Image Encryption Algorithm Based on Self-Adaptive and Chaos Theory

Article Preview

Abstract:

An image encryption algorithm based on self-adaptive and chaos theory is presented. The scrambling transformation is completed with Logistic chaos and S-box first. Then self-adaptive image encryption scheme is used to deal with gray transformation for each pixel and image encryption is finished at last. Theoretical analyses and simulated experiment show that the proposed image encryption algorithm provides perfect results, larger key space, simple and easy to be implemented and fast running speed, so this encryption algorithm has excellent performance against many kinds of attacks and has strong practicality.

You might also be interested in these eBooks

Info:

Periodical:

Key Engineering Materials (Volumes 467-469)

Pages:

231-235

Citation:

Online since:

February 2011

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] HE Chuang-yi, CHEN Le-geng, WAMG Zhi-da. Chaotic image scrambling algorithm base on image magic cube[J]. Computer Systems& Applications, 2010, 19(5): 50-53.

Google Scholar

[2] ZHOU Qing, HU Yue, LIAO Xiao-feng. Analysis and improvement of a self-adaptive image encryption algorithm[J]. ACTA Electronic Sinica, 2009, 37(12): 2730-2734.

Google Scholar

[3] WANG De, ZHANG Yuan-biao. Image encryption arithmetic based on S-boxes scrambling and chaos theory[J]. Computer Engineering and Applications, 2008, 44(19): 50-56.

Google Scholar

[4] YAN Shan-jun, YU Zhao-ping. Gray image encryption algorithm based on chaotic sequences of Logistic[J]. Computer Engineering and Applications, 2008, 44(36): 179-208.

Google Scholar

[5] ZHANG Yong-hong. Image encryption algorithm based on extended hyperchaotic sequences[J]. Computer Engineering and Design, 2008, 29(15): 4100-4102.

Google Scholar

[6] HUANG Run-sheng. Chaos and its application[M]. Wuhan: Wuhan University Press, 2000: 11-17.

Google Scholar

[7] ZHANG Li-hong, ZHANG Yi-feng. Research on Lorenz chaotic stream cipher[J]. Journal of Electronic engineering institute, 2004, 24(1): 31-34.

Google Scholar

[8] MATYHEWS R A J. On the derivation of a chaotic encryption algorithm [J]. Cryptologia, 1989, 13(1): 29-42.

Google Scholar

[9] CHEN GUANRONG,MAO YAOBIN, CHUI C K.A symmetric image encryption scheme based on 3D chaotic cat maps[J]. Chaos, Solitons and Fractals, 2004, 21(3): 749-761.

DOI: 10.1016/j.chaos.2003.12.022

Google Scholar

[10] KODURU S C, CHANDRASEKARAN V. Integrated confusion—diffusion mechanisms for chaos based image encryption[c]/Proceedings of the 2008 IEEE 8th International Conference on Computer and Information Technology Workshops. Washington, DC: IEEE Press, 2008: 260-263.

DOI: 10.1109/cit.2008.workshops.33

Google Scholar

[11] HU Xue-gang, Wang Yue. New image encryption algorithm based on composite chaotic system[J]. Journal of computer applications, 2010, 30(5): 1209-1211.

Google Scholar

[12] ZHANG Jian, YU Xiao-yang, REN Hong-e. Image Encryption Algorithm based on four-dimension chaotic map[J]. Computer Engineering, 2008, 34(1).

Google Scholar