Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

A novel fast image encryption algorithm for embedded systems

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Nowadays, embedded systems can be found everywhere in daily life. In the development of embedded systems, data security is one of the critical factors. Encryption is an effective way to protect data from threats. Among encryption algorithms, chaos-based methods have strong cryptographic properties since chaotic systems are sensitive to initial conditions and parameters. However, most of these algorithms cannot be applied in practice because their encryption speed is not fast enough. In this paper, a fast image encryption algorithm is proposed. Compared with traditional chaos-based image encryption algorithms, the proposed method utilizes mixed-sequence and decorrelation operation to enhance the randomness of chaotic sequence. Moreover, it used minimum length of the sequence which is determined by experiments. Therefore, the proposed scheme spends much less computation time, which is an important advantage for being applied in practice. Testing results have shown that this algorithm has good performance in resisting known attacks, such as known-plaintext attacks, chosen ciphertext attacks, statistical attacks, differential attacks, and various brute-force attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  1. Alvarez G, Li S (2006) Some basic cryptographic requirements for chaos-based cryp- tosystems. Int J Bifurcation Chaos 16:2129–2151

    Article  MATH  Google Scholar 

  2. Chen G, Mao YB, Chui CK (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons Fractals 21(3):749–761

    Article  MathSciNet  MATH  Google Scholar 

  3. chuan Y, Xijun WANG, GAO Yongke LI, Qingmin TIAN (2015) A new scheme for UAV TT&C and information transmission system. Int Conf Adv Mech Eng Indust Inform (AMEII) 2015(2015):1018–1022

    Google Scholar 

  4. Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifurcation Chaos 8(6):1259–1284

    Article  MathSciNet  MATH  Google Scholar 

  5. Galatolo S (2003) Complexity, initial condition sensitivity, dimension and weak chaos in dynamical systems. Nonlinearity 16(4):1219–1238

    Article  MathSciNet  MATH  Google Scholar 

  6. Reinhard Gerndt, Sören Michalik, Stefan Krupop (2011) Embedded vision system for robotics and industrial automation, 2011 9th IEEE International Conference on Industrial Informatics. 895–899

  7. Guo W, Zhao J, Ye R (2014) A Chaos-based pseudorandom permutation and bilateral diffusion scheme for image encryption, international journal of image. Graph Sign Proc 6(11):50–61

    Article  Google Scholar 

  8. Hamza R, Titouna F (2016) A novel sensitive image encryption algorithm based on the Zaslavsky chaotic map. Inform Sec J A Glob Perspect 25(4–6):162–179

    Article  Google Scholar 

  9. Li Y, Wang YL (2015) Customizing dynamic libraries of Qt based on the embedded Linux. Appl Mech Mater 740:782–785

    Article  Google Scholar 

  10. Liu Y, Nie L, Han L, Zhang L, David S (2015) Rosenblum, Action2Activity: recognizing complex activities from sensor data. Proc Twenty-Fourth Int Joint Conf Artificial Intel (IJCAI) 2015:1617–1623

    Google Scholar 

  11. Liu Y, Zhang L, Nie L, Yan Y, Rosenblum DS (2016) Fortune teller: predicting your career path. Proc Thirtieth AAAI Conf Artific Intel (AAAI-16):201–207

  12. Liu Y, Nie L, Liu L, Rosenblum DS (2016) From action to activity: sensor-based activity recognition. Neurocomputing 181:108–115

    Article  Google Scholar 

  13. Liu J, Ma Y, Li S, Lian J, Xinguo Zhang A (2018) New simple chaotic system and its application in medical image encryption. Multimed Tools Appl 4:1–22

    Google Scholar 

  14. Liu J, Sprott JC, Wang S, Ma Y (2018) Simplest chaotic system with a hyperbolic sine and its applications in DCSK scheme. IET Commun

  15. Malinowski A, Yu H (2011) Comparison of embedded system Design for Industrial Applications. IEEE Trans Indust Inform 7(2):244–254

    Article  Google Scholar 

  16. Murillo-Escobar MA, Cruz-Hernández C, Abundiz-Pérez F, López-Gutiérrez RM (2016) Implementation of an improved chaotic encryption algorithm for real-time embedded systems by using a 32-bit microcontroller. Microprocess Microsyst 45:297–309

    Article  Google Scholar 

  17. Mykhatsky OYu , KuzmenkoNS , Savchenko OV (2013) Experimental UAV flight data structuring transmission and visualization by narrowband telemetry transmission, 2013 IEEE 2nd International Conference Actual Problems of Unmanned Air Vehicles Developments Proceedings (APUAVD). 118–121

  18. Pareek NK, Vinod Patidar KKS (2006) Image encryption using chaotic logistic map. Image Vis Comput 24:926–934

    Article  Google Scholar 

  19. Song R, Lang WC, Pan SW (2009) Development of embedded system GUI based on Qt/embedded. Appl Mech Mater 109:586–590

    Article  Google Scholar 

  20. Talarposhti KM, Jamei MK (2016) A secure image encryption method based on dynamic harmony search (DHS) combined with chaotic map. Opt Lasers Eng 81:21–34

    Article  Google Scholar 

  21. Wong KW, Kwok SH, Law WS (2008) A fast image encryption scheme based on chaotic standard map. Phys Lett A 372(15):2645–2652

    Article  MATH  Google Scholar 

  22. Xu Z, Wu L, Gerke M, Wang R, Yang H (2016) Skeletal camera network embedded structure-from-motion for 3D scene reconstruction from UAV images. ISPRS J Photogramm Remote Sens 121:113–127

    Article  Google Scholar 

  23. Xu H, Tong X, Meng X (2016) An efficient chaos pseudo-random number generator applied to video encryption. Optik - Int J Light Electron Optics 127(20):9305–9319

    Article  Google Scholar 

  24. Yao Y, Zhang W, Yu N (2017) Inter-frame distortion drift analysis for reversible data hiding in encrypted H.264/AVC video bitstreams. Signal Process 132:19–28

    Article  Google Scholar 

  25. YAOBIN MAO, GUANRONG CHEN, SHIGUO LIAN (2004) A novel fast image encryption scheme based on the 3D chaotic baker map. Int J Bifurcat Chaos 14(10):3613–3624

    Article  MathSciNet  MATH  Google Scholar 

  26. Yin SJ, Xia DC, Ma J (2014) Application of machine vision in ARM based on OpenCV and Qt. Adv Mater Res 1049-1050(1):1938–1941

    Article  Google Scholar 

  27. Zhang G, Liu Q (2011) A novel image encryption method based on total shuffling scheme. Opt Commun 284(12):2775–2780

    Article  Google Scholar 

  28. Zhang YQ, Wang XY (2014) A symmetric image encryption algorithm based on mixed linear–nonlinear coupled map lattice. Inf Sci 273(8):329–351

    Article  Google Scholar 

Download references

Acknowledgements

Thanks for the useful suggestions provided by Yide Ma and Jizhao Liu. This study was supported by the Fundamental Research Funds for the Central Universities (No.lzujbky-2016-238). National Natural Science Foundation of China (No.61175012). 2017 s batch of innovation base and innovative talents (Small and medium enterprises innovation fund 17CX2JA018).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yide Ma.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Appendices

Appendix A Process of confusion

figure f

Appendix B process of diffusion

figure g

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Lin, Z., Liu, J., Lian, J. et al. A novel fast image encryption algorithm for embedded systems. Multimed Tools Appl 78, 20511–20531 (2019). https://doi.org/10.1007/s11042-018-6824-5

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-018-6824-5

Keywords