Abstract
This paper presents a new efficient chaos-based color image cipher robust against chosen-plaintext attack. The chaotic Hénon map and Lü system are employed to produce the permutation and substitution keystream sequences for image data scrambling and mixing, respectively. In the permutation stage, the positions of colored subpixels in the input image are scrambled using a pixel-swapping mechanism. To strengthen the robustness of the substitution procedure against chosen-plaintext attack, we introduce a novel mechanism for associating the keystream sequence with the plain-image. Compared with other related mechanisms, the new mechanism is implemented during the subpixel values mixing process rather than the keystream generation process. As a result, the keystream sequence can be reused among different rounds of substitution operation, and hence the computational cost is reduced. The suggested mechanism also increases the diffusion intensity and a desired diffusion effect can be achieved with only two rounds of overall permutation-substitution operation. Experimental results demonstrate that the proposed scheme has a satisfactory level of security.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Fridrich, J.: Symmetric ciphers based on two-dimensional chaotic maps. Int. J. Bifurc. Chaos 8, 1259–1284 (1998)
Fu, C., Meng, W., Zhan, Y., et al.: An efficient and secure medical image protection scheme based on chaotic maps. Comput. Biol. Med. 43, 1000–1010 (2013)
Chen, J., Zhu, Z., Fu, C., et al.: Reusing the permutation matrix dynamically for efficient image cryptographic algorithm. Signal Process. 111, 294–307 (2015)
Wong, K.W., Kwok, B.S.H., Law, W.S.: A fast image encryption scheme based on chaotic standard map. Phys. Lett. A 372, 2645–2652 (2008)
Fu, C., Lin, B., Miao, Y., et al.: A novel chaos-based bit-level permutation scheme for digital image encryption. Opt. Commun. 284, 5415–5423 (2011)
Wu, Y., Zhou, Y., Agaian, S., et al.: A symmetric image cipher using wave perturbations. Signal Process. 102, 122–131 (2014)
Li, C., Li, S., Lo, K.T.: Breaking a modified substitution–diffusion image cipher based on chaotic standard and logistic maps. Commun. Nonlinear Sci. Numer. Simul. 16, 837–843 (2011)
Li, C., Zhang, L.Y., Ou, R., et al.: Breaking a novel colour image encryption algorithm based on chaos. Nonlinear Dyn. 70, 2383–2388 (2012)
Li, C., Xie, T., Liu, Q., et al.: Cryptanalyzing image encryption using chaotic logistic map. Nonlinear Dyn. 78, 1545–1551 (2014)
Li, C., Liu, Y., Zhang, L.Y., et al.: Breaking a chaotic image encryption algorithm based on modulo addition and XOR operation. Int. J. Bifurc. Chaos 23, 1350075 (2013)
Wang, Y., Wong, K.W., Liao, X., et al.: A chaos-based image encryption algorithm with variable control parameters. Chaos, Solitons Fractals 41, 1773–1783 (2009)
Fu, C., Chen, J., Zou, H., et al.: A chaos-based digital image encryption scheme with an improved diffusion strategy. Opt. Express 20, 2363–2378 (2012)
Chen, J., Zhu, Z., Fu, C., et al.: An improved permutation-diffusion type image cipher with a chaotic orbit perturbing mechanism. Opt. Express 21, 27873–27890 (2013)
Cvitanović, P., Gunaratne, G.H., Procaccia, I.: Topological and metric properties of Hénon-type strange attractors. Phys. Rev. A 38, 1503 (1988)
Lü, J., Chen, G.: A new chaotic attractor coined. Int. J. Bifurc. Chaos 12, 659–661 (2002)
Acknowledgments
This work was supported by the Fundamental Research Funds for the Central Universities (No. N150402004), and the Online Education Research Fund of MOE Research Center for Online Education (Qtone Education) (No. 2016YB123).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Fu, C., Zhang, Gy., Gao, Bl., Sun, J., Wang, X. (2017). A New Color Image Encryption Scheme Based on Chaotic Hénon Map and Lü System. In: Wang, G., Atiquzzaman, M., Yan, Z., Choo, KK. (eds) Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2017. Lecture Notes in Computer Science(), vol 10656. Springer, Cham. https://doi.org/10.1007/978-3-319-72389-1_35
Download citation
DOI: https://doi.org/10.1007/978-3-319-72389-1_35
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-72388-4
Online ISBN: 978-3-319-72389-1
eBook Packages: Computer ScienceComputer Science (R0)