Skip to main content
Log in

Implementation of gray image encryption with pixel shuffling and gray-level encryption by single chaotic system

  • Published:
Telecommunication Systems Aims and scope Submit manuscript

Abstract

When the grays of images present a strong contrast, merely encrypting the gray-level of image pixels is unable to eliminate the image outlines. The adoption of pixel shuffling can eliminate the image outlines, but cannot disrupt the characteristics of gray-level spectrum. Since a chaotic system is highly sensitive to the initial values and the chaotic trajectory is unpredictable, the application of this method to communication encryption and decryption renders a high level of security. In this paper, the chaotic system is adopted as the fundamental base and combined with row, column shuffling, and gray-level encryption to not only eliminate image outlines, but also disrupt the distributional characteristics of gray level, and the resulting increases of key space. Various statistical methods, such as correlation coefficient, NPCR (Number of Pixels Change Rate), UACI (Unified Average Changing Intensity), and entropy, provide analysis of the efficacy of the encryption method proposed. Our example reveals that the proposed encryption method can obtain highly secure encrypted images.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Cuomo, K. M., Oppenheim, A. V., & Strogatz, S. H. (1993). Synchronization of Lorenz-based chaotic circuits with applications to communications. IEEE Transactions on Circuits and Systems II, Express Briefs, 40, 626–633.

    Article  Google Scholar 

  2. Yang, T., & Chua, L. O. (1996). Secure communication via parameter modulation. IEEE Transactions on Circuits and Systems I, Fundamental Theory and Applications, 43, 817–819.

    Article  Google Scholar 

  3. Yang, T., Wu, C. W., & Chua, L. O. (1997). Cryptography based on chaotic systems. IEEE Transactions on Circuits and Systems I, Fundamental Theory and Applications, 44, 469–472.

    Article  Google Scholar 

  4. Kocarev, L. (2001). Chaos-based cryptography: a brief overview. IEEE Transactions on Circuits and Systems I, Fundamental Theory and Applications, 1, 6–21.

    Google Scholar 

  5. Lee, B. H., & Chen, Y. Y. (1999). Implementation of chaotic stream ciphers using chaotic pseudorandom number generator. Thesis of National Taiwan University, Taiwan.

  6. Yang, W. A., & Yuan, D. M. (2006). A new method of key generation based on chaotic sequence. China Academic Journal Electronic Publishing House Mathematics in Practice and Theory, 36, 160–164.

    Google Scholar 

  7. Zhang, W., & He, R. C. (2006). An encryption and hiding algorithm based on logistic chaotic sequences. China Academic Journal Electronic Publishing House, Journal of Lanzhou Jiaotong University (Natural Sciences), 25, 80–82.

    Google Scholar 

  8. Sun, Z. J., Chen, Y., Wang, Y. X., & Liao, X. F. (2007). New image encryption algorithm based on Chua’s circuit. China Academic Journal Electronic Publishing House, Computer Engineering and Design, 28, 3328–3330.

    Google Scholar 

  9. Chua, L. O., & Lin, G. N. (1990). Canonical realization of Chua’s circuit family. IEEE Transactions on Circuits and Systems, 37, 885–902.

    Article  Google Scholar 

  10. Bluman, A. G. (1998). Elementary statistics (3rd edn.). McGraw-Hill, New York.

    Google Scholar 

  11. Chen, G., Mao, Y., & Chui, C. K. (2004). A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons and Fractals, 21, 749–761.

    Article  Google Scholar 

  12. Behnia, S., Akhshani, A., Ahadpour, S., Mahmodi, H., & Akhavan, A. (2007). A fast chaotic encryption scheme based on piecewise nonlinear chaotic maps. Physics Letters A, 366, 391–396.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to C. K. Huang.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Huang, C.K., Liao, C.W., Hsu, S.L. et al. Implementation of gray image encryption with pixel shuffling and gray-level encryption by single chaotic system. Telecommun Syst 52, 563–571 (2013). https://doi.org/10.1007/s11235-011-9461-0

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11235-011-9461-0

Keywords

Navigation