Skip to main content
Log in

Feedback image encryption algorithm with compound chaotic stream cipher based on perturbation

  • Research Papers
  • Published:
Science in China Series F: Information Sciences Aims and scope Submit manuscript

Abstract

In this paper, two new one-dimensional chaotic functions are designed using Devaney chaotic definition. And a dynamically shifting compound chaotic function is constructed based on the two new one-dimensional chaotic functions. The properties of compound chaotic functions are also proved. A new feedback image encryption algorithm is designed using the new compound chaos and an image pixel permutation, 3D baker scheme is described in detail. In the scheme, a new dynamic block dividing the 3D baker is put forward using the compound chaotic map, and the key space expands. In order to produce avalanche effect and sensitivity of cipher to plaintext, the round times are designed to control the cycle. The entropy analysis, difference analysis, weak-key analysis, statistical analysis, cipher random analysis, and cipher sensibility analysis depending on key and plaintext are introduced to test the security of the new scheme of image encryption. The tests show that the image encryption method passes the random tests of NIST FIPS 140-2(2001) and SP 800-22 standards. This paper also solves the problem of short periods and low precision of one-dimensional chaotic function by perturbation.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Chen G R, Mao Y. Chaos-based Image Encryption. Handbook of Computational Geometry for Pattern Recognition. Berlin: Springer-Verlag, 2005. 231–265

    Google Scholar 

  2. Mao Y B, Chen G, Lian S G. A novel fast image encryption scheme based on the 3D chaotic baker map. Int J Bifurcat Chaos, 2004, 14: 3613–3624

    Article  MATH  MathSciNet  Google Scholar 

  3. Zhang Y W, Wang Y M, Shen X B. Chaos-based image encryption algorithm using alternate structure. Sci China Ser F-Inf Sci, 2007, 50: 334–341

    Article  MATH  MathSciNet  Google Scholar 

  4. Li H D, Feng D G. Composite nonlinare discrete chaotic dynamical systems and keyed hash functions. Chin J Comput, 2003, 26: 460–464

    MathSciNet  Google Scholar 

  5. Tao X, Liao X F, Tang G P. A novel block cryptosystem based on iterating a chaotic map. Phys Lett A, 2006, 34: 109–115

    Google Scholar 

  6. Zhang W T, Qing S H, Wu W L. Security evaluation for a class of block ciphers based on chaotic maps (in Chinese). J Softw, 2003, 14: 512–517

    MathSciNet  Google Scholar 

  7. Li P, Li Z, Wolf G A, et al. Analysis of a multiple-output, pseudo-random bit generator based on a spatiotemporal chaotic system. Int J Bifurcat Chaos, 2006, 16: 2949–2963

    Article  Google Scholar 

  8. Huang F J. Information security research based on discrete chaotic theory (in Chinese). Dissertation for the Doctoral Degree. Wuhan: Huazhong Science and Technology University, 2005. 1–10

    Google Scholar 

  9. Li S J, Zheng X. On the security of an image encryption method. Proc 2002 Int Conf Image Process, 2002, (2): 925–928

  10. Chuang T J, Lin J C. A new multi-resolution approach to still image encryption. Patt Recognit, 1999, 9: 431–436

    Google Scholar 

  11. Chen G R, Mao Y B, Charles K C. A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Solit Fractal, 2004, 21: 749–761

    Article  MATH  Google Scholar 

  12. Xiang T, Liao X F, Tang G P, et al. A novel block cryptosystem based on iterating a chaotic map. Phys Lett A, 2006, 349: 109–115

    Article  Google Scholar 

  13. Lian S G, Mao Y B, Wang Z Q. 3D extension of Baker map and its application to multimedia information encryption (in Chinese). Control Decision, 2004, 19: 714–717

    MATH  MathSciNet  Google Scholar 

  14. Li S J. Chaos-based Image and Video Encryption. Chapter 4. Multimedia Encryption Handbook. Furht B, Kirovski D, eds., New York: CRC Press, 2005. 133–168

    Google Scholar 

  15. Zhao G, Fang J Q, Yan H, et al. Design of changeable P-box and two modules structure block cryptosystem based on chaos. In: Proceedings of APWCCS, 2007. 174–183

  16. Lu K, Sun J H, Ouyang R B, et al. Chaotic Dynamics (in Chinese). Shanghai: Shanghai Translation Press, 1990. 17–51

    Google Scholar 

  17. Tong X J, Cui M. Image encryption with compound chaotic sequence cipher shifting dynamically. Image Vision Comput, 2008, 26: 843–850

    Google Scholar 

  18. Hao B L. Staring from Parabola-Chaotic Dynamics Introduction (in Chinese). Shanghai: Shanghai Education Press, 1993. 122–123

    Google Scholar 

  19. Hone B, Tang Q Y, Yang F S, et al. ApEn and cross-ApEn: property, fast algorithm and preliminary application to the study of EEG and cognition (in Chinese). Signal Process, 1999, 15: 100–108

    Google Scholar 

  20. Zhou H, Ling X T. Realizing finite precision chaotic systems via perturbation of m sequences (in Chinese). Acta Electron Sin, 1997, 25: 95–97

    Google Scholar 

  21. Rukhin A, Soto J. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications. NIST Special Publication 800-22, May. 2001. 1–115

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to XiaoJun Tong.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Tong, X., Cui, M. Feedback image encryption algorithm with compound chaotic stream cipher based on perturbation. Sci. China Ser. F-Inf. Sci. 53, 191–202 (2010). https://doi.org/10.1007/s11432-010-0010-3

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11432-010-0010-3

Keywords

Navigation