Image Encryption Algorithm Based on Chaos and S-Boxes Scrambling

Article Preview

Abstract:

Due to some features of images, traditional encryption algorithms are not suitable for practical image encryption. Considering this problem, a novel feistel network image encryption algorithm is proposed in this paper. Taking advantage of the desirable properties of mixing and sensitivity to initial parameters of chaotic maps, a sub key generator with couple chaotic maps is presented in this scheme. Meanwhile, the encryption algorithm includes a new mixing algorithm which is designed with thirty s-boxes of AES. To enhance the security of the new scheme, the encryption processes were combined in feistel network. The results of analysis and simulation experiments indicate that the scheme is secure and performed well in preventing attacks, such as brute force attack, entropy attack and statistics attack.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 171-172)

Pages:

299-304

Citation:

Online since:

December 2010

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Zhuohui Xian, Shiliang Sun: Study on test for structure of s-boxes in rijndael. Proceedings of The Second International Workshop on Education Technology and Computer Science. Los Alamitos: IEEE Press, vol. 3, pp.84-86, (2010).

DOI: 10.1109/etcs.2010.227

Google Scholar

[2] Shujun Li, Xuanqin Mou, Yuan-Long Cai: Pseudo-random bit generator based on couple chaotic systems and its applications in stream-cipher cryptography. Progress in Cryptology-INDOCRYPT 2001, pp.316-329, (2001).

DOI: 10.1007/3-540-45311-3_30

Google Scholar

[3] Yanyun Cheng, Chunxia Fan: Realizing and application of perturbing digital chaotic systems. Computer Engineering and Applications, vol. 45, No. 33, pp.240-244, (2009).

Google Scholar

[4] Joan Daemen, Vincent Rijmen: The rijndael block cipher. http: /csrc. nist. gov/encryption/aes/rijndael.

DOI: 10.1007/978-3-662-60769-5_3

Google Scholar

[5] Schneier B: Applied cryptography: protocols, algorithms, and source code in C. New York: Wiley, (1995).

Google Scholar

[6] Xudong Li: Analysis and Improvement of Formulas for Evaluating Similarity Degree of Digital Watermarks. Acta automatica sinica, vol. 34, No. 2, pp.208-210, (2008).

DOI: 10.3724/sp.j.1004.2008.00208

Google Scholar

[7] Guorong Chen, Yao-bin Mao and Charles K. Chui: A symmetric image encryption based on 3D chaotic maps. Chaos, Solitons & Fractals, vol. 21, No. 3, pp.749-761, (2004).

DOI: 10.1016/j.chaos.2003.12.022

Google Scholar