Advertisement

Improvement of an Image Encryption Algorithm Based on Combined Multidimensional Chaotic Systems

  • Chen Dong
  • Jifang Li
  • Lifeng Xi
  • Jie Hao
  • Ran Jin
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4693)

Abstract

In this paper, we propose a chaotic image encryption algorithm, which adopts the mechanism of shuffling the positions and changing the grey values of image pixels. Firstly, the discrete Kolmogorov flow is used to shuffle the positions of the image pixels in the spatial-domain. The second, the Liu chaotic system is adopted to generate integer key for the image encryption, and the shuffled image is encrypted by the integer key. The third, we show that the advantages of large key space due to its improved security and the maturity of the technology using chaotic image encryption algorithm.

Keywords

Chaotic Image encryption Kolmogorov flow Liu chaotic system 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Diffie, W., Hellman, M.: New Directions in Cryptography. IEEE Transactions on Information Theory 22(6), 644–654 (1976)MathSciNetCrossRefzbMATHGoogle Scholar
  2. 2.
    Fridrich, J.: Image Encryption Based on Chaotic Maps. In: Proc. IEEE Conf. on Systems. Man and Cybernetics, Orlando, Florida, pp. 1105–1110. IEEE Computer Society Press, Los Alamitos (1997)Google Scholar
  3. 3.
    Milanovic, V., Mona, E Z: Synchronization of Chaotic Neural Networks for Secure Communications. In: IEEE International Symposium on Circuits and Systems, pp. 28–31. IEEE Computer Society Press, Los Alamitos (1996)Google Scholar
  4. 4.
    Alattar, A.M, Ghassan, I.A.: Improved Selective Encryption Techniques for Secure Transmission of MPEG Video Bit-streams. In: Proc. IEEE ICIP’99, Kobe Japan, vol. 4, pp. 256–260 (1999)Google Scholar
  5. 5.
    Guo, D., Cheng, L.: A New Symmetric Probabilistic Encryption Scheme Based on Chaotic Attractors of Neural Networks. Applied Intelligence, 71–84 (1999)Google Scholar
  6. 6.
    Dang, P., Chen, M.: Image Encryption for Secure Internet Multimedia Application. IEEE Trans Consumer Electronics 46(3), 395–403 (2000)CrossRefGoogle Scholar
  7. 7.
    Lee, J., Jae-cheol, R.: Strong User an Authentication in IEEE 802.11 Wireless LAN[C]. In: Chung, C.-W., Kim, C.-k., Kim, W., Ling, T.-W., Song, K.-H. (eds.) HSI 2003. LNCS, vol. 2713, pp. 638–643. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  8. 8.
    Beldhouche, F., Qidwai, U.: Binary Image Encoding Using ID Chaotic Maps[C]. In: Proc. Of IEEE Annual Technical Conference, pp. 39–43. IEEE Computer Society Press, Los Alamitos (2003)Google Scholar
  9. 9.
    Chen, G., Mao, Y: Chaos-based Image Encryption, Handbook of Computational Geometry for Pattern Recognition [M]. Springer, Berlin (2003)Google Scholar
  10. 10.
    Katygiannis, T., Owens, L.: Draft Wireless Network Security[R].National Institute of Standards and Technology, Special Publication 800-48, US Department of Commerce (2002) Google Scholar
  11. 11.
    IEEE. Standards for Local and Metropolitan Area Networks: Standard for Port-based Network Access Control[S] IEEE Draft P802.1X/D11 (2001)Google Scholar
  12. 12.
    Yi, D., Zhou, J., Han, X.L.: A Kind New Sets Transforms Randomly and in Pictorial Information Hiding Application [J]. Chinese Science 30(5), 440–447 (2000)Google Scholar
  13. 13.
    Ying, W., Yan, W., Qing, D.: Based on Sets Randomly and Applies with the Fusion Digital Image Hideaway Technology[J]. Chinese image graph journal (A) 5(8), 644–649 (2000)Google Scholar
  14. 14.
    Wen, Z., Li, T., Zhang, Z.: An Image Encryption Technology Based on Chaotic Sequences [J]. Computer Project 31(10), 130–132 (2005)Google Scholar
  15. 15.
    Liu, C., Liu, T., Liu, L.: A New Chaotic Attractor [J]. Solitons and Fractals 22(5), 1031–1038 (2004)MathSciNetCrossRefzbMATHGoogle Scholar
  16. 16.
    Zhu, C., Li, L., Chen, Z.: New Image Encryption Algorithm Based on Combined Multidimensional Chaotic Systems [J]. Computer Project 33(2), 142–144 (2007)Google Scholar
  17. 17.
    Chen, G., Mao, Y., Charles, K.: A Symmetric Image Encryption Scheme Based on 3D Chaotic Cat Maps [J]. Chaos, Solitons and Fractals 3(21), 749–761 (2004)MathSciNetCrossRefzbMATHGoogle Scholar
  18. 18.
    Guan, Z., Huang, F., Guan, W.: Chaos-based Image Encryption Algorithm[J]. Physics Letters A 346(1-3), 153–157 (2005)CrossRefzbMATHGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Chen Dong
    • 1
  • Jifang Li
    • 1
  • Lifeng Xi
    • 1
  • Jie Hao
    • 2
  • Ran Jin
    • 1
  1. 1.School of Computer Science and Information Technology, Zhejiang Wanli University, Ningbo, Zhejiang 315100P.R. China
  2. 2.Department of Computer Teaching , Zhejiang Wanli University, Ningbo, Zhejiang 315100P.R. China

Personalised recommendations