Abstract
Since the size of the image file is not reduced after encryption, the flow rate of image file transmission cannot be reduced. Transmission time is wasted. To meet the requirements of security and real-time, wavelet transform and chaotic image encryption technology are combined. A cross-chaos map has been proposed based on Devaney’s theory. The image pixels are scrambled under the control of high-dimensional chaotic sequence, which is generated by the cross chaotic map. The image pixels are substituted by the ciphertext feedback algorithm. The algorithm can relate to encryption parameters with plaintext, and can make one plaintext byte affect more ciphertext bytes. In the process of image wavelet transform, image encryption and image compression are combined. The low frequency region of the wavelet transform is encrypted. Security analysis and experimental validation illuminated that the algorithm has high security, good encryption speed, and compression effect. The algorithm has good practical value.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Zong, S.D.: Information Security and Application Infrastructure. Chongqing University Press, Chongqing (2005)
Kocarev, L., Jakimoski, G., Stojanovski, T., From, P.U.: Chaotic maps to encryption schemes. In: Symposium on Circuits and Systems, vol. 4, pp. 514–517 (1998)
Wang, X.Y.: Complex Chaos in Nonlinear System. Publishing House of Electronics Industry, Beijing (2003)
Palmore, J.: Computer arithmetic chaos and fractals. Physica D 42, 99–110 (2006)
NIST: A statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications, vol. 5, pp. 6–125 (2001)
Liu, J.L., Zhang, H., Wang, Y.: Analysis and improvement of a class of iterative chaos block cipher. Comput. Sci. 16, 141–144 (2008)
Zhang, Y., Li, C., Li, Q.: Breaking a chaotic image encryption algorithm based on perceptron model. Nonlinear Dyn. 69, 1091–1096 (2012)
Li, C.Q., Lo, K.T.: Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks. Signal Process. 91, 49–54 (2011)
Wang, Y., Wong, K.W., Liao, X., Chen, G.: A new chaos-based fast image encryption algorithm. Appl. Soft Comput. 11, 514–522 (2011)
Solak, E., Yildiz, O.T., Biyikoglu, T.: Cryptanalysis of Fridrich’s chaotic image encryption. Int. J. Bifurc. Chaos Appl. Sci. Eng. 20, 5–13 (2010)
Shatheesh Sam, I., Devaraj, P., Bhuvaneswaran, R.S.: An intertwining chaotic maps based image encryption scheme. Nonlinear Dynamics 69, 1995–2007 (2012)
Liu, F.: Video image coding technology and international standards. Beijing University of Posts and Telecommunications Press, Beijing (2005)
Wang, Y.: Image encryption based on chaotic sequence of research. Comput. Eng. Appl. 20, 99–102 (2002)
Patidar, V., Pareek, N.K., Sud, K.K.: A new substitution-diffusion based image cipher using chaotic standard and logistic maps. Commun. Nonlinear Sci. Numer. Simul. 14, 3056–3075 (2009)
Hu, R., Wang, L., Luo, Z.W.: Wavelet domain image encryption modulo operation to achieve. Comput. Eng. Appl. 20, 99–102 (2002)
Han, F.Y., Zhu, C.X.: One kid based on double dimensional chaos system picture encryption algorithm. Comput. Eng. Appl. 43, 50–51 (2007)
Geisel, T., Fairen, V.: Statistical properties of chaos in Chebyshev maps. Phys. Lett. A 105, 263–266 (1984)
Wang, L., Ye, Q., Xiao, Y., Zou, Y., Zhang, B.: An image encryption scheme based on cross chaotic map. In: International Congress on Image and Signal Processing, vol. 3, pp. 22–26 (2008)
Acknowledgements
This work was supported by the National Natural Science Foundation of China (60973162), the Natural Science Foundation of Shandong Province of China (ZR2009GM037), the Science and Technology of Shandong Province, China (2010GGX10132, 2012GGX10110), the Soft Science of Shandong Province, China (2012RKA10009), the Scientific Research Foundation of Harbin Institute of Technology at Weihai (Grant No. HIT(WH) ZB200909), and the Key Natural Science Foundation of Shandong Province of China (Z2006G01).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Tong, XJ., Wang, Z., Zhang, M. et al. A new algorithm of the combination of image compression and encryption technology based on cross chaotic map. Nonlinear Dyn 72, 229–241 (2013). https://doi.org/10.1007/s11071-012-0707-5
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11071-012-0707-5