
[5]   A new hyperchaotic map and its application in an image encryption scheme [J].
Boriga, Radu ;
Dascalescu, Ana Cristina ;
Priescu, Iustin .
SIGNAL PROCESSING-IMAGE COMMUNICATION, 2014, 29 (08) :887-901
[6]   Improving the security of chaotic encryption by using a simple modulating method [J].
Bu, SL ;
Wang, BH .
CHAOS SOLITONS & FRACTALS, 2004, 19 (04) :919-924
[7]   A hash-based image encryption algorithm [J].
Cheddad, Abbas ;
Condell, Joan ;
Curran, Kevin ;
McKevitt, Paul .
OPTICS COMMUNICATIONS, 2010, 283 (06) :879-893
[8]   A zero-crossing approach to uncover the mask by chaotic encryption with periodic modulation [J].
Chee, CY ;
Xu, DL ;
Bishop, SR .
CHAOS SOLITONS & FRACTALS, 2004, 21 (05) :1129-1134
[9]   A symmetric image encryption scheme based on 3D chaotic cat maps [J].
Chen, GR ;
Mao, YB ;
Chui, CK .
CHAOS SOLITONS & FRACTALS, 2004, 21 (03) :749-761
[10]   A fast ARX model-based image encryption scheme [J].
Choi, Jongseok ;
Seok, Seonhee ;
Seo, Hwajeong ;
Kim, Howon .
MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (22) :14685-14706