Abstract
A new image encryption scheme, based on a total shuffling and parallel encryption algorithm is proposed in this paper. Two chaotic systems have been used in the encryption algorithm to confuse the relationship between the plain-image and the cipher-image. To make the encryption procedure more confusing and complex, the plain-image is first divided into 4 sub-images and then the position of each sub-image is changed pseudo-randomly according to a logistic map. Next, a total shuffling matrix is used to shuffle the position of pixels in the whole image and then sub-images are encrypted simultaneously in a parallel manner. The experimental results on USC data base demonstrate that the proposed encryption algorithm has a low time complexity and has the advantages of large key space and high security. Moreover, the robustness of this locally encryption method is much more in contrast with other encryption schemes and the distribution of gray values has a random-like behavior in the encrypted image.
Similar content being viewed by others
References
Beldhouche, F., Qidwai, U.: Binary image encoding using ID chaotic map. In: Proceedings of the IEEE Annual Technical Conference, pp. 39–43 (2003)
Bu, S.L., Wang, B.H.: Improving the security of chaotic encryption by using a simple modulating method. Chaos Solitons Fractals 19, 919–924 (2004)
Chang, C.C., Hwang, M.S., Chen, T.S.: A new encryption algorithm for image cryptosystems. J. Syst. Softw. 58, 83–91 (2001)
Chee, C.Y., Xu, D., Steven, R., Bishop, B.: A zero-crossing approach to uncover the mask by chaotic encryption with periodic modulation. Chaos Solitons Fractals 21, 1129–1134 (2004)
Chen, G., Mao, Y.B., Chui, C.K.: A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Solitons Fractals 21, 749–761 (2004)
Chien, T.-I., Liao, T.-L.: Design of secure digital communication systems using chaotic modulation, cryptography and chaotic synchronization. Chaos Solitons Fractals 24, 241–255 (2005)
Kocarev, L.: Chaos-based cryptography: a brief overview. IEEE Circuits Syst. Mag. 1(3), 6–21 (2001)
Kocarev, L., Jakimovski, G.: Chaos and cryptography: from chaotic maps to encryption algorithms. IEEE Trans. Circuits Syst. 48(2), 163–169 (2001)
Fridrich, J.: Symmetric ciphers based on two-dimensional chaotic maps. Int. J. Bifurc. Chaos Appl. Sci. Eng. 8(6), 1259–1284 (1998)
Gao, H.J., Zhang, Y.S., Liang, S.Y., Li, D.Q.: A new chaotic algorithm for image encryption. Chaos Solitons Fractals 29, 393–399 (2006)
Li, S., Zheng, X.: Cryptanalysis of a chaotic image encryption method. In: Proceedings of the IEEE International Conference on Circuits and Systems, vol. 2, pp. 708–711 (2002)
Liu, H., Wang, X.: Color image encryption based on one-time keys and robust chaotic maps. Comput. Math. Appl. 59(10), 3320–3327 (2010)
Lü, J.H., Chen, G.R.: A new chaotic attractor coined. Int. J. Bifurc. Chaos Appl. Sci. Eng. 12(3), 659–661 (2002)
Mao, Y.B., Chen, G., Lian, S.G.: A novel fast image encryption scheme based on the 3D chaotic baker map. Int. J. Bifurc. Chaos Appl. Sci. Eng. 14, 3613–3624 (2004)
Matthews, R.: One the derivation of a chaotic encryption algorithm. Cryptologia 8(1), 29–42 (1989)
Zhou, Q., Wong, K.-w., Liao, X., Xiang, T., Hu, Y.: Parallel image encryption algorithm based on discretized chaotic map. Chaos Solitons Fractals 00, 1081–1092 (2007)
Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd edn. Wiley, New York (1995)
Gao, T., Chen, Z.: Image encryption based on a new total shuffling algorithm. Chaos Solitons Fractals 00, 213–220 (2006)
Wang, X.-Y., Feng, C., Tian, W.: A new compound mode of confusion and diffusion for block encryption of image based on chaos. Commun. Nonlinear Sci. Numer. Simul. 15(9), 2479–2485 (2009)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Mirzaei, O., Yaghoobi, M. & Irani, H. A new image encryption method: parallel sub-image encryption with hyper chaos. Nonlinear Dyn 67, 557–566 (2012). https://doi.org/10.1007/s11071-011-0006-6
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11071-011-0006-6