An efficient self-adaptive model for chaotic image encryption algorithm

被引:72
作者
Huang, Xiaoling [1 ]
Ye, Guodong [2 ]
机构
[1] Guangdong Ocean Univ, Coll Sci, Zhanjiang 524088, Guangdong, Peoples R China
[2] City Univ Hong Kong, Dept Elect Engn, Kowloon Tong, Hong Kong, Peoples R China
基金
中国国家自然科学基金;
关键词
Encryption algorithm; Self-adaptive method; Permutation; Chaotic systems; SCHEME;
D O I
10.1016/j.cnsns.2014.04.012
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
In this paper, an efficient self-adaptive model for chaotic image encryption algorithm is proposed. With the help of the classical structure of permutation-diffusion and double simple two-dimensional chaotic systems, an efficient and fast encryption algorithm is designed. However, different from most of the existing methods which are found insecure upon chosen-plaintext or known-plaintext attack in the process of permutation or diffusion, the keystream generated in both operations of our method is dependent on the plain-image. Therefore, different plain-images will have different keystreams in both processes even just only a bit is changed in the plain-image. This design can solve the problem of fixed chaotic sequence produced by the same initial conditions but for different images. Moreover, the operation speed is high because complex mathematical methods, such as Runge-Kutta method, of solving the high-dimensional partial differential equations are avoided. Numerical experiments show that the proposed self-adaptive method can well resist against chosen-plaintext and known-plaintext attacks, and has high security and efficiency. (C) 2014 Elsevier B.V. All rights reserved.
引用
收藏
页码:4094 / 4104
页数:11
相关论文
共 32 条
[1]   A new approach to chaotic image encryption based on quantum chaotic system, exploiting color spaces [J].
Abd El-Latif, Ahmed A. ;
Li, Li ;
Wang, Ning ;
Han, Qi ;
Niu, Xiamu .
SIGNAL PROCESSING, 2013, 93 (11) :2986-3000
[2]   Some basic cryptographic requirements for chaos-based cryptosystems [J].
Alvarez, Gonzalo ;
Li, Shujun .
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2006, 16 (08) :2129-2151
[3]   A chaotic block cipher algorithm for image cryptosystems [J].
Amin, Mohamed ;
Faragallah, Osama S. ;
Abd El-Latif, Ahmed A. .
COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2010, 15 (11) :3484-3497
[4]   Cryptanalysis of a one round chaos-based Substitution Permutation Network [J].
Arroyo, David ;
Diaz, Jesus ;
Rodriguez, F. B. .
SIGNAL PROCESSING, 2013, 93 (05) :1358-1364
[5]   Image encryption based on the Jacobian elliptic maps [J].
Behnia, S. ;
Akhavan, A. ;
Akhshani, A. ;
Samsudin, A. .
JOURNAL OF SYSTEMS AND SOFTWARE, 2013, 86 (09) :2429-2438
[6]   Chaotic and AES cryptosystem for satellite imagery [J].
Bin Muhaya, Fahad T. .
TELECOMMUNICATION SYSTEMS, 2013, 52 (02) :573-581
[7]   A symmetric image encryption scheme based on 3D chaotic cat maps [J].
Chen, GR ;
Mao, YB ;
Chui, CK .
CHAOS SOLITONS & FRACTALS, 2004, 21 (03) :749-761
[8]   An improvement over an image encryption method based on total shuffling [J].
Eslami, Ziba ;
Bakhshandeh, Atieh .
OPTICS COMMUNICATIONS, 2013, 286 :51-55
[9]   An efficient and secure medical image protection scheme based on chaotic maps [J].
Fu, Chong ;
Meng, Wei-hong ;
Zhan, Yong-feng ;
Zhu, Zhi-liang ;
Lau, Francis C. M. ;
Tse, Chi K. ;
Ma, Hong-feng .
COMPUTERS IN BIOLOGY AND MEDICINE, 2013, 43 (08) :1000-1010
[10]   A Designed Image Encryption Algorithm Based on Chaotic Systems [J].
Huang, Xiaoliang .
JOURNAL OF COMPUTATIONAL AND THEORETICAL NANOSCIENCE, 2012, 9 (12) :2130-2135