Abstract
In this paper, we propose a chaotic image encryption algorithm, which adopts the mechanism of shuffling the positions and changing the grey values of image pixels. Firstly, the discrete Kolmogorov flow is used to shuffle the positions of the image pixels in the spatial-domain. The second, the Liu chaotic system is adopted to generate integer key for the image encryption, and the shuffled image is encrypted by the integer key. The third, we show that the advantages of large key space due to its improved security and the maturity of the technology using chaotic image encryption algorithm.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Diffie, W., Hellman, M.: New Directions in Cryptography. IEEE Transactions on Information Theory 22(6), 644–654 (1976)
Fridrich, J.: Image Encryption Based on Chaotic Maps. In: Proc. IEEE Conf. on Systems. Man and Cybernetics, Orlando, Florida, pp. 1105–1110. IEEE Computer Society Press, Los Alamitos (1997)
Milanovic, V., Mona, E Z: Synchronization of Chaotic Neural Networks for Secure Communications. In: IEEE International Symposium on Circuits and Systems, pp. 28–31. IEEE Computer Society Press, Los Alamitos (1996)
Alattar, A.M, Ghassan, I.A.: Improved Selective Encryption Techniques for Secure Transmission of MPEG Video Bit-streams. In: Proc. IEEE ICIP’99, Kobe Japan, vol. 4, pp. 256–260 (1999)
Guo, D., Cheng, L.: A New Symmetric Probabilistic Encryption Scheme Based on Chaotic Attractors of Neural Networks. Applied Intelligence, 71–84 (1999)
Dang, P., Chen, M.: Image Encryption for Secure Internet Multimedia Application. IEEE Trans Consumer Electronics 46(3), 395–403 (2000)
Lee, J., Jae-cheol, R.: Strong User an Authentication in IEEE 802.11 Wireless LAN[C]. In: Chung, C.-W., Kim, C.-k., Kim, W., Ling, T.-W., Song, K.-H. (eds.) HSI 2003. LNCS, vol. 2713, pp. 638–643. Springer, Heidelberg (2003)
Beldhouche, F., Qidwai, U.: Binary Image Encoding Using ID Chaotic Maps[C]. In: Proc. Of IEEE Annual Technical Conference, pp. 39–43. IEEE Computer Society Press, Los Alamitos (2003)
Chen, G., Mao, Y: Chaos-based Image Encryption, Handbook of Computational Geometry for Pattern Recognition [M]. Springer, Berlin (2003)
Katygiannis, T., Owens, L.: Draft Wireless Network Security[R].National Institute of Standards and Technology, Special Publication 800-48, US Department of Commerce (2002)
IEEE. Standards for Local and Metropolitan Area Networks: Standard for Port-based Network Access Control[S] IEEE Draft P802.1X/D11 (2001)
Yi, D., Zhou, J., Han, X.L.: A Kind New Sets Transforms Randomly and in Pictorial Information Hiding Application [J]. Chinese Science 30(5), 440–447 (2000)
Ying, W., Yan, W., Qing, D.: Based on Sets Randomly and Applies with the Fusion Digital Image Hideaway Technology[J]. Chinese image graph journal (A) 5(8), 644–649 (2000)
Wen, Z., Li, T., Zhang, Z.: An Image Encryption Technology Based on Chaotic Sequences [J]. Computer Project 31(10), 130–132 (2005)
Liu, C., Liu, T., Liu, L.: A New Chaotic Attractor [J]. Solitons and Fractals 22(5), 1031–1038 (2004)
Zhu, C., Li, L., Chen, Z.: New Image Encryption Algorithm Based on Combined Multidimensional Chaotic Systems [J]. Computer Project 33(2), 142–144 (2007)
Chen, G., Mao, Y., Charles, K.: A Symmetric Image Encryption Scheme Based on 3D Chaotic Cat Maps [J]. Chaos, Solitons and Fractals 3(21), 749–761 (2004)
Guan, Z., Huang, F., Guan, W.: Chaos-based Image Encryption Algorithm[J]. Physics Letters A 346(1-3), 153–157 (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Dong, C., Li, J., Xi, L., Hao, J., Jin, R. (2007). Improvement of an Image Encryption Algorithm Based on Combined Multidimensional Chaotic Systems. In: Apolloni, B., Howlett, R.J., Jain, L. (eds) Knowledge-Based Intelligent Information and Engineering Systems. KES 2007. Lecture Notes in Computer Science(), vol 4693. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74827-4_27
Download citation
DOI: https://doi.org/10.1007/978-3-540-74827-4_27
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-74826-7
Online ISBN: 978-3-540-74827-4
eBook Packages: Computer ScienceComputer Science (R0)