Efficient image encryption with block shuffling and chaotic map
- 858 Downloads
Image encryption is a useful technique for many applications, such as image content protection, image authentication, pay-TV and data hiding. In this paper, we propose an efficient image encryption algorithm with block shuffling and chaotic map. The proposed algorithm divides an input image into overlapping blocks, shuffles image blocks to make initial encryption, exploits a chaotic map and Arnold transform to generate secret matrices, and achieves final encryption by conducting exclusive OR operations between corresponding elements of each block and a random secret matrix. Many experiments are done to validate efficiency and advantages of the proposed algorithm.
KeywordsImage encryption Image scrambling Arnold transform Block shuffling Chaotic map Skew tent map
The authors are grateful for the anonymous reviewers’ insightful comments and valuable suggestions sincerely, which can substantially improve the quality of this paper.
This work was partially supported by the Natural Science Foundation of China (61300109, 61363034), the Guangxi Natural Science Foundation (2012GXNSFBA053166, 2012GXNSFGA060004, 2011GXNSFD018026), the Guangxi “Bagui” Teams for Innovation and Research, the Training Project for Excellent Middle-aged/Young Teachers in Guangxi Higher Education Institutions, the Project of the Guangxi Experiment Center of Information Science (20130204), the Guangxi Key Laboratory of Trusted Software (kx201327), the Scientific and Technological Research Projects of Chongqing’s Education Commission (KJ121310), and the Scientific and Technological Program of Fuling District of Chongqing (FLKJ,2012ABA1056).
- 2.Ginesu G, Giusto DD, Onali T (2006) Wavelet domain scrambling for image-based authentication. In: Proc. of International Conference on Acoustics, Speech, and Signal Processing (ICASSP), pp. 313–316Google Scholar
- 7.Qi D (1999) Matrix transformation and its application to image hiding. J North China Univ Technol 11(1):24–28 (in Chinese)Google Scholar
- 9.Shang Z, Ren H, Zhang J (2008) A block location scrambling algorithm of digital image based on Arnold transformation. In: Proc. of the 9th International Conference for Young Computer Scientists, pp. 2942–2947Google Scholar
- 13.Tang Z, Lan W, Dai Y, He J (2011) Image encryption using mapping array and random division. ICIC Express Lett Part B Appl 2(6):1297–1302Google Scholar
- 14.Tang Z, Wang S, Zhang X, Wei W, Su S (2008) Robust image hashing for tamper detection using nonnegative matrix factorization. J Ubiquit Converg Technol 2(1):18–26Google Scholar
- 17.The SSIM Index for Image Quality Assessment. [Online] Available: http://www.cns.nyu.edu/lcv/ssim/
- 18.USC-SIPI Image Database. [Online] Available: http://sipi.usc.edu/database/
- 20.Venkatesan R, Koon S M, Jakubowski M H, Moulin P (2000) Robust image hashing. In: Proc. of International Conference on Image Processing (ICIP), pp. 664–666Google Scholar
- 23.Watanabe O, Nakazaki A, Kiya H (2004) A fast image-scramble method using public-key encryption allowing backward compatibility with JPEG2000. In: Proc. of International Conference on Image Processing (ICIP), pp. 3435–3438Google Scholar
- 25.Xiang S, Kim H J, Huang J (2007) Histogram-based image hashing scheme robust against geometric deformations. In: Proceedings of the 9th Workshop on Multimedia & Security, ACM, New York, NY, USA, pp. 121–128Google Scholar
- 28.Zhu L, Li W, Liao L, Li H (2006) A novel algorithm for scrambling digital image based on cat chaotic mapping. In: Proc. of International Conference on Intelligent Information Hiding and Multimedia, Signal Processing (IIH-MSP), pp. 601–604Google Scholar