Skip to main content
Log in

A new algorithm of the combination of image compression and encryption technology based on cross chaotic map

  • Original Paper
  • Published:
Nonlinear Dynamics Aims and scope Submit manuscript

Abstract

Since the size of the image file is not reduced after encryption, the flow rate of image file transmission cannot be reduced. Transmission time is wasted. To meet the requirements of security and real-time, wavelet transform and chaotic image encryption technology are combined. A cross-chaos map has been proposed based on Devaney’s theory. The image pixels are scrambled under the control of high-dimensional chaotic sequence, which is generated by the cross chaotic map. The image pixels are substituted by the ciphertext feedback algorithm. The algorithm can relate to encryption parameters with plaintext, and can make one plaintext byte affect more ciphertext bytes. In the process of image wavelet transform, image encryption and image compression are combined. The low frequency region of the wavelet transform is encrypted. Security analysis and experimental validation illuminated that the algorithm has high security, good encryption speed, and compression effect. The algorithm has good practical value.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

References

  1. Zong, S.D.: Information Security and Application Infrastructure. Chongqing University Press, Chongqing (2005)

    Google Scholar 

  2. Kocarev, L., Jakimoski, G., Stojanovski, T., From, P.U.: Chaotic maps to encryption schemes. In: Symposium on Circuits and Systems, vol. 4, pp. 514–517 (1998)

    Google Scholar 

  3. Wang, X.Y.: Complex Chaos in Nonlinear System. Publishing House of Electronics Industry, Beijing (2003)

    Google Scholar 

  4. Palmore, J.: Computer arithmetic chaos and fractals. Physica D 42, 99–110 (2006)

    Article  Google Scholar 

  5. NIST: A statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications, vol. 5, pp. 6–125 (2001)

  6. Liu, J.L., Zhang, H., Wang, Y.: Analysis and improvement of a class of iterative chaos block cipher. Comput. Sci. 16, 141–144 (2008)

    MATH  Google Scholar 

  7. Zhang, Y., Li, C., Li, Q.: Breaking a chaotic image encryption algorithm based on perceptron model. Nonlinear Dyn. 69, 1091–1096 (2012)

    Article  MATH  Google Scholar 

  8. Li, C.Q., Lo, K.T.: Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks. Signal Process. 91, 49–54 (2011)

    Google Scholar 

  9. Wang, Y., Wong, K.W., Liao, X., Chen, G.: A new chaos-based fast image encryption algorithm. Appl. Soft Comput. 11, 514–522 (2011)

    Article  Google Scholar 

  10. Solak, E., Yildiz, O.T., Biyikoglu, T.: Cryptanalysis of Fridrich’s chaotic image encryption. Int. J. Bifurc. Chaos Appl. Sci. Eng. 20, 5–13 (2010)

    Article  MathSciNet  Google Scholar 

  11. Shatheesh Sam, I., Devaraj, P., Bhuvaneswaran, R.S.: An intertwining chaotic maps based image encryption scheme. Nonlinear Dynamics 69, 1995–2007 (2012)

    Article  MathSciNet  Google Scholar 

  12. Liu, F.: Video image coding technology and international standards. Beijing University of Posts and Telecommunications Press, Beijing (2005)

    Google Scholar 

  13. Wang, Y.: Image encryption based on chaotic sequence of research. Comput. Eng. Appl. 20, 99–102 (2002)

    Google Scholar 

  14. Patidar, V., Pareek, N.K., Sud, K.K.: A new substitution-diffusion based image cipher using chaotic standard and logistic maps. Commun. Nonlinear Sci. Numer. Simul. 14, 3056–3075 (2009)

    Article  Google Scholar 

  15. Hu, R., Wang, L., Luo, Z.W.: Wavelet domain image encryption modulo operation to achieve. Comput. Eng. Appl. 20, 99–102 (2002)

    Google Scholar 

  16. Han, F.Y., Zhu, C.X.: One kid based on double dimensional chaos system picture encryption algorithm. Comput. Eng. Appl. 43, 50–51 (2007)

    Google Scholar 

  17. Geisel, T., Fairen, V.: Statistical properties of chaos in Chebyshev maps. Phys. Lett. A 105, 263–266 (1984)

    Article  MathSciNet  Google Scholar 

  18. Wang, L., Ye, Q., Xiao, Y., Zou, Y., Zhang, B.: An image encryption scheme based on cross chaotic map. In: International Congress on Image and Signal Processing, vol. 3, pp. 22–26 (2008)

    Google Scholar 

Download references

Acknowledgements

This work was supported by the National Natural Science Foundation of China (60973162), the Natural Science Foundation of Shandong Province of China (ZR2009GM037), the Science and Technology of Shandong Province, China (2010GGX10132, 2012GGX10110), the Soft Science of Shandong Province, China (2012RKA10009), the Scientific Research Foundation of Harbin Institute of Technology at Weihai (Grant No. HIT(WH) ZB200909), and the Key Natural Science Foundation of Shandong Province of China (Z2006G01).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiao-Jun Tong.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Tong, XJ., Wang, Z., Zhang, M. et al. A new algorithm of the combination of image compression and encryption technology based on cross chaotic map. Nonlinear Dyn 72, 229–241 (2013). https://doi.org/10.1007/s11071-012-0707-5

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11071-012-0707-5

Keywords

Navigation