A Fast Image Encryption by Bit-Chaotic-Shuffle Based on Chaotic Systems

Article Preview

Abstract:

Due to rapid developments in computer networking and communi- cation technology, users have begun to use personal computers to transmit images through the internet. However, this activity puts users at risk of hacker attacks and theft. Although single pixel position shuffling can eliminate an image’s contour, it cannot hide the characteristics of the grey-level spectrum. Because the dynamic trajectories of a chaotic system are highly sensitive to the initial values of the system, applying chaotic-ciphering to the image will result in a good encryption effect, and significantly enhance the key space of the encrypted image. For these reasons, this paper propose a novel and simple Bit-Chaotic-Shuffle (BCS) technique for encryption on color images that is based on multi chaotic systems. This technique not only eliminates image contours, but also disorders the characteristics of the RGB-level spectrum. This encryption method also adopts three chaotic systems in which the key space reaches 10137, thoroughly preventing decryption by an exhaustive attack. This paper further applies the correction coefficient and Mean Square Error (MSE) methods to prove the encryption and the high security performance of the proposed encryption system

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 424-425)

Pages:

761-764

Citation:

Online since:

January 2012

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Chen, G., Mao, Y., Chui, C. K.: A Symmetric Image Encryption Scheme Based on 3D Chaotic Cat Maps, Chaos Solitons Fractals, 21, 749-761 (2004).

DOI: 10.1016/j.chaos.2003.12.022

Google Scholar

[2] Zhang, L., Liao, X., Wang, X.: An Image Encryption Approach Based on Chaotic Maps, Chaos Solitons Fractals, 24, 759-765 (2005).

DOI: 10.1016/j.chaos.2004.09.035

Google Scholar

[3] Pareek, N. K., Patidar, V., Sud, K. K.: Image Encryption Using Chaotic Logistic Map, Image Vision Computing, 24, 926-934 (2006).

DOI: 10.1016/j.imavis.2006.02.021

Google Scholar

[4] Zhang, W., He, R.: An Encryption and Hiding Algorithm Based on Logistic Chaotic Sequences, Journal of Lanzhou Jiaotong University (Natural Sciences), 25, 80-82 (2006).

Google Scholar

[5] Zhu, C. X., Chen, Z. G., Ouyang, W. W.: A New Image Encryption Algorithm Based on General Chen's Chaotic System, Journal of Central South University (Science and Technology), 37, 1142-1148 (2006).

Google Scholar

[6] Sun, Z. J., Chen, Y.: A New Image Encryption Algorithm Based-on Lorenz System, Microprocessors, 3, 49-52 (2007).

Google Scholar

[7] Kwok, H. S., Tang, W. K. S.: A Fast Image Encryption System Based on Chaotic Maps with Finite Precision Representation, Chaos Solitons Fractals, 32, 1518- 1529 (2007).

DOI: 10.1016/j.chaos.2005.11.090

Google Scholar

[8] Gao, T., Chen, Z.: A New Image Encryption Algorithm Based on Hyper-chaos, Phys. Lett. A, 372, 394-400 (2008).

DOI: 10.1016/j.physleta.2007.07.040

Google Scholar

[9] Guan, Z. H., Huang, F., Guan, W.: Chaos-based Image Encryption Algorithm, Phys. Lett. A, 346, 153-157 (2005).

DOI: 10.1016/j.physleta.2005.08.006

Google Scholar

[10] Bluman, A. G.: Elementary Statistics, 3rd Edition. New York: McGraw-Hill (1998).

Google Scholar

[11] Wang, X., Zhao, D., Chen, L.: Image Encryption Based on Extended Fractional Fourier Transform and Digital Holography Technique, Opt. Commun. 260, 449- 453 (2006).

DOI: 10.1016/j.optcom.2005.11.006

Google Scholar