An image encryption algorithm based on irregular wave representation

被引:0
作者
Xiaoling Huang
Guodong Ye
机构
[1] Guangdong Ocean University,Faculty of Mathematics and Computer Science
[2] Zhejiang University,College of Information Science and Electronic Engineering
来源
Multimedia Tools and Applications | 2018年 / 77卷
关键词
Irregular wave; Image encryption; 2D Logistic map; Security;
D O I
暂无
中图分类号
学科分类号
摘要
For a gray image, every row (column) can be seen as an irregular wave. Activated by the architecture of permutation-diffusion based image encryption scheme, a chaotic image encryption algorithm is proposed to change the representation of irregular waves in the plain-image. To reduce the high correlation, permutation for both rows and columns is taken in the first stage. Due to the transposition of pixels in row/column, wave shapes will be changed according to the pseudo-random sequences generated from chaotic map. Specifically, pixels in each wave (row or column) are divided into two groups by energy (a bigger one and a smaller one). Then different groups are employed to manipulate the production of chaotic sequence. As a result, the chosen-plaintext and known-plaintext attacks will be difficult due to the plain-image dependent keystream. In the second stage, wave-by-wave diffusion in column is carried out such that any tiny change in the plain-image spreads out uniformly to the whole cipher-image. The keystream used in diffusion is designed again dependent on the permuted image obtained from the first stage. In this way, the security of the proposed algorithm can be further strengthened compared with some existing algorithms. Related security analyses also show that our method can satisfy common requirements of secure communication for daily images.
引用
收藏
页码:2611 / 2628
页数:17
相关论文
共 50 条
  • [41] Image Cheat Encryption Algorithm Based on Hyperchaotic System
    Yong, Zhang
    2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM), 2010,
  • [42] A Secure Image Encryption Algorithm Based on Polar Decomposition
    Singh, Satendra Pal
    Bhatnagar, Gaurav
    Gurjar, Dharmendra Kumar
    2018 IEEE 14TH INTERNATIONAL COLLOQUIUM ON SIGNAL PROCESSING & ITS APPLICATIONS (CSPA 2018), 2018, : 135 - 139
  • [43] A chaotic algorithm of image encryption based on dispersion sampling
    Ren Honge
    Shang Zhenwei
    Wang Yuanzhi
    Zhang Jian
    ICEMI 2007: PROCEEDINGS OF 2007 8TH INTERNATIONAL CONFERENCE ON ELECTRONIC MEASUREMENT & INSTRUMENTS, VOL II, 2007, : 836 - +
  • [44] Grayscale image encryption algorithm based on chaotic maps
    李昌刚
    韩正之
    Journal of Harbin Institute of Technology(New series), 2003, (03) : 329 - 331
  • [45] Image Encryption Algorithm Based on Henon Chaotic System
    Chen Wei-bin
    Zhang Xin
    PROCEEDINGS OF 2009 INTERNATIONAL CONFERENCE ON IMAGE ANALYSIS AND SIGNAL PROCESSING, 2009, : 94 - +
  • [46] A novel parallel image encryption algorithm based on chaos
    Ünal Çavuşoğlu
    Sezgin Kaçar
    Cluster Computing, 2019, 22 : 1211 - 1223
  • [47] An Image Encryption Algorithm Based on an Epidemic Spreading Model
    Zhang, Wei
    Wang, Shuwen
    Zhu, Guangdong
    Han, Weijie
    Zhu, Zhiliang
    INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2022, 32 (10):
  • [48] Image encryption algorithm based on butterfly module and chaos
    Zhang, Yong
    MATHEMATICS AND COMPUTERS IN SIMULATION, 2025, 232 : 382 - 407
  • [49] A novel parallel image encryption algorithm based on chaos
    Cavusoglu, Unal
    Kacar, Sezgin
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (04): : 1211 - 1223
  • [50] Medical Image Encryption Algorithm Based on Chaotic Function
    Zhang, Junjie
    Tan, Jun
    Cheng, Yun
    2017 4TH INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND CONTROL ENGINEERING (ICISCE), 2017, : 446 - 450