A Novel Image Encryption Scheme based on a Nonlinear Chaotic Map

Full Text (PDF, 782KB), PP.61-68

Views: 0 Downloads: 0

Author(s)

Shujiang Xu 1,* Ying-Long WANG 1 Yucui Guo 2 Cong Wang 2

1. Shandong Provincial Key Laboratory of computer Network, Shandong Computer Science Center, Jinan, PR China

2. Beijing University of Posts and Telecommunications, Beijing, PR China

* Corresponding author.

DOI: https://doi.org/10.5815/ijigsp.2010.01.08

Received: 17 Jun. 2010 / Revised: 5 Aug. 2010 / Accepted: 14 Sep. 2010 / Published: 8 Nov. 2010

Index Terms

Chaos, chaotic cryptosystem, image encryption

Abstract

Only by means of XOR operation, a novel image encryption scheme is proposed based on a nonlinear chaotic map (NCM). There are two rounds in the proposed image encryption scheme. In each round of the scheme, the pixel gray values are modified from the first pixel to the last pixel firstly, and then the modified image is encrypted from the last pixel to the first pixel in the inverse order. In order to accelerate the encryption speed, every time NCM is iterated, n (n>3) bytes random numbers which are used to mask the plain-image can be gained. And to enhance the security, a small perturbation will be given to the parameters of the NCM based on the last obtained n bytes modified elements before next iteration. Experimental results and theory analysis show that the algorithm has a high security performance and a good efficiency.

Cite This Paper

Shujiang Xu,Yinglong Wang,Yucui Guo,Cong Wang, "A Novel Image Encryption Scheme based on a Nonlinear Chaotic Map", IJIGSP, vol.2, no.1, pp.61-68, 2010. DOI: 10.5815/ijigsp.2010.01.08

Reference

[1]Z. H. Guan, F. Huang and W. Guan, “Chaos-based image encryption algorithm,” Phys. Lett. A, vol. 346, no. 1-3, pp. 153-157, 2005. 

[2]G. Y. Chen, Y. B. Mao, C. K. Chui, “A symmetric image encryption scheme based on 3D chaotic cat maps,” Chaos, Solitons and Fractals, vol. 21, no.3, pp. 749-761, 2004.

[3]R. Matthews, “On the derivation of a 'chaotic' encryption algorithm,” Cryptologia, vol. 13, no. 1, pp. 29-42, 1989.

[4]J. Fridrich, “Image encryption based on chaotic maps,” The 1997 IEEE International Conference on Systems, Man, and Cybernetics, Hyatt Orlando, Florida, USA, vol. 2, pp. 1105-1110, October 12-15, 1997.

[5]J. Fridrich, “Symmetric ciphers based on two-dimensional chaotic maps,” Int. J. Bifurcat Chaos, vol. 8, no. 6, pp. 1259-1284, 1998.

[6]T. Xiang, X. F. Liao, G. P. Tang, Y. K. Chen, and W. Wong, “A novel block cryptosystem based on iterating a chaotic map,” Phys. Lett. A, vol. 349, no. 1-4, pp. 109-115, 2006. 

[7]W. W. Yu and J. D. Cao, “Cryptography based on delayed chaotic neural networks,” Phys. Lett. A, vol. 356, no. 4-5, pp. 333-338, 2006.

[8]T. G. Gao and Z. Q. Chen, “Image encryption based on a new total shuffling algorithm,” Chaos, Solitons and Fractals, vol. 38, no.1, pp. 213-220, 2008.

[9]T. G. Gao and Z. Q. Chen, “A new image encryption algorithm based on hyper-chaos,” Phys. Lett. A, vol. 372, no. 4, pp. 394-399, 2008.

[10]G. Alvarez, F. Montoya, M. Romera, and G Pastor, “Cryptanalysis of an ergodic chaotic cipher,” Phys. Lett. A, vol. 311, no. 2-3, pp. 172-179, 2003.

[11]C. Q. Li, S. J. Li, G. Alvarez, G. R. Chen, and K. T. Lo, “Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations,” Phys Lett A, Vol. 369, no. 1-2, pp. 23-30, 2007.

[12]S. J. Xu and J. Z. Wang, “An improved block cryptosystem based on iterating chaotic map,” Acta Phys. Sin., vol. 57, no. 1, pp. 37-41, 2008.

[13]Y. Wang, X. F. Liao, T. Xiang, K. W. Wong and D. G. Yang, “Cryptanalysis and improvement on a block cryptosystem based on iteration a chaotic map,” Phys. Lett. A, vol. 363, no. 4, pp. 277-281, 2007.

[14]D. Arroyo, C. Q. Li, S. J. Li, G. Alvarez and W. A. Halang, “Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm,” Chaos, Solitons and Fractals, vol. 41, no. 5, 2613-2616, 2009. 

[15]A. Akhshani, H. Mahmodi and A.Akhavan, “A Novel Block Cipher Based on Hierarchy of One-Dimensional Composition Chaotic Maps,” IEEE Int. Conf. on Image Processing, Atlanta, GA, USA, pp. 1993-1996, Oct. 2006.

[16]H. P. Xiao and G. J. Zhang, “An Image Encryption Scheme Based on Chaotic Systems,” the Fifth Int. Conf. on Machine Learning and Cybernetics, Dalian, China, vol. 5, pp. 2707-271, Aug. 2006.

[17]C. Fu, Z. C. Zhang and Y.Y. Cao, “An Improved Image Encryption Algorithm Based on Chaotic Maps,” thr Third Int. Conf. on Natural Comput. Haikou, Hainan, China, vol. 3, pp. 189-193, Aug. 2007.

[18]Y. Y. Cao and C. Fu, “An image encryption scheme based on high dimension chaos system,” International Conference on Intelligent Computation Technology and Automation, Changsha, Hunan, China, vol. 1, pp. 104-108, October 20-22, 2008. 

[19]H. Y. Jiang and C. Fu, “An Image Encryption Scheme Based on Lorenz Chaos System”, Fourth International Conference on Natural Computation, Jinan, China, vol. 4, pp. 600-604, October 18-20, 2008.

[20]S. J Xu, J. Z. Wang and S. X. Yang, “An improved image encryption algorithm based on chaotic maps,” Chin. Phys. B, vol. 17, no. 11, pp. 4027-4032, 2008.

[21]T. G. Gao and Z. Q. Chen, “Image encryption based on a new total shuffling algorithm,” Chaos, Solitons and Fractals, vol. 38, no.1, pp. 213-220, 2008.

[22]T. G. Gao and Z. Q. Chen, “A new image encryption algorithm based on hyper-chaos,” Phys. Lett. A, vol. 372, no. 4, pp. 394-399, 2008.

[23]S. Behnia, A. Akhshani, S. Ahadpour, H. Mahmodi, and A. Akhavand, “A fast chaotic encryption scheme based on piecewise nonlinear chaotic maps,” Phys. Let. A, vol. 366, no. 4-5, pp. 391-396, 2007.

[24]S. Behnia, A. Akhshani, H. Mahmodi, and A. Akhavand, “A novel algorithm for image encryption based on mixture of chaotic maps,” Chaos, Solitons and Fractals, vol. 35, no. 2, pp. 408-419, 2008.

[25]F. Y. Sun, S. T. Liu, Z. Q. Li, Z. W. Lu, “A novel image encryption scheme based on spatial chaos map,” Chaos, Solitons and Fractals, vol. 38, no. 3, pp. 631-640, 2008.

[26]X. Y. Wang, Chaos in complex nonlinear system, Beijing: Publishing House of Electronics Industry, 2003.

[27]S. S. E. H. Elnashaie, Abasha ME, “On the chaotic behaviour of forced fluidized bed catalytic reactors,” Chaos, Solitons and Fractals, vol. 5, no. 5, pp. 797-831, 1995.

[28]L.Kocarev, “Chaos-based cryptography: a brief overview,” IEEE Circuits and Systems Magazine, vol. 1, no. 3, pp. 6-21, 2001.

[29]M. I. Sobhy, A. R. Shehata, “Methods of attacking chaotic encryption and countermeasures,” IEEE Acoust Speech Signal Process, Salt Lake City, UT, USA, vol. 2, pp. 1001-4, 2001.

[30]H. J. Gao, Y. S. Zhang, S. Y. liang and D. Q. Li, “A new chaotic algorithm for image encryption,” Chaos, Solitons and Fractals, Vol. 29, no. 2, pp. 393-399, 2006.