Research on Image Encryption Based on Double Chaos System with Mutual Disturbance

Article Preview

Abstract:

Low-dimensional chaotic encryption has a good operational efficiency but there is a problem of security flaws, therefore this paper proposes a composite chaos encryption system based on double mapping. Double mapping with mutual disturbance were used to generate the key sequence, and respectively with odd and even number of image pixels to realize the image encryption. The simulation results show that, the effect is very good; Correlation and so on security analysis shows that meet the requirements of the security; System overall evaluation results show that the proposed algorithm has better security and ease of implementation, can effectively resist brute force attack, statistic attack etc.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

437-441

Citation:

Online since:

December 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2015 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Wenquan Zhang, Ye Zhang, Nanrun Zhou. Nonlinear image Encryption algorithm based on random fractional Mellin transform. J. Journal of Computer Applications, 2013, 33(10): 2865-2867, In Chinese.

DOI: 10.3724/sp.j.1087.2013.02865

Google Scholar

[2] Han Zhang, Xiufeng Wang, ZhaohuiLi et al. A Fast Image Encryption Algorithm Based on Chaos System and Henon Map. J. Journal of Computer Research and Development, 2005, 42(12): 2137-2142, In Chinese.

DOI: 10.1360/crad20051216

Google Scholar

[3] Fan Zhang. A New Six-Dimensional Chaotic Algorithms and Its Application in Image Encryption. J. Microelectronics & Computer, 2013, 30(10): 62-65, In Chinese.

Google Scholar

[4] Linghuang Xiao, Dongye Guo. An efficient self-adaptive model for chaotic image encryption algorithm J. Communications in Nonlinear Science and Numerical Simulation, 2014, 19(2): 4094-4104, In Chinese.

DOI: 10.1016/j.cnsns.2014.04.012

Google Scholar

[5] Changci Wen, Qin Wang, Xianghong Liu et al. An Encryption Algorithm for Image Based on Affine and Composed Chaos .J. Journal of Computer Research and Development, 2013, 50(2):319-324, In Chinese.

Google Scholar

[6] Hongl Zhangi, Lili Song. Parameter identification in chaotic systems by means of quantum particle swarm optimization.J. Acta Physica Sinica, 2013, 62(19): 1905-1905 , In Chinese.

DOI: 10.7498/aps.62.190508

Google Scholar

[7] Daniel Caragata,  Ion Tutanescu. On the security of a new image encryption scheme based on a chaotic function [J]. Signal, Image and Video Processing, 2014, 8(4): 641-646.

DOI: 10.1007/s11760-013-0572-9

Google Scholar

[8] Jianguo Jin, Zhigang Di, Mingjun Wei. Potential risk of variable parameter cascade chaos system.J. Acta Physica Sinica, 2014, 63(12): 120509-120509, In Chinese.

DOI: 10.7498/aps.63.120509

Google Scholar

[9] Yongyi Mao, Yao Wang. Encryption algorithm based on double chaos system with mutual feedback[J]. Journal of Computer Applications. 2012, 32(10): 2768-2770, In Chinese.

DOI: 10.3724/sp.j.1087.2012.02768

Google Scholar