Skip to main content

Part of the book series: Advances in Intelligent and Soft Computing ((AINSC,volume 149))

Abstract

Due to the pseudo-randomness and sensitivity of the initial value of chaos theory, and the technology of magic square which can scramble image in an efficient way, this algorithm uses the magic square transformation for the original image preprocess firstly, this process is pretreatment on the basis of magic square algorithm improved ranks. Then use Arnold to a second image scrambling, finally using logistic, henon produce array and the image scrambling gray values, which makes the image’s position and gray value transformed in the same time , get the final encrypted image. Through theoretical analysis and experiments show that the algorithm has great key space, good effect, and can resist common attack effectively, etc.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Sheng, C., Zhang, H., Feng, D.: Information Security Review. Science in China E: Technological Sciences 37(2), 129–150 (2007)

    Google Scholar 

  2. Stallings, W.: Cryptography and Network Security, 4th edn. Prentice Hall, Lodon (2005)

    Google Scholar 

  3. Liu, J., Qiu, S.: Chaotic Systems in Cryptography Application Status and Prospects. Computer Engineering and Application 44(14), 5–12 (2008)

    Google Scholar 

  4. Fridrich, J.: Image Encryption Based on Chaotic Maps. In: IEEE International Conference on System, Man, and Cybernetics, pp. 1105–1110 (1997)

    Google Scholar 

  5. Zhao, L., Fang, Z., Gu, Z.: Novel Algorithm of Digital Image Scrambling and Encryption Based on Magic Cube Transformation. Journal of Optoelectronics Laser 19(1), 131–134 (2008)

    Google Scholar 

  6. May, R.M.: Simple Mathematic Models With Very Complicated Dynamic. Nature 261, 459–467 (1976)

    Article  Google Scholar 

  7. Yi, K., Sun, X., Shi, J.: A series of images based on chaotic encryption algorithm (2005)

    Google Scholar 

  8. Li, Q.: A Chaotic Encryption Method of Decoding of The Image. University of Defense Technology University 29(3), 45–47 (2007)

    Google Scholar 

  9. Liu, J.: Image Encryption Based on Chaos Technology. Anhui University Press (April 2007)

    Google Scholar 

  10. Wang, J.: The Application Status of the Chaos Technology In Digital Image Encryption. University of Science and Technology of China (2004)

    Google Scholar 

  11. Bian, L.: Reasearch of Image Encryption Based on Chaos. Guang Dong University of Technology (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to YunPeng Zhang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag GmbH Berlin Heidelberg

About this chapter

Cite this chapter

Zhang, Y., Xu, P., Xiang, L. (2012). Research of Image Encryption Algorithm Based on Chaotic Magic Square. In: Jin, D., Lin, S. (eds) Advances in Electronic Commerce, Web Application and Communication. Advances in Intelligent and Soft Computing, vol 149. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-28658-2_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-28658-2_16

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-28657-5

  • Online ISBN: 978-3-642-28658-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics