A New Image Encryption Algorithm of Input-Output Feedback Based on Multi-Chaotic System

Article Preview

Abstract:

In this paper, a new method is proposed for image encryption by using Transformed Logistic map and Cat map. First, the Transformed logistic map is used to generating two coordinate sequences, and then the primary image's pixels shuffled by the two coordinate sequences. After shuffling, the key stream is produced by the Cat map to encrypt the shuffled image. Theoretical analysis and experimental results indicate that the proposed algorithm has a perfect encryption effect and can resist common attacks

You might also be interested in these eBooks

Info:

Periodical:

Pages:

924-929

Citation:

Online since:

November 2010

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] YU Wanbo, Calculation and analysis of chaos, Beijing, Science Press, p.16–30, june (2008).

Google Scholar

[2] Behnia S, Akhshani A, Mahmodi H, Akhavan. A, A novel algorithm for image encryption based on mixture of chaotic maps, Chaos solitons & fractals, vol. 35, January. 2008, pp.408-419.

DOI: 10.1016/j.chaos.2006.05.011

Google Scholar

[3] CHEN Gang, ZHAO Xiaoyu, LI Junli, A Self-Adaptive Algorithm on image Encryption, Journal of Software, vol. 16, 2005, p.1975-(1982).

Google Scholar

[4] Wong K-W, Kwok B S-H, Law W-S, A fast image encryption scheme based on chaotic standard map, Physics Letters A, vol. 372, 2008, pp.2645-2652.

DOI: 10.1016/j.physleta.2007.12.026

Google Scholar

[5] Chen Wei-bin, Zhang Xin, Image Encryption Algorithm Based on Henon Chaotic System, Image Analysis and Signal Processing, 2009, International Conference on. IEEE Press, April. 2009, pp.94-97.

DOI: 10.1109/iasp.2009.5054653

Google Scholar

[6] Min Long, Li Tan, A chaos-based data encryption algorithm for image/video, The Second International Conference on Multi-Media and Information Technology. IEEE Press, April. 2010, pp.172-175.

DOI: 10.1109/mmit.2010.27

Google Scholar

[7] XIE Jianquan, YANG Chunhua, XIE Qing, TIAN Lijun, An Encryption Algorithm Based on Transformed Logistic Map, Intenational Conference on Networks Security, Wireless Communications and Trusted Computing, 2009. IEEE Press, April 2009, pp.111-114.

DOI: 10.1109/nswctc.2009.201

Google Scholar

[8] C. E. Shannon, Communication theory of security systems, The Bell Syst Tech J. vol. 27, 1948, pp.379-423, 623-656.

Google Scholar