Image Encryption Method by Using Chaotic Mapping Based on Multi-Layer Parameter Disturbance

Article Preview

Abstract:

Bit-plane decomposition makes images obtain a number of layers. According to the amount of data information, images are encrypted, and the paper proposes image encryption method with Chaotic Mapping based on multi-layer parameter disturbance. The advantage of multi-layer parameter disturbance is that it not only scrambles pixel location of images, but also changes pixel values of images. Bit-plane decomposition can increase the space of key. And using chaotic sequence generated by chaotic system with different complexities to encrypt layers with different information content can save operation time. The simulation experiments show that using chaotic mapping in image encryption method based on multi-layer parameter disturbance can cover plaintext effectively and safely, which makes it achieve ideal encryption effect.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

479-484

Citation:

Online since:

July 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Chen Yanfeng, Li Yifang, Dual chaotic sequence image encryption algorithm of mutual scrambling , Journal of South China University of Technology, 2010, 35 (5): 27-33.

Google Scholar

[2] Li Tao, Liu Jian, Image scrambling method based on bit plane and chaotic system , Journal of Southwest University for Nationalities, 2009, 3: 595-599.

Google Scholar

[3] Hu Yonghui, Li Xingye, Image encryption algorithm based on dual chaotic crosstalk systems, Computer Application, 2009, 29(11): 2993-2997.

DOI: 10.3724/sp.j.1087.2009.02993

Google Scholar

[4] Li Jianxin, Zhu Rihong, Ding Xuxing, ROI image coding based on staggered multi-level bit planes , Journal of Image and Graphics, 2004, 9 (2): 201-206.

Google Scholar

[5] Narendra Singh, Aloka Sinha. Optical image encryption using improper Hartley transform and Chaos , Optik-International Journal for Light and Electron Optics. 2010, 121 (10): 918-925.

DOI: 10.1016/j.ijleo.2008.09.049

Google Scholar

[6] Zhao Li, Zhang Xuefeng, Fan Jiulun, An improved method of generating chaotic sequences , Computer Engineering and Application, 2006, 23: 31-33.

Google Scholar

[7] Wang Yiran, Wang Chunxia, Zhan Xinsheng, Method of evaluation performance of image encryption algorithm , Microcomputer Information, 2006, 8-1:313-314.

Google Scholar

[8] V Patidar, NK Pareek, KK Sud. A new substitution-diffusion based image cipher using chaotic standard and logistic maps. Communications in Nonlinear Science and Numerical Simulation, 2009, 14(7): 3056-3075.

DOI: 10.1016/j.cnsns.2008.11.005

Google Scholar