Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3163080.3163088acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicspsConference Proceedingsconference-collections
research-article

A New Image Encryption Algorithm Based on Chaotic Maps

Published: 27 November 2017 Publication History

Abstract

This paper presents an image encryption algorithm based on Logistic map and Henon map. The main idea is that the original image is randomly cut into blocks with four different sizes. Each block is randomly XORed with Logistic map or Henon map according to the cutting parameters and thus the pixel values of each block image are altered. After that, these images are stitched into an encrypted image by different cutting direction. The encrypted image has the same size as the original image. The analysis of the encryption and decryption algorithm shows that the algorithm has a good encryption effect, anti-attack ability and high security.

References

[1]
Tang, Q., Jiang J.M., Jiang, J.L. 2016. An image encryption algorithm based on high-dimensional chaotic systems{C}// International Conference on Signal Processing, Communications and Computing. IEEE, 2016:1--4.
[2]
Cheng, H., Song, Y., Huang, C., et al. 2015. Design and Realization of Image Encryption System Based on Compound Logistic Chaotic System{C}// International Conference on Robot. IEEE, 2015:75--77.
[3]
Wang, F. Y., Cui, G. W. 2010. A new image encryption algorithm based on the Logistic chaotic system{C}//IEEE International Conference on Computer Science and Information Technology. IEEE, 2010:192--194.
[4]
Chen, W. B., Xin, Z. 2009. Image encryption algorithm based on Henon chaotic system{C}//International Conference on Image Analysis and Signal Processing. IEEE, 2009:1--6.
[5]
Tang, L. F., Zhou, J. Y. 2010. Image encryption algorithm based on double chaos map{J}. Microcomputer & Its Applications, 2010.
[6]
Li, C. M., Hong, L. X., Wan, C. 2007. An Image Blocking Encryption Arithmetic Based on Chaotic Sequences{J}. Computer Technology & Development, 2007.
[7]
Wang, K., Zhang, H. W., Li, X. H. 2017. Image block encryption algorithm based on DNA code operation and chaotic system{J}. Video engineering, 2017, 41(3):6--10.
[8]
Wang, X. Y., Chen, F., Wang, T. 2010. A new compound mode of confusion and diffusion for block encryption of image based on chaos{J}. Communications in Nonlinear Science & Numerical Simulation, 2010, 15(9):2479--2485.
[9]
Tong, X., Cui, M. 2009. Image encryption scheme based on 3D baker with dynamical compound chaotic sequence cipher generator{J}. Signal Processing, 2009, 89(4):480--491.
[10]
Li, W., Zhang, Q., Ding, Q. 2016. Digital Encryption Method Based on Lorenz Continuous Chaotic System{C}// International Conference on Instrumentation & Measurement. IEEE, 2016:262--266.
[11]
Ismail, I. A., Amin, M., Diab, H. 2010. A Digital Image Encryption Algorithm Based A Composition of Two Chaotic Logistic Maps{J}. International Journal of Network Security, 2010, 11(1):1--10.
[12]
Wang, X. Y., Chen, et al. 2010. A new compound mode of confusion and diffusion for block encryption of image based on chaos{J}. Communications in Nonlinear Science & Numerical Simulation, 2010, 15(9):2479--2485.
[13]
Wang, X., Guo, K.2014. A new image alternate encryption algorithm based on chaotic map{J}. Nonlinear Dynamics, 2014, 76(4):1943--1950.
[14]
Pareek, N. K., Patidar, V., Sud, K. K.2006. Image encryption using chaotic logistic map{J}. Image & Vision Computing, 2006, 24(9):926--934.

Cited By

View all
  • (2023)A novel hybrid encryption method using S-box and Henon maps for multidimensional 3D medical imagesSoft Computing10.1007/s00500-023-08006-1Online publication date: 31-Mar-2023
  • (2022)Distortion Controlled Secure Reversible Data Hiding in H.264 VideosData, Engineering and Applications10.1007/978-981-19-4687-5_1(1-14)Online publication date: 12-Oct-2022
  • (2020)Cryptanalysis and Improvement of a Chaotic Map-Based Image Encryption System Using Both Plaintext Related Permutation and DiffusionEntropy10.3390/e2205058922:5(589)Online publication date: 24-May-2020
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICSPS 2017: Proceedings of the 9th International Conference on Signal Processing Systems
November 2017
237 pages
ISBN:9781450353847
DOI:10.1145/3163080
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 27 November 2017

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Henon map
  2. Logistic map
  3. image encryption
  4. random cutting

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

ICSPS 2017

Acceptance Rates

Overall Acceptance Rate 46 of 83 submissions, 55%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)7
  • Downloads (Last 6 weeks)0
Reflects downloads up to 03 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2023)A novel hybrid encryption method using S-box and Henon maps for multidimensional 3D medical imagesSoft Computing10.1007/s00500-023-08006-1Online publication date: 31-Mar-2023
  • (2022)Distortion Controlled Secure Reversible Data Hiding in H.264 VideosData, Engineering and Applications10.1007/978-981-19-4687-5_1(1-14)Online publication date: 12-Oct-2022
  • (2020)Cryptanalysis and Improvement of a Chaotic Map-Based Image Encryption System Using Both Plaintext Related Permutation and DiffusionEntropy10.3390/e2205058922:5(589)Online publication date: 24-May-2020
  • (2019)A Secure Image Encryption Architecture Based on Pseudorandom Number Generator and Chaotic Logistic MapProceedings of the 2019 2nd International Conference on Data Science and Information Technology10.1145/3352411.3352436(154-159)Online publication date: 19-Jul-2019

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media