Skip to main content

Improvement of an Image Encryption Algorithm Based on Combined Multidimensional Chaotic Systems

  • Conference paper
Knowledge-Based Intelligent Information and Engineering Systems (KES 2007)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 4693))

  • 2065 Accesses

Abstract

In this paper, we propose a chaotic image encryption algorithm, which adopts the mechanism of shuffling the positions and changing the grey values of image pixels. Firstly, the discrete Kolmogorov flow is used to shuffle the positions of the image pixels in the spatial-domain. The second, the Liu chaotic system is adopted to generate integer key for the image encryption, and the shuffled image is encrypted by the integer key. The third, we show that the advantages of large key space due to its improved security and the maturity of the technology using chaotic image encryption algorithm.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Diffie, W., Hellman, M.: New Directions in Cryptography. IEEE Transactions on Information Theory 22(6), 644–654 (1976)

    Article  MathSciNet  MATH  Google Scholar 

  2. Fridrich, J.: Image Encryption Based on Chaotic Maps. In: Proc. IEEE Conf. on Systems. Man and Cybernetics, Orlando, Florida, pp. 1105–1110. IEEE Computer Society Press, Los Alamitos (1997)

    Google Scholar 

  3. Milanovic, V., Mona, E Z: Synchronization of Chaotic Neural Networks for Secure Communications. In: IEEE International Symposium on Circuits and Systems, pp. 28–31. IEEE Computer Society Press, Los Alamitos (1996)

    Google Scholar 

  4. Alattar, A.M, Ghassan, I.A.: Improved Selective Encryption Techniques for Secure Transmission of MPEG Video Bit-streams. In: Proc. IEEE ICIP’99, Kobe Japan, vol. 4, pp. 256–260 (1999)

    Google Scholar 

  5. Guo, D., Cheng, L.: A New Symmetric Probabilistic Encryption Scheme Based on Chaotic Attractors of Neural Networks. Applied Intelligence, 71–84 (1999)

    Google Scholar 

  6. Dang, P., Chen, M.: Image Encryption for Secure Internet Multimedia Application. IEEE Trans Consumer Electronics 46(3), 395–403 (2000)

    Article  Google Scholar 

  7. Lee, J., Jae-cheol, R.: Strong User an Authentication in IEEE 802.11 Wireless LAN[C]. In: Chung, C.-W., Kim, C.-k., Kim, W., Ling, T.-W., Song, K.-H. (eds.) HSI 2003. LNCS, vol. 2713, pp. 638–643. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  8. Beldhouche, F., Qidwai, U.: Binary Image Encoding Using ID Chaotic Maps[C]. In: Proc. Of IEEE Annual Technical Conference, pp. 39–43. IEEE Computer Society Press, Los Alamitos (2003)

    Google Scholar 

  9. Chen, G., Mao, Y: Chaos-based Image Encryption, Handbook of Computational Geometry for Pattern Recognition [M]. Springer, Berlin (2003)

    Google Scholar 

  10. Katygiannis, T., Owens, L.: Draft Wireless Network Security[R].National Institute of Standards and Technology, Special Publication 800-48, US Department of Commerce (2002)

    Google Scholar 

  11. IEEE. Standards for Local and Metropolitan Area Networks: Standard for Port-based Network Access Control[S] IEEE Draft P802.1X/D11 (2001)

    Google Scholar 

  12. Yi, D., Zhou, J., Han, X.L.: A Kind New Sets Transforms Randomly and in Pictorial Information Hiding Application [J]. Chinese Science 30(5), 440–447 (2000)

    Google Scholar 

  13. Ying, W., Yan, W., Qing, D.: Based on Sets Randomly and Applies with the Fusion Digital Image Hideaway Technology[J]. Chinese image graph journal (A) 5(8), 644–649 (2000)

    Google Scholar 

  14. Wen, Z., Li, T., Zhang, Z.: An Image Encryption Technology Based on Chaotic Sequences [J]. Computer Project 31(10), 130–132 (2005)

    Google Scholar 

  15. Liu, C., Liu, T., Liu, L.: A New Chaotic Attractor [J]. Solitons and Fractals 22(5), 1031–1038 (2004)

    Article  MathSciNet  MATH  Google Scholar 

  16. Zhu, C., Li, L., Chen, Z.: New Image Encryption Algorithm Based on Combined Multidimensional Chaotic Systems [J]. Computer Project 33(2), 142–144 (2007)

    Google Scholar 

  17. Chen, G., Mao, Y., Charles, K.: A Symmetric Image Encryption Scheme Based on 3D Chaotic Cat Maps [J]. Chaos, Solitons and Fractals 3(21), 749–761 (2004)

    Article  MathSciNet  MATH  Google Scholar 

  18. Guan, Z., Huang, F., Guan, W.: Chaos-based Image Encryption Algorithm[J]. Physics Letters A 346(1-3), 153–157 (2005)

    Article  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Dong, C., Li, J., Xi, L., Hao, J., Jin, R. (2007). Improvement of an Image Encryption Algorithm Based on Combined Multidimensional Chaotic Systems. In: Apolloni, B., Howlett, R.J., Jain, L. (eds) Knowledge-Based Intelligent Information and Engineering Systems. KES 2007. Lecture Notes in Computer Science(), vol 4693. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74827-4_27

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-74827-4_27

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-74826-7

  • Online ISBN: 978-3-540-74827-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics