Chaos-Based Bit Planes Image Encryption

Conference paper

Abstract

Bit planes of discrete signal can be used not only for encoding or compressing, but also for encrypting purposes. This paper investigates composition of bit planes of an image and their utilization in the encryption process. Proposed encryption scheme is based on chaotic maps of Peter de Jong and it is designed for image signals primarily. Positions of all components of bit planes are permutated according to chaotic behaviour of Peter de Jong’s system.

Keywords

Chaotic System Encryption Scheme Strange Attractor Image Encryption Adjacent Pixel 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Notes

Acknowledgment

We would like to thank Petra Stalmachova for providing her photo and Pavel Ondrusz for the aid with graphic work on some figures.

References

  1. [1]
    Fu, Ch., Zhang, Z., Chen, Z., Wang, X. An Improved Chaos-Based Image Encryption Scheme. ICCS 2007, Springer-Verlag, Berlin, 2007.Google Scholar
  2. [2]
    Fu, Ch., Zhang, Z., Cao, Y. An Improved Image Encryption Algorithm Based on Chaotic Maps. ICNC 2007.Google Scholar
  3. [3]
    Mao, Y., Chen, G. Chaos-Based Image Encryption. Springer-Verlag, Berlin, 2003.Google Scholar
  4. [4]
    Zhai, Y., Lin, S., Zhang, Q. Improving Image Encryption Using Multi-chaotic Map, Workshop on Power Electronics and Intelligent Transportationi System, 2008.Google Scholar
  5. [5]
    He, X., Zhu, Q., Gu, P. A New Chaos-Based Encryption Method for Color Image, Springer-Verlag, Berlin, 2006.Google Scholar
  6. [6]
    Asim, M., Jeoti, V. Hybrid Chaotic Image Encryption Scheme based on S-box and Ciphertext Feedback. ICIAS 2007.Google Scholar
  7. [7]
    Hossam, A., Hamdy, K., Osama, A. An Efficient Chaos-Based Feedback Stream Cipher (ECBFSC) for Image Encryption and Decryption. Informatica 31, 2007.Google Scholar
  8. [8]
    Giesl, J., Vlcek, K., Image Encryption Based on Strange Attractor, ICGST-GVIP Journal. 2009, vol. 9, is. 2, pp. 19-26. ISSN 1687-398.Google Scholar
  9. [9]
    Zhao., X-y., Chen, G., Zhang, D., Wang, X-h., Dong, G-c. Decryption of pure-position permutation algorithms. JZUS, Hangzhou, 2004.Google Scholar
  10. [10]
    Mao, Y., Chen, G. Chaos-Based Image Encryption. Springer-Verlag, Berlin, 2003.Google Scholar
  11. [11]
    Gao, T., Chen, Z. A new image encryption algorithm based on hyper-chaos, ScienceDirect, 2007.Google Scholar
  12. [12]
    Sprott, J.C. Chaos and Time-Series Analysis, Oxford University Press, 2003, ISBN 978-0-19-850840-3.Google Scholar
  13. [13]
    Bourke, P. Cross Correlation [online]. Available at WWW: http://local.wasp.uwa.edu.au/˜pbourke/miscellaneous/correlate/ , 2006.

Copyright information

© Springer Science+Business Media B.V. 2010

Authors and Affiliations

  1. 1.Department of Applied InformaticsTomas Bata UniversityZlinCzech Republic

Personalised recommendations