A secure image encryption scheme based on chaotic maps and affine transformation

被引:0
作者
Jawad Ahmad
Seong Oun Hwang
机构
[1] Hongik University,Department of Electronics and Computer Engineering, Graduate School
[2] Hongik University,Department of Computer and Information Communication Engineering
来源
Multimedia Tools and Applications | 2016年 / 75卷
关键词
Chaotic maps; Cryptography; Key space; TD-ERCS map; PWLCM; Image encryption; Affine transformation; Security analysis; Secure communication;
D O I
暂无
中图分类号
学科分类号
摘要
Due to the interesting nonlinear dynamic properties of chaotic maps, recently chaos-based encryption algorithms have gained much attention in cryptographic communities. However, many encryption schemes do not fulfil the minimum key space requirement, which is an essential concern in many secure data applications. In this paper, an efficient chaos-based image encryption scheme with higher key space is presented. Even with a single round of encryption, a significantly larger key space can be achieved. The proposed scheme removes correlation among image pixels via random chaotic sequences, simply by XOR and addition operations. In order to resist against numerous attacks, we apply the affine transformation to get the final ciphertext image. The security of the proposed scheme is proved through histogram, contrast, PSNR, entropy, correlation, key space, key sensitivity and differential attack analysis. Many significant properties of chaotic maps, sensitivity to initial condition and control parameters, structure and attack complexity, make the anticipated scheme very reliable, practical and robust in various secure communication applications.
引用
收藏
页码:13951 / 13976
页数:25
相关论文
共 103 条
  • [1] Ahmad J(2012)Efficiency analysis and security evaluation of image encryption schemes IJENS 23 18-31
  • [2] Ahmed F(2015)Cryptanalysis of an improvement over an image encryption method based on total shuffling Opt Commun 350 77-82
  • [3] Akhavan A(2006)Some basic cryptographic requirements for chaos-based cryptosystems Int J Bifurcation Chaos 16 2129-2151
  • [4] Samsudin A(2014)Chaotic substitution for highly autocorrelated data in encryption algorithm Commun Nonlinear Sci Numer Simul 19 3106-3118
  • [5] Akhshani A(2014)A noisy channel tolerant image encryption scheme Wirel Pers Commun 77 2771-2791
  • [6] Alvarez G(2008)A novel algorithm for image encryption based on mixture of chaotic maps Chaos, Solitons & Fractals 35 408-419
  • [7] Li S(2004)A symmetric image encryption scheme based on 3d chaotic cat maps Chaos, Solitons Fractals 21 749-761
  • [8] Anees A(2014)Cryptanalysis and improvement of an optical image encryption scheme using a chaotic baker map and double random phase encoding J Opt 16 125403-033002
  • [9] Siddiqui AM(2009)Homomorphic image encryption J Electron Imaging 18 033002-1284
  • [10] Ahmed F(1998)Symmetric ciphers based on two-dimensional chaotic maps Int J Bifurcation Chaos 8 1259-399