Image Encryption Algorithm Based on Self-Adaptive and Chaos Theory

2011 ◽  
Vol 467-469 ◽  
pp. 231-235
Author(s):  
Hong Ye Zhang

An image encryption algorithm based on self-adaptive and chaos theory is presented. The scrambling transformation is completed with Logistic chaos and S-box first. Then self-adaptive image encryption scheme is used to deal with gray transformation for each pixel and image encryption is finished at last. Theoretical analyses and simulated experiment show that the proposed image encryption algorithm provides perfect results, larger key space, simple and easy to be implemented and fast running speed, so this encryption algorithm has excellent performance against many kinds of attacks and has strong practicality.

2012 ◽  
Vol 500 ◽  
pp. 465-470 ◽  
Author(s):  
Hong Ye Zhang ◽  
Run Hui Wang

An image encryption technology based on multi-dimension chaotic system, spatiotemporal chaotic theory and traditional symmetric encryption algorithm is presented. The scrambling transformation was completed with multi-dimension chaotic system first. Then spatiotemporal chaotic theory was used to deal with gray transformation for each pixel. DES Algorithm was applied to implement image encryption at last. Theoretical analyses and simulated experiment show that the proposed image encryption scheme provides perfect results, larger key space and higher security, so this encryption system has excellent performance against many kinds of attacks.


2017 ◽  
Vol 11 ◽  
pp. 06002 ◽  
Author(s):  
Rui-Song Ye ◽  
Hui-Qing Huang ◽  
Yu-Cheng Li ◽  
Chang Wang ◽  
Min-Yu Liao

2011 ◽  
Vol 341-342 ◽  
pp. 720-724 ◽  
Author(s):  
Wang Sheng Fang ◽  
Lu Lu Wu ◽  
Rong Zhang

One of the main purpose of the watermark preprocessing is to improve the robustness and security. For this reason,this paper presents an image encryption algorithm, which combines position scrambling and gray scrambling scrambled according to Arnold transform.Then all of the pixels of each sub-block are scambled by the algorithm based on Logistic chaotic map.Finally, all of the Pixels are redistributed and scrambled totally.Basing on image location scrambling,it takes advantage of multi-dimensional Arnold transformation and Logistic chaotic map, image gray scrambling is achieved. By histogram analysis,key sensitivity anslysis and correlation analysis of adjacent pixels of the results of the simulation, indicating that the scrambling effect of the algorithm is good,and the key space is large.


2019 ◽  
Vol 13 ◽  
pp. 174830261985347 ◽  
Author(s):  
Zhijuan Deng ◽  
Shaojun Zhong

In this article, we introduced a digital image encryption algorithm based on the chaotic mapping designed by Xiong et al. In their paper, the authors theoretically analyzed the algorithm and pointed out that the algorithm did not need to have the prior knowledge of the orbital distribution and one can select any chaotic model. In this way, the algorithm greatly expanded the cryptographic space and greatly reduced the number of iterations of the mapping. Since the algorithm has many characteristics, for instance, it is sensitive to the secret key, its key space is big, the pixel is well distributed after being encrypted, etc., the security of the encrypted images can be assured effectively. However, since the algorithm applied the image scrambling for encryption, and did not take the chosen-plaintext attacks into consideration, the algorithm is relatively weak in resisting the chosen-plaintext attacks. Therefore, we put forward a kind of image replacement method based on chaos, which can resist the chosen-plaintext attacks. And the experimental simulation proves that this algorithm not only has many characteristics, for instance, it is sensitive to the secret key, its key space is big, the pixel is well distributed after being encrypted, etc., but also can resist the chosen-plaintext attacks effectively. In the meanwhile, the algorithm is very sensitive to the small changes of the plaintexts, and its encrypted images will completely lose the features of the original ones.


2018 ◽  
Vol 2018 ◽  
pp. 1-12
Author(s):  
R. M. Lin ◽  
T. Y. Ng

It is well known that encryption algorithms developed based on Logistic map suffer from limited key space due to the narrow regions of system parameters which can be used, potential risk of security in the presence of numerous periodic windows within the key space, and weakness in known-plain-text attack due to the inherent correlation among the chaotic sequence used for encryption. To overcome these existing problems, this paper presents a secure image encryption algorithm based on a new highly nonlinear discrete dynamical system with ideal chaotic characteristics. Transcendental functions are introduced together with modulo operations which physically represent discontinuous time-varying nonlinearities, leading to extremely complex chaotic behavior that is highly sensitive to system parameters and initial conditions, both of which are considered as the key for the cryptosystem. Extensive numerical experiment results have revealed that the proposed image encryption algorithm offers advantages of unlimited key space and high-level security, since those problematic periodic windows are no longer present within the key space, and it is extremely robust against known-plain-text attack, since the chaotic sequence generated bears no correlation whatsoever due to the folding effect of modulo operation. The algorithm makes truly efficient yet highly secure image encryption based on chaotic systems a reality.


Sign in / Sign up

Export Citation Format

Share Document