Abstract
This paper presents a novel image encryption scheme based on a hybrid of three order chaotic Chen system and piecewise linear chaotic map (PWLCM). The initial conditions and control parameters of chaotic systems are viewed as the secret key, and combined sequences from these two chaotic systems are employed to encrypt original image. The proposed scheme is described in detail, along with experimental example and security analyses including sensitivity analysis, analysis of correlation of adjacent pixels and information entropy analysis. The results show that the suggested scheme has some desirable properties in a good security cryptosystem.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Kocarev, L.: Chaos-based cryptography: A brief overview. IEEE Circ. Syst. Maga. 1, 6–21 (2001)
Fridrich, J.: Symmetric ciphers based on two-dimensional chaotic maps. Int. J. Bifu. Chaos 8, 1259–1284 (1998)
Fridrich, J.: Image encryption based on chaotic maps. In: IEEE Int. Conf. Syst. Man Cybe., Orlando, FL, USA (1997)
Alvarez, G., Li, S.: Some basic cryptographic requirements for chaos-based cryptosystems. Int. J. Bifu. Chaos 16, 2129–2151 (2006)
Yang, T., Wu, C., Chua, L.: Cryptography based on chaotic systems. IEEE Tran. CAS-I 44, 469–472 (1997)
Grzybowski, J., Rafikov, M., Balthaza, J.: Synchronization of the unified chaotic system and application in secure communication. Comm. Nonl. Scie. Nume. Simu. 14, 2793–2806 (2009)
Chen, G., Mao, Y., Chui, C.: A symmetric image encryption based on 3D chaotic maps. Chaos Soli. Frac. 21, 749–761 (2004)
Tong, X., Cui, M.: Image encryption scheme based on 3D baker with dynamical compound chaotic sequence cipher generator. Sign. Proc. 89, 480–491 (2009)
Peng, J., Zhang, D., Liao, X.: A digital image encryption algorithm based on hyper-chaotic cellular neural network. Fund. Info. 90, 269–282 (2009)
Zhang, J., Wang, X., Zhang, W.: Chaotic keyed hash function based on feedforward - feedback nonlinear digital filter. Phys. Lett. A 362, 439–448 (2007)
Peng, J., Zhang, D., Liu, Y., Liao, X.: A double-piped iterated hash function based on a hybrid of chaotic maps. In: 7th IEEE Int. Conf. Cogn. Info., pp. 358–365 (2008)
Yen, J., Guo, J.: A new chaotic key-based design for image encryption and decryption. In: Proc. IEEE Int. Conf. Circ. Syst., vol. 4, pp. 49–52 (2000)
Li, S., Zheng, X.: Cryptanalysis of a chaotic image encryption method. In: Proc. IEEE Int. Symp. Circ. Syst., vol. 2, pp. 26–29 (2002)
Li, P., Li, Z., Halanga, W., Chen, G.: A multiple pseudorandom-bit generator based on a spatiotemporal chaotic map. Phys. Lett. A 349, 467–473 (2006)
Chen, G., Dong, X.: From chaos to order methodologies, perspectives, and applications. World Scientific, Singapore (1998)
Ueta, T., Chen, G.: Bifurcation analysis of Chen’S equation. Int. J. Bifu. Chaos 10, 1917–1931 (2000)
Yassen, M.: Chaos control of Chen chaotic dynamical system. Chaos Soli. Frac. 15, 271–228 (2003)
Li, S., Álvarez, G., Chen, G.: Breaking a chaos-based secure communication scheme designed by an improved modulation method. Chaos Soli. Frac. 25, 109–120 (2005)
Shannon, C.: Communication theory of secrecy system. Bell Syst. Tech. J. 28, 656–715 (1949)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Guan, Z., Peng, J., Jin, S. (2010). Research on a Novel Image Encryption Scheme Based on the Hybrid of Chaotic Maps. In: Zhang, L., Lu, BL., Kwok, J. (eds) Advances in Neural Networks - ISNN 2010. ISNN 2010. Lecture Notes in Computer Science, vol 6064. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13318-3_29
Download citation
DOI: https://doi.org/10.1007/978-3-642-13318-3_29
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-13317-6
Online ISBN: 978-3-642-13318-3
eBook Packages: Computer ScienceComputer Science (R0)