Skip to main content

Research on a Novel Image Encryption Scheme Based on the Hybrid of Chaotic Maps

  • Conference paper
Advances in Neural Networks - ISNN 2010 (ISNN 2010)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 6064))

Included in the following conference series:

Abstract

This paper presents a novel image encryption scheme based on a hybrid of three order chaotic Chen system and piecewise linear chaotic map (PWLCM). The initial conditions and control parameters of chaotic systems are viewed as the secret key, and combined sequences from these two chaotic systems are employed to encrypt original image. The proposed scheme is described in detail, along with experimental example and security analyses including sensitivity analysis, analysis of correlation of adjacent pixels and information entropy analysis. The results show that the suggested scheme has some desirable properties in a good security cryptosystem.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Kocarev, L.: Chaos-based cryptography: A brief overview. IEEE Circ. Syst. Maga. 1, 6–21 (2001)

    Article  Google Scholar 

  2. Fridrich, J.: Symmetric ciphers based on two-dimensional chaotic maps. Int. J. Bifu. Chaos 8, 1259–1284 (1998)

    Article  MATH  MathSciNet  Google Scholar 

  3. Fridrich, J.: Image encryption based on chaotic maps. In: IEEE Int. Conf. Syst. Man Cybe., Orlando, FL, USA (1997)

    Google Scholar 

  4. Alvarez, G., Li, S.: Some basic cryptographic requirements for chaos-based cryptosystems. Int. J. Bifu. Chaos 16, 2129–2151 (2006)

    Article  MathSciNet  Google Scholar 

  5. Yang, T., Wu, C., Chua, L.: Cryptography based on chaotic systems. IEEE Tran. CAS-I 44, 469–472 (1997)

    Google Scholar 

  6. Grzybowski, J., Rafikov, M., Balthaza, J.: Synchronization of the unified chaotic system and application in secure communication. Comm. Nonl. Scie. Nume. Simu. 14, 2793–2806 (2009)

    Article  Google Scholar 

  7. Chen, G., Mao, Y., Chui, C.: A symmetric image encryption based on 3D chaotic maps. Chaos Soli. Frac. 21, 749–761 (2004)

    Article  MATH  MathSciNet  Google Scholar 

  8. Tong, X., Cui, M.: Image encryption scheme based on 3D baker with dynamical compound chaotic sequence cipher generator. Sign. Proc. 89, 480–491 (2009)

    Article  MATH  Google Scholar 

  9. Peng, J., Zhang, D., Liao, X.: A digital image encryption algorithm based on hyper-chaotic cellular neural network. Fund. Info. 90, 269–282 (2009)

    MathSciNet  Google Scholar 

  10. Zhang, J., Wang, X., Zhang, W.: Chaotic keyed hash function based on feedforward - feedback nonlinear digital filter. Phys. Lett. A 362, 439–448 (2007)

    Article  Google Scholar 

  11. Peng, J., Zhang, D., Liu, Y., Liao, X.: A double-piped iterated hash function based on a hybrid of chaotic maps. In: 7th IEEE Int. Conf. Cogn. Info., pp. 358–365 (2008)

    Google Scholar 

  12. Yen, J., Guo, J.: A new chaotic key-based design for image encryption and decryption. In: Proc. IEEE Int. Conf. Circ. Syst., vol. 4, pp. 49–52 (2000)

    Google Scholar 

  13. Li, S., Zheng, X.: Cryptanalysis of a chaotic image encryption method. In: Proc. IEEE Int. Symp. Circ. Syst., vol. 2, pp. 26–29 (2002)

    Google Scholar 

  14. Li, P., Li, Z., Halanga, W., Chen, G.: A multiple pseudorandom-bit generator based on a spatiotemporal chaotic map. Phys. Lett. A 349, 467–473 (2006)

    Article  Google Scholar 

  15. Chen, G., Dong, X.: From chaos to order methodologies, perspectives, and applications. World Scientific, Singapore (1998)

    Book  MATH  Google Scholar 

  16. Ueta, T., Chen, G.: Bifurcation analysis of Chen’S equation. Int. J. Bifu. Chaos 10, 1917–1931 (2000)

    MATH  MathSciNet  Google Scholar 

  17. Yassen, M.: Chaos control of Chen chaotic dynamical system. Chaos Soli. Frac. 15, 271–228 (2003)

    Google Scholar 

  18. Li, S., Álvarez, G., Chen, G.: Breaking a chaos-based secure communication scheme designed by an improved modulation method. Chaos Soli. Frac. 25, 109–120 (2005)

    Article  MATH  Google Scholar 

  19. Shannon, C.: Communication theory of secrecy system. Bell Syst. Tech. J. 28, 656–715 (1949)

    MATH  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Guan, Z., Peng, J., Jin, S. (2010). Research on a Novel Image Encryption Scheme Based on the Hybrid of Chaotic Maps. In: Zhang, L., Lu, BL., Kwok, J. (eds) Advances in Neural Networks - ISNN 2010. ISNN 2010. Lecture Notes in Computer Science, vol 6064. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13318-3_29

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-13318-3_29

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-13317-6

  • Online ISBN: 978-3-642-13318-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics