Abstract
An image encryption algorithm based on Zigzag transformation and 3-Dimension Logistic chaotic map by making use of the permutation-diffusion encryption structure is proposed. The algorithm consists of two parts: firstly, Zigzag transformation is used to scramble pixel position of the color image through three channels; then, 3-Dimension Logistic chaotic map is utilized to diffuse pixel values through three channels. To solve the problem of large computation and space overhead of color image encryption algorithm, the iterative chaotic sequences are used several times in the diffusion process to improve encryption efficiency. The key space of the algorithm is large enough to resist brute-force attack and simulation results show that it also has high key sensitivity, high encryption speed and the strong ability to resist exhaustive attack and statistical attack.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Jin, X., Liu, Y., Li, X.D., Zhao, G., Chen, Y.Y., Guo, K.: Privacy preserving face identication through sparse representation. In: To Appear in the Proceedings of the 10th Chinese Conference on Biometric Recognition (CCBR) (2015)
Guellier, A., Bidan, C., Prigent, N.: Homomorphic cryptography-based privacy-preserving network communications. In: Batten, L., Li, G., Niu, W., Warren, M. (eds.) ATIS 2014. CCIS, vol. 490, pp. 159–170. Springer, Heidelberg (2014)
Zhen, P., Zhao, G., Min, L., et al.: Chaos-based image encryption scheme combining DNA coding and entropy. Multimedia Tools Appl. (2015). doi:10.1007/s11042-015-2573-x
Patidar, V., Pareek, N.K., Purohit, G., et al.: A robust and secure chaotic standard map based pseudorandom permutation-substitution scheme for image encryption. Opt. Commun. 284(19), 4331–4339 (2011)
Zhao, J., Guo, W., Ye, R.: A chaos-based image encryption scheme using permutation-substitution architecture. Int. J. Comput. Trends Technol. 15(4), 174–185 (2014)
Mandal, M.K., Banik, G.D., Chattopadhyay, D., et al.: An image encryption process based on chaotic logistic map. Iete Technical Review 29(5), 395–404 (2012)
Ye, G., Wong, K.W.: An efficient chaotic image encryption algorithm based on a generalized Arnold map. Nonlinear Dyn. 69(4), 2079–2087 (2012)
Wang, Y., Ren, G., Jiang, J., et al.: Image encryption method based on chaotic map. In: ICIEA 2007, 2nd IEEE Conference on IEEE Industrial Electronics and Applications, pp. 2558–2560 (2007)
Huang, F., Zhang, G.: A new image permutation approach using combinational chaotic maps. Inf. Technol. J. 12(4), 835–840 (2013)
Zhang, J., Xiao-Yang, Y.U.: Image encryption scheme based on cat map and lu chaotic map. Chin. J. Electron Devices 30, 155–157 (2007). doi:10.3969/j.issn.1005-9490.2007.01.041
Sathishkumar, G.A., Bhoopathy Bagan, K., Sriraam, N.: Image encryption based on diffusion and multiple chaotic maps. Int. J. Netw. Secur. Appl. 3(2), 181–194 (2011). doi:10.5121/ijnsa.2011.3214
Wang, Y., Wong, K.W., Liao, X., et al.: A new chaos-based fast image encryption algorithm. Appl. Soft Comput. 11(1), 514–522 (2011)
Xu, X., Feng, J.: Research and Implementation of Image Encryption Algorithm Based on Zigzag Transformation and Inner Product Polarization Vector, 2013 IEEE International Conference on Granular Computing (GrC) pp. 556–561. IEEE (2010)
Khade, P.N., Narnaware, M.: 3D chaotic functions for image encryption. Int. J. Comput. Sci. Issues 9(3), 323–328 (2012)
Çokal, C., Solak, E.: Cryptanalysis of a chaos-based image encryption algorithm. Physics Letters A 373(15), 1357–1360 (2009)
Acknowledgements
This work is partially supported by the National Natural Science Foundation of China (No.61402021, No.61402023, No.61170037), the Fundamental Research Funds for the Central Universities (No.2014XSYJ01, No.2015XSYJ25), and the Science and Technology Project of the State Archives Administrator. (No.2015-B-10).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Li, Y. et al. (2015). An Image Encryption Algorithm Based on Zigzag Transformation and 3-Dimension Chaotic Logistic Map. In: Niu, W., et al. Applications and Techniques in Information Security. ATIS 2015. Communications in Computer and Information Science, vol 557. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-48683-2_1
Download citation
DOI: https://doi.org/10.1007/978-3-662-48683-2_1
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-48682-5
Online ISBN: 978-3-662-48683-2
eBook Packages: Computer ScienceComputer Science (R0)