Advertisement

Springer Nature is making SARS-CoV-2 and COVID-19 research free. View research | View latest news | Sign up for updates

Improvement of an image encryption algorithm based on hyper-chaos

Abstract

In this paper, we propose to enhance a recently proposed image cryptosystem based on hyper-chaos. The updated version has been builded to resist against attacks made to break the original one and to make it faster. The modification concerns the two Boxes, P-Box and S-Box, which composed the original cryptosystem. Compared with classical encryption schemes, AES and Triple-DES, the new version of the cipher shows a better performances in rapidity, in confusion and in the key sensitivity.

This is a preview of subscription content, log in to check access.

References

  1. 1.

    Alvarez, G., & Li, S. (2006). Some basic cryptographic requirements for chaos-based cryptosystems. International Journal of Bifurcation and Chaos, 16(8), 2129–2151.

  2. 2.

    Chen, G., Mao, Y., & Chui, C. K. (2004). A symmetric image encryption based on 3D chaotic maps. Chaos, Solitons and Fractals, 21, 749–761.

  3. 3.

    Ehrsam, W. F., Meyer, C. H. W., Smith, J. L., & Tuchman, W. L. (1976). Message verification and transmission error detection by block chaining. U.S. Patent 4,074,066.

  4. 4.

    Fridirich, J. (1998). Symmetric ciphers based on two-dimensional chaotic maps. International Journal of Bifurcation and Chaos, 8(6), 1259–1284.

  5. 5.

    Gao, T., & Chen, Z. (2008). A new image encryption algorithm based on hyper-chaos. Physics Letters A, 372(4), 394–400.

  6. 6.

    Ge, X., Liu, F., Lu, B., & Yang, C. (2010). Improvement of Rhouma’s attacks on gao algorithm. Physics Letters A, 374(11–12), 1362–1367.

  7. 7.

    Guan, Z. H., Huang, F., & Guan, W. (2005). Chaos-based image encryption algorithm. Physics Letters A, 346(1–3), 153–157.

  8. 8.

    Li, S., Chen, G., & Mou, X. (2005). On the dynamical degradation of digital piecewise linear chaotic maps. International Journal of Bifurcation and Chaos, 15(10), 3119–3151.

  9. 9.

    Mahmodi, H., Behnia, S., Akhshani, A., & Akhavan, A. (2008). A novel algorithm for image encryption based on mixture of chaotic maps. Chaos, Solitons and Fractals, 35, 408–419.

  10. 10.

    Menezes, A., van Oorschot, P., & Vanstone, S. (1997). Handbook of applied cryptography. Boca Raton: CRC Press.

  11. 11.

    Mou, X., Li, S., Zheng, X., & Cai, Y. (2002). Chaotic encryption scheme for real time digital video. In SPIE on electronic imaging, San Jose, CA, USA.

  12. 12.

    Rhouma, R., & Belghith, S. (2008). Cryptanalysis of a new image encryption algorithm based on hyper-chaos. Physics Letters A, 372(38), 5973–5978.

  13. 13.

    Shanon, C. E. (1949). Communication theory of secrecy systems. The Bell System Technical Journal, 28(4), 656–715.

  14. 14.

    Wikipedia (2010). Block cipher modes of operation. Wikipedia.

  15. 15.

    Yano, K., & Tanaka, K. (2002). Image encryption scheme based on truncated Baker transformation. IIEICE Transactions on Fundamentals E85-A(9), 2025–2035.

  16. 16.

    Yen, J. C., Guo, J., & Pan, H. F. (2002). New voice over internet protocol technique with hierarchical data security protection. IEE Vis Image Signal Process 149, 4.

Download references

Author information

Correspondence to Houcemeddine Hermassi.

Rights and permissions

Reprints and Permissions

About this article

Cite this article

Hermassi, H., Rhouma, R. & Belghith, S. Improvement of an image encryption algorithm based on hyper-chaos. Telecommun Syst 52, 539–549 (2013). https://doi.org/10.1007/s11235-011-9459-7

Download citation

Keywords

  • Chaos
  • Cryptography
  • Cryptanalysis