A Novel Encryption Algorithm Based on DWT and Multichaos Mapping

被引:66
作者
Wang, Wei [1 ]
Tan, Haiyan [1 ]
Pang, Yu [1 ]
Li, Zhangyong [1 ]
Ran, Peng [1 ]
Wu, Jun [2 ]
机构
[1] Chongqing Univ Posts & Telecommun, Chongqing 400065, Peoples R China
[2] Chongqing Kaize Technol Co Ltd, Chongqing 400042, Peoples R China
基金
美国国家科学基金会;
关键词
IMAGE ENCRYPTION; CIPHER; CRYPTANALYSIS; DCT;
D O I
10.1155/2016/2646205
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Encryption of a digital image is very important especially in applications of body area networks (BANs) since the image may include a number of privacy. Past encryption methods have disadvantages of the small key space and low ability of resistance to attack. In this paper, we propose a new encryption algorithmbased on discrete wavelet transform(DWT) and multichaos which has characteristics of the deterministic, pseudorandomness, and sensitivity of initial values. The image is first decomposed and spatial reconstructed by two-dimensional DWT and then is performed by multichaos matrices for space encryption. The experimental results indicate that the proposed algorithm has a large key space, high key sensitivity, and excellent ability of resistance to attack.
引用
收藏
页数:7
相关论文
共 26 条
[1]   A new image cipher in time and frequency domains [J].
Abd El-Latif, Ahmed A. ;
Niu, Xiamu ;
Amin, Mohamed .
OPTICS COMMUNICATIONS, 2012, 285 (21-22) :4241-4251
[2]   A hybrid genetic algorithm and chaotic function model for image encryption [J].
Abdullah, Abdul Hanan ;
Enayatifar, Rasul ;
Lee, Malrey .
AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, 2012, 66 (10) :806-816
[3]  
[Anonymous], 2012, International Journal of Video and Image Processing and Network Security
[4]   Cryptanalysis of an encryption scheme for binary images [J].
Chang, CC ;
Yu, TX .
PATTERN RECOGNITION LETTERS, 2002, 23 (14) :1847-1852
[5]   Novel SCAN-CA-based image security system using SCAN and 2-D von Neumann cellular automata [J].
Chen, Rong-Jian ;
Horng, Shi-Jinn .
SIGNAL PROCESSING-IMAGE COMMUNICATION, 2010, 25 (06) :413-426
[6]  
El-Zoghdy Said F., 2011, International Journal of Advanced Networking and Applications, V2, P796
[7]   A fast chaotic block cipher for image encryption [J].
Fouda, J. S. Armand Eyebe ;
Effa, J. Yves ;
Sabat, Samrat L. ;
Ali, Maaruf .
COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2014, 19 (03) :578-588
[8]  
Jolfaei Alireza, 2010, Journal of Theoretical and Applied Information Technology, V19, P117
[9]   On the security defects of an image encryption scheme [J].
Li, Chengqing ;
Li, Shujun ;
Asim, Muhammad ;
Nunez, Juana ;
Alvarez, Gonzalo ;
Chen, Guanrong .
IMAGE AND VISION COMPUTING, 2009, 27 (09) :1371-1381
[10]   Image encryption combining multiple generating sequences controlled fractional DCT with dependent scrambling and diffusion [J].
Liang, Yaru ;
Liu, Guoping ;
Zhou, Nanrun ;
Wu, Jianhua .
JOURNAL OF MODERN OPTICS, 2015, 62 (04) :251-264