Abstract
When the grays of images present a strong contrast, merely encrypting the gray-level of image pixels is unable to eliminate the image outlines. The adoption of pixel shuffling can eliminate the image outlines, but cannot disrupt the characteristics of gray-level spectrum. Since a chaotic system is highly sensitive to the initial values and the chaotic trajectory is unpredictable, the application of this method to communication encryption and decryption renders a high level of security. In this paper, the chaotic system is adopted as the fundamental base and combined with row, column shuffling, and gray-level encryption to not only eliminate image outlines, but also disrupt the distributional characteristics of gray level, and the resulting increases of key space. Various statistical methods, such as correlation coefficient, NPCR (Number of Pixels Change Rate), UACI (Unified Average Changing Intensity), and entropy, provide analysis of the efficacy of the encryption method proposed. Our example reveals that the proposed encryption method can obtain highly secure encrypted images.
Similar content being viewed by others
References
Cuomo, K. M., Oppenheim, A. V., & Strogatz, S. H. (1993). Synchronization of Lorenz-based chaotic circuits with applications to communications. IEEE Transactions on Circuits and Systems II, Express Briefs, 40, 626–633.
Yang, T., & Chua, L. O. (1996). Secure communication via parameter modulation. IEEE Transactions on Circuits and Systems I, Fundamental Theory and Applications, 43, 817–819.
Yang, T., Wu, C. W., & Chua, L. O. (1997). Cryptography based on chaotic systems. IEEE Transactions on Circuits and Systems I, Fundamental Theory and Applications, 44, 469–472.
Kocarev, L. (2001). Chaos-based cryptography: a brief overview. IEEE Transactions on Circuits and Systems I, Fundamental Theory and Applications, 1, 6–21.
Lee, B. H., & Chen, Y. Y. (1999). Implementation of chaotic stream ciphers using chaotic pseudorandom number generator. Thesis of National Taiwan University, Taiwan.
Yang, W. A., & Yuan, D. M. (2006). A new method of key generation based on chaotic sequence. China Academic Journal Electronic Publishing House Mathematics in Practice and Theory, 36, 160–164.
Zhang, W., & He, R. C. (2006). An encryption and hiding algorithm based on logistic chaotic sequences. China Academic Journal Electronic Publishing House, Journal of Lanzhou Jiaotong University (Natural Sciences), 25, 80–82.
Sun, Z. J., Chen, Y., Wang, Y. X., & Liao, X. F. (2007). New image encryption algorithm based on Chua’s circuit. China Academic Journal Electronic Publishing House, Computer Engineering and Design, 28, 3328–3330.
Chua, L. O., & Lin, G. N. (1990). Canonical realization of Chua’s circuit family. IEEE Transactions on Circuits and Systems, 37, 885–902.
Bluman, A. G. (1998). Elementary statistics (3rd edn.). McGraw-Hill, New York.
Chen, G., Mao, Y., & Chui, C. K. (2004). A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons and Fractals, 21, 749–761.
Behnia, S., Akhshani, A., Ahadpour, S., Mahmodi, H., & Akhavan, A. (2007). A fast chaotic encryption scheme based on piecewise nonlinear chaotic maps. Physics Letters A, 366, 391–396.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Huang, C.K., Liao, C.W., Hsu, S.L. et al. Implementation of gray image encryption with pixel shuffling and gray-level encryption by single chaotic system. Telecommun Syst 52, 563–571 (2013). https://doi.org/10.1007/s11235-011-9461-0
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11235-011-9461-0