An image encryption algorithm based on irregular wave representation

被引:0
作者
Xiaoling Huang
Guodong Ye
机构
[1] Guangdong Ocean University,Faculty of Mathematics and Computer Science
[2] Zhejiang University,College of Information Science and Electronic Engineering
来源
Multimedia Tools and Applications | 2018年 / 77卷
关键词
Irregular wave; Image encryption; 2D Logistic map; Security;
D O I
暂无
中图分类号
学科分类号
摘要
For a gray image, every row (column) can be seen as an irregular wave. Activated by the architecture of permutation-diffusion based image encryption scheme, a chaotic image encryption algorithm is proposed to change the representation of irregular waves in the plain-image. To reduce the high correlation, permutation for both rows and columns is taken in the first stage. Due to the transposition of pixels in row/column, wave shapes will be changed according to the pseudo-random sequences generated from chaotic map. Specifically, pixels in each wave (row or column) are divided into two groups by energy (a bigger one and a smaller one). Then different groups are employed to manipulate the production of chaotic sequence. As a result, the chosen-plaintext and known-plaintext attacks will be difficult due to the plain-image dependent keystream. In the second stage, wave-by-wave diffusion in column is carried out such that any tiny change in the plain-image spreads out uniformly to the whole cipher-image. The keystream used in diffusion is designed again dependent on the permuted image obtained from the first stage. In this way, the security of the proposed algorithm can be further strengthened compared with some existing algorithms. Related security analyses also show that our method can satisfy common requirements of secure communication for daily images.
引用
收藏
页码:2611 / 2628
页数:17
相关论文
共 50 条
  • [31] A modified method for image encryption based on chaotic map and genetic algorithm
    Ghazvini, Mahdieh
    Mirzadi, Mojdeh
    Parvar, Negin
    MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (37-38) : 26927 - 26950
  • [32] Improving Security of an Image Encryption Algorithm based on Chaotic Circular Shift
    Li, Weihai
    Yuan, Yuan
    2009 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS (SMC 2009), VOLS 1-9, 2009, : 3694 - +
  • [33] A chaotic permutation and diffusion based image encryption algorithm for secure communications
    Bhaskar Mondal
    Prabhakar Kumar
    Shrey Singh
    Multimedia Tools and Applications, 2018, 77 : 31177 - 31198
  • [34] Fast and Efficient Image Encryption Algorithm Based on Modular Addition and SPD
    Butt, Khushbu Khalid
    Li, Guohui
    Khan, Sajid
    Manzoor, Sohaib
    ENTROPY, 2020, 22 (01) : 112
  • [35] A chaotic permutation and diffusion based image encryption algorithm for secure communications
    Mondal, Bhaskar
    Kumar, Prabhakar
    Singh, Shrey
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (23) : 31177 - 31198
  • [36] Design of A Novel Image Block Encryption Algorithm Based on Chaotic Systems
    Peng, Jun
    Zhang, Du
    Liao, Xiaofeng
    PROCEEDINGS OF THE 8TH IEEE INTERNATIONAL CONFERENCE ON COGNITIVE INFORMATICS, 2009, : 215 - +
  • [37] A modified method for image encryption based on chaotic map and genetic algorithm
    Mahdieh Ghazvini
    Mojdeh Mirzadi
    Negin Parvar
    Multimedia Tools and Applications, 2020, 79 : 26927 - 26950
  • [38] Genetic algorithm for attack of image encryption scheme based chaotic map
    Mekhaznia, Tahar
    Zidani, Abdelmadjid
    2016 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY FOR ORGANIZATIONS DEVELOPMENT (IT4OD), 2016,
  • [39] Breaking an Image Encryption Algorithm Based on DNA Encoding and Spatiotemporal Chaos
    Wen, Heping
    Yu, Simin
    Lue, Jinhu
    ENTROPY, 2019, 21 (03)
  • [40] Image encryption algorithm based on universal modular transformation
    Yang X.
    Yu X.
    Zou Q.
    Jia J.
    Information Technology Journal, 2010, 9 (04) : 680 - 685