In this paper, we propose to enhance a recently proposed image cryptosystem based on hyper-chaos. The updated version has been builded to resist against attacks made to break the original one and to make it faster. The modification concerns the two Boxes, P-Box and S-Box, which composed the original cryptosystem. Compared with classical encryption schemes, AES and Triple-DES, the new version of the cipher shows a better performances in rapidity, in confusion and in the key sensitivity.
This is a preview of subscription content, log in to check access.
Buy single article
Instant access to the full article PDF.
Price includes VAT for USA
Subscribe to journal
Immediate online access to all issues from 2019. Subscription will auto renew annually.
This is the net price. Taxes to be calculated in checkout.
Alvarez, G., & Li, S. (2006). Some basic cryptographic requirements for chaos-based cryptosystems. International Journal of Bifurcation and Chaos, 16(8), 2129–2151.
Chen, G., Mao, Y., & Chui, C. K. (2004). A symmetric image encryption based on 3D chaotic maps. Chaos, Solitons and Fractals, 21, 749–761.
Ehrsam, W. F., Meyer, C. H. W., Smith, J. L., & Tuchman, W. L. (1976). Message verification and transmission error detection by block chaining. U.S. Patent 4,074,066.
Fridirich, J. (1998). Symmetric ciphers based on two-dimensional chaotic maps. International Journal of Bifurcation and Chaos, 8(6), 1259–1284.
Gao, T., & Chen, Z. (2008). A new image encryption algorithm based on hyper-chaos. Physics Letters A, 372(4), 394–400.
Ge, X., Liu, F., Lu, B., & Yang, C. (2010). Improvement of Rhouma’s attacks on gao algorithm. Physics Letters A, 374(11–12), 1362–1367.
Guan, Z. H., Huang, F., & Guan, W. (2005). Chaos-based image encryption algorithm. Physics Letters A, 346(1–3), 153–157.
Li, S., Chen, G., & Mou, X. (2005). On the dynamical degradation of digital piecewise linear chaotic maps. International Journal of Bifurcation and Chaos, 15(10), 3119–3151.
Mahmodi, H., Behnia, S., Akhshani, A., & Akhavan, A. (2008). A novel algorithm for image encryption based on mixture of chaotic maps. Chaos, Solitons and Fractals, 35, 408–419.
Menezes, A., van Oorschot, P., & Vanstone, S. (1997). Handbook of applied cryptography. Boca Raton: CRC Press.
Mou, X., Li, S., Zheng, X., & Cai, Y. (2002). Chaotic encryption scheme for real time digital video. In SPIE on electronic imaging, San Jose, CA, USA.
Rhouma, R., & Belghith, S. (2008). Cryptanalysis of a new image encryption algorithm based on hyper-chaos. Physics Letters A, 372(38), 5973–5978.
Shanon, C. E. (1949). Communication theory of secrecy systems. The Bell System Technical Journal, 28(4), 656–715.
Wikipedia (2010). Block cipher modes of operation. Wikipedia.
Yano, K., & Tanaka, K. (2002). Image encryption scheme based on truncated Baker transformation. IIEICE Transactions on Fundamentals E85-A(9), 2025–2035.
Yen, J. C., Guo, J., & Pan, H. F. (2002). New voice over internet protocol technique with hierarchical data security protection. IEE Vis Image Signal Process 149, 4.
About this article
Cite this article
Hermassi, H., Rhouma, R. & Belghith, S. Improvement of an image encryption algorithm based on hyper-chaos. Telecommun Syst 52, 539–549 (2013). https://doi.org/10.1007/s11235-011-9459-7