skip to main content
10.1145/3239576.3239584acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicaipConference Proceedingsconference-collections
research-article

An Efficient Image Encryption Algorithm Based on Three-dimensional Chaotic Map

Published: 16 June 2018 Publication History

Abstract

In this paper, a new image encryption algorithm is presented with one chaotic map and one group of secret keys. Double permutations for pixel positions are designed followed by a function of diffusion to alter gray distribution in the plain-image. In the proposed algorithm, the keystream is produced and dependent on the plain-image. As a result, the method can frustrate the known plaintext attack and chosen plaintext attack. Moreover, diffusion encryption by row-only is applied to the permuted image to save time consumption. Then, the experimental results show that our method can perform high security and is suitable for both gray and color images.

References

[1]
A. Kanso and M. Ghebleh, "An efficient and robust image encryption scheme for medical applications," Communications in Nonlinear Science and Numerical Simulation, vol. 24, Jul. 2015, pp. 98--116,
[2]
J. Zhou, X. Liu, O.C. Au, and Y.Y. Tang, "Designing an efficient image encryption-then-compression system via prediction error clustering and random permutation," IEEE Transactions on Information Forensics and Security, vol. 9, Jan. 2014, pp.39--50,
[3]
Z. Hua and Y. Zhou, "Image encryption using 2D Logistic-adjusted-Sine map," Information Sciences, vol. 339, Apr. 2016, pp.237--253,
[4]
G. Ye and X. Huang, "Spatial image encryption algorithm based on chaotic map and pixel frequency," Science China Information Sciences, vol. 61, May 2018, pp. 058104,
[5]
M. Ghebleh, A. Kanso, and H. Noura, "An image encryption scheme based on irregularly decimated chaotic maps," Signal Processing: Image Communication, vol. 29, May 2014, pp. 618--627,
[6]
C. Cao, K. Sun, and W. Liu, "A novel bit-level image encryption algorithm based on 2D-LICM hyperchaotic map," Signal Processing, vol. 143, Feb. 2018, pp.122--133,
[7]
B. Norouzi and S. Mirzakuchaki, "An image encryption algorithm based on DNA sequence operations and cellular neural network," Multimedia Tools and Applications, vol. 76, Jun. 2017, pp.13681--13701,
[8]
G. Ye and X. Huang, "A feedback chaotic image encryption scheme based on both bit-level and pixel-level," Journal of Vibration and Control, vol. 22, Aug. 2016, pp.1171--1180,
[9]
L Xu, Z Li, J Li, and W Hua, "A novel bit-level image encryption algorithm based on chaotic maps," Optics and Lasers in Engineering vol. 78, Mar. 2016, pp. 17--25,
[10]
J. Ahmad and S.O. Hwang, "A secure image encryption scheme based on chaotic maps and affine transformation," Multimedia Tools and Applications, vol. 75, Nov. 2016, pp. 13951--13976,
[11]
X. Wang, C. Liu, D. Xu, and C. Liu, "Image encryption scheme using chaos and simulated annealing algorithm," Nonlinear Dynamics, vol. 84, May 2016, pp. 1417--1429,
[12]
Y. Zhang and D. Xiao, "Double optical image encryption using discrete Chirikov standard map and chaos-based fractional random transform," Optics and Lasers in Engineering, vol. 51, Apr. 2013, pp. 472--480,
[13]
X. Chai, Z. Gan, K. Yang, Y. Chen, and X. Liu, "An image encryption algorithm based on the memristive hyperchaotic system, cellular automata and DNA sequence operations," Signal Processing: Image Communication, vol. 52, Mar. 2017, pp. 6--19,

Cited By

View all
  • (2022)An image encryption algorithm using the combination of chaotic mapsOptik10.1016/j.ijleo.2022.169122261(169122)Online publication date: Jul-2022

Index Terms

  1. An Efficient Image Encryption Algorithm Based on Three-dimensional Chaotic Map

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ICAIP '18: Proceedings of the 2nd International Conference on Advances in Image Processing
    June 2018
    261 pages
    ISBN:9781450364607
    DOI:10.1145/3239576
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    In-Cooperation

    • University of Electronic Science and Technology of China: University of Electronic Science and Technology of China
    • Southwest Jiaotong University

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 16 June 2018

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Image encryption
    2. chaotic map
    3. diffusion
    4. permutation
    5. security

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    ICAIP '18

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 16 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2022)An image encryption algorithm using the combination of chaotic mapsOptik10.1016/j.ijleo.2022.169122261(169122)Online publication date: Jul-2022

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media