Skip to main content

A Color Image Encryption Algorithm Based on Magic Cube Transformation and Modular Arithmetic Operation

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 3768))

Abstract

Permutation-only image ciphers encrypt images by permuting the positions of all pixels in a secret way, which are unfortunately frail under known-text attack. In view of the weakness of permutation-only algorithms, a color image encryption algorithm based on magic cube transformation and a new modular arithmetic operation is designed. First, a natural number chaotic sequence is created with the secret key. For the sake of higher security, all secret keys are generated by different chaotic maps, and thus increase the security for decryption. Second, we implement the position permutation algorithm by magic cube transformation with chaotic sequences. Third, the pixel-substitution algorithm is realized by changing the image pixel value, with a XOR plus mod diffuse operation and a modular arithmetic operation. Finally, experimental results are given to demonstrate the efficiency and high security of our novel algorithm.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Li, S., Zheng, X.: On the security of an image encryption method. In: Proc. IEEE Int. Conference on Image Processing, pp. 925–928 (2002)

    Google Scholar 

  2. Li, S., Chen, G., Mou, X.: On the Security of the Yi-Tan-Siew Chaotic Cipher. IEEE Transactions on Circuits and Systems, 665–669 (2004)

    Google Scholar 

  3. Li, C., Li, S., Zhang, D., Chen, G.: Cryptanalysis of a Chaotic Neural Network Based Multimedia Encryption Scheme. In: Aizawa, K., Nakamura, Y., Satoh, S. (eds.) PCM 2004. LNCS, vol. 3333, pp. 418–425. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  4. Mao, Y., Chen, G., Lian, S.: A novel fast image encryption scheme based on 3D chaotic baker maps. International Journal of Bifurcation and Chaos, 3613–3624 (2004)

    Google Scholar 

  5. Chen, G., Mao, Y., Charles, K.C.: A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Solitons and Fractals, 749–761 (2004)

    Google Scholar 

  6. Kocarev, L., Jakimovski, G.: Chaos and cryptography: from chaotic maps to encryption algorithms. IEEE Transactions on Circuits and Systems, 163–169 (2001)

    Google Scholar 

  7. Masuda, N., Aihara, K.: Cryptosystems with discretized chaotic maps. IEEE Transactions on Circuits and Systems, 28–40 (2002)

    Google Scholar 

  8. Trenkler, M.: A construction of magic cubes. The Mathematical Gazette, 36–41 (2000)

    Google Scholar 

  9. Zhao, X.Y., Chen, G.: Ergodic matrix in image encryption. SPIE, 4875–4878 (2002)

    Google Scholar 

  10. Li, S., lvarez, G., Chen, G., Mou, X.: Breaking a chaos-noise-based secure communication scheme. Chaos, 532–534 (2005)

    Google Scholar 

  11. Li, S., lvarez, G., Chen, G.: Breaking a chaos-based secure communication scheme designed by an improved modulation method. Chaos, Solitons and Fractals, 109–120 (2005)

    Google Scholar 

  12. lvarez, G., Li, S., Montoya, F., Pastor, G., Romera, M.: Breaking projective chaos synchronization secure communication using filtering and generalized synchronization. Chaos, Solitons and Fractals, 775–783 (2005)

    Google Scholar 

  13. Zeng, Z., Wang, N.: A new method based on chaotic sequence of image encryption. In: Proceedings of SPIE, the Third International Conference on Photonics and Imaging in Biology and Medicine, pp. 285–289 (2003)

    Google Scholar 

  14. Schneier, B.: Applied Cryptography - Protocols, algorithms, and source code in C, 2nd edn. John Wiley & Sons, Inc., New York (1996)

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Shen, J., Jin, X., Zhou, C. (2005). A Color Image Encryption Algorithm Based on Magic Cube Transformation and Modular Arithmetic Operation. In: Ho, YS., Kim, HJ. (eds) Advances in Multimedia Information Processing - PCM 2005. PCM 2005. Lecture Notes in Computer Science, vol 3768. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11582267_24

Download citation

  • DOI: https://doi.org/10.1007/11582267_24

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-30040-3

  • Online ISBN: 978-3-540-32131-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics