Advertisement

Multimedia Tools and Applications

, Volume 78, Issue 14, pp 20511–20531 | Cite as

A novel fast image encryption algorithm for embedded systems

  • Zhihao Lin
  • Jizhao Liu
  • Jing Lian
  • Yide MaEmail author
  • Xinguo Zhang
Article
  • 68 Downloads

Abstract

Nowadays, embedded systems can be found everywhere in daily life. In the development of embedded systems, data security is one of the critical factors. Encryption is an effective way to protect data from threats. Among encryption algorithms, chaos-based methods have strong cryptographic properties since chaotic systems are sensitive to initial conditions and parameters. However, most of these algorithms cannot be applied in practice because their encryption speed is not fast enough. In this paper, a fast image encryption algorithm is proposed. Compared with traditional chaos-based image encryption algorithms, the proposed method utilizes mixed-sequence and decorrelation operation to enhance the randomness of chaotic sequence. Moreover, it used minimum length of the sequence which is determined by experiments. Therefore, the proposed scheme spends much less computation time, which is an important advantage for being applied in practice. Testing results have shown that this algorithm has good performance in resisting known attacks, such as known-plaintext attacks, chosen ciphertext attacks, statistical attacks, differential attacks, and various brute-force attacks.

Keywords

Fast image encryption Chaos Embedded system Security Decorrelation 

Notes

Acknowledgements

Thanks for the useful suggestions provided by Yide Ma and Jizhao Liu. This study was supported by the Fundamental Research Funds for the Central Universities (No.lzujbky-2016-238). National Natural Science Foundation of China (No.61175012). 2017 s batch of innovation base and innovative talents (Small and medium enterprises innovation fund 17CX2JA018).

References

  1. 1.
    Alvarez G, Li S (2006) Some basic cryptographic requirements for chaos-based cryp- tosystems. Int J Bifurcation Chaos 16:2129–2151CrossRefzbMATHGoogle Scholar
  2. 2.
    Chen G, Mao YB, Chui CK (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons Fractals 21(3):749–761MathSciNetCrossRefzbMATHGoogle Scholar
  3. 3.
    chuan Y, Xijun WANG, GAO Yongke LI, Qingmin TIAN (2015) A new scheme for UAV TT&C and information transmission system. Int Conf Adv Mech Eng Indust Inform (AMEII) 2015(2015):1018–1022Google Scholar
  4. 4.
    Fridrich J (1998) Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifurcation Chaos 8(6):1259–1284MathSciNetCrossRefzbMATHGoogle Scholar
  5. 5.
    Galatolo S (2003) Complexity, initial condition sensitivity, dimension and weak chaos in dynamical systems. Nonlinearity 16(4):1219–1238MathSciNetCrossRefzbMATHGoogle Scholar
  6. 6.
    Reinhard Gerndt, Sören Michalik, Stefan Krupop (2011) Embedded vision system for robotics and industrial automation, 2011 9th IEEE International Conference on Industrial Informatics. 895–899Google Scholar
  7. 7.
    Guo W, Zhao J, Ye R (2014) A Chaos-based pseudorandom permutation and bilateral diffusion scheme for image encryption, international journal of image. Graph Sign Proc 6(11):50–61CrossRefGoogle Scholar
  8. 8.
    Hamza R, Titouna F (2016) A novel sensitive image encryption algorithm based on the Zaslavsky chaotic map. Inform Sec J A Glob Perspect 25(4–6):162–179CrossRefGoogle Scholar
  9. 9.
    Li Y, Wang YL (2015) Customizing dynamic libraries of Qt based on the embedded Linux. Appl Mech Mater 740:782–785CrossRefGoogle Scholar
  10. 10.
    Liu Y, Nie L, Han L, Zhang L, David S (2015) Rosenblum, Action2Activity: recognizing complex activities from sensor data. Proc Twenty-Fourth Int Joint Conf Artificial Intel (IJCAI) 2015:1617–1623Google Scholar
  11. 11.
    Liu Y, Zhang L, Nie L, Yan Y, Rosenblum DS (2016) Fortune teller: predicting your career path. Proc Thirtieth AAAI Conf Artific Intel (AAAI-16):201–207Google Scholar
  12. 12.
    Liu Y, Nie L, Liu L, Rosenblum DS (2016) From action to activity: sensor-based activity recognition. Neurocomputing 181:108–115CrossRefGoogle Scholar
  13. 13.
    Liu J, Ma Y, Li S, Lian J, Xinguo Zhang A (2018) New simple chaotic system and its application in medical image encryption. Multimed Tools Appl 4:1–22Google Scholar
  14. 14.
    Liu J, Sprott JC, Wang S, Ma Y (2018) Simplest chaotic system with a hyperbolic sine and its applications in DCSK scheme. IET CommunGoogle Scholar
  15. 15.
    Malinowski A, Yu H (2011) Comparison of embedded system Design for Industrial Applications. IEEE Trans Indust Inform 7(2):244–254CrossRefGoogle Scholar
  16. 16.
    Murillo-Escobar MA, Cruz-Hernández C, Abundiz-Pérez F, López-Gutiérrez RM (2016) Implementation of an improved chaotic encryption algorithm for real-time embedded systems by using a 32-bit microcontroller. Microprocess Microsyst 45:297–309CrossRefGoogle Scholar
  17. 17.
    Mykhatsky OYu , KuzmenkoNS , Savchenko OV (2013) Experimental UAV flight data structuring transmission and visualization by narrowband telemetry transmission, 2013 IEEE 2nd International Conference Actual Problems of Unmanned Air Vehicles Developments Proceedings (APUAVD). 118–121Google Scholar
  18. 18.
    Pareek NK, Vinod Patidar KKS (2006) Image encryption using chaotic logistic map. Image Vis Comput 24:926–934CrossRefGoogle Scholar
  19. 19.
    Song R, Lang WC, Pan SW (2009) Development of embedded system GUI based on Qt/embedded. Appl Mech Mater 109:586–590CrossRefGoogle Scholar
  20. 20.
    Talarposhti KM, Jamei MK (2016) A secure image encryption method based on dynamic harmony search (DHS) combined with chaotic map. Opt Lasers Eng 81:21–34CrossRefGoogle Scholar
  21. 21.
    Wong KW, Kwok SH, Law WS (2008) A fast image encryption scheme based on chaotic standard map. Phys Lett A 372(15):2645–2652CrossRefzbMATHGoogle Scholar
  22. 22.
    Xu Z, Wu L, Gerke M, Wang R, Yang H (2016) Skeletal camera network embedded structure-from-motion for 3D scene reconstruction from UAV images. ISPRS J Photogramm Remote Sens 121:113–127CrossRefGoogle Scholar
  23. 23.
    Xu H, Tong X, Meng X (2016) An efficient chaos pseudo-random number generator applied to video encryption. Optik - Int J Light Electron Optics 127(20):9305–9319CrossRefGoogle Scholar
  24. 24.
    Yao Y, Zhang W, Yu N (2017) Inter-frame distortion drift analysis for reversible data hiding in encrypted H.264/AVC video bitstreams. Signal Process 132:19–28CrossRefGoogle Scholar
  25. 25.
    YAOBIN MAO, GUANRONG CHEN, SHIGUO LIAN (2004) A novel fast image encryption scheme based on the 3D chaotic baker map. Int J Bifurcat Chaos 14(10):3613–3624MathSciNetCrossRefzbMATHGoogle Scholar
  26. 26.
    Yin SJ, Xia DC, Ma J (2014) Application of machine vision in ARM based on OpenCV and Qt. Adv Mater Res 1049-1050(1):1938–1941CrossRefGoogle Scholar
  27. 27.
    Zhang G, Liu Q (2011) A novel image encryption method based on total shuffling scheme. Opt Commun 284(12):2775–2780CrossRefGoogle Scholar
  28. 28.
    Zhang YQ, Wang XY (2014) A symmetric image encryption algorithm based on mixed linear–nonlinear coupled map lattice. Inf Sci 273(8):329–351CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  1. 1.School of Information Science and EngineeringLanzhou UniversityLanzhouChina

Personalised recommendations