Skip to main content

An Image Encryption Algorithm Based on Zigzag Transformation and 3-Dimension Chaotic Logistic Map

  • Conference paper
  • First Online:
Applications and Techniques in Information Security (ATIS 2015)

Abstract

An image encryption algorithm based on Zigzag transformation and 3-Dimension Logistic chaotic map by making use of the permutation-diffusion encryption structure is proposed. The algorithm consists of two parts: firstly, Zigzag transformation is used to scramble pixel position of the color image through three channels; then, 3-Dimension Logistic chaotic map is utilized to diffuse pixel values through three channels. To solve the problem of large computation and space overhead of color image encryption algorithm, the iterative chaotic sequences are used several times in the diffusion process to improve encryption efficiency. The key space of the algorithm is large enough to resist brute-force attack and simulation results show that it also has high key sensitivity, high encryption speed and the strong ability to resist exhaustive attack and statistical attack.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Jin, X., Liu, Y., Li, X.D., Zhao, G., Chen, Y.Y., Guo, K.: Privacy preserving face identication through sparse representation. In: To Appear in the Proceedings of the 10th Chinese Conference on Biometric Recognition (CCBR) (2015)

    Google Scholar 

  2. Guellier, A., Bidan, C., Prigent, N.: Homomorphic cryptography-based privacy-preserving network communications. In: Batten, L., Li, G., Niu, W., Warren, M. (eds.) ATIS 2014. CCIS, vol. 490, pp. 159–170. Springer, Heidelberg (2014)

    Google Scholar 

  3. Zhen, P., Zhao, G., Min, L., et al.: Chaos-based image encryption scheme combining DNA coding and entropy. Multimedia Tools Appl. (2015). doi:10.1007/s11042-015-2573-x

  4. Patidar, V., Pareek, N.K., Purohit, G., et al.: A robust and secure chaotic standard map based pseudorandom permutation-substitution scheme for image encryption. Opt. Commun. 284(19), 4331–4339 (2011)

    Article  Google Scholar 

  5. Zhao, J., Guo, W., Ye, R.: A chaos-based image encryption scheme using permutation-substitution architecture. Int. J. Comput. Trends Technol. 15(4), 174–185 (2014)

    Article  Google Scholar 

  6. Mandal, M.K., Banik, G.D., Chattopadhyay, D., et al.: An image encryption process based on chaotic logistic map. Iete Technical Review 29(5), 395–404 (2012)

    Article  Google Scholar 

  7. Ye, G., Wong, K.W.: An efficient chaotic image encryption algorithm based on a generalized Arnold map. Nonlinear Dyn. 69(4), 2079–2087 (2012)

    Article  MathSciNet  Google Scholar 

  8. Wang, Y., Ren, G., Jiang, J., et al.: Image encryption method based on chaotic map. In: ICIEA 2007, 2nd IEEE Conference on IEEE Industrial Electronics and Applications, pp. 2558–2560 (2007)

    Google Scholar 

  9. Huang, F., Zhang, G.: A new image permutation approach using combinational chaotic maps. Inf. Technol. J. 12(4), 835–840 (2013)

    Article  Google Scholar 

  10. Zhang, J., Xiao-Yang, Y.U.: Image encryption scheme based on cat map and lu chaotic map. Chin. J. Electron Devices 30, 155–157 (2007). doi:10.3969/j.issn.1005-9490.2007.01.041

  11. Sathishkumar, G.A., Bhoopathy Bagan, K., Sriraam, N.: Image encryption based on diffusion and multiple chaotic maps. Int. J. Netw. Secur. Appl. 3(2), 181–194 (2011). doi:10.5121/ijnsa.2011.3214

  12. Wang, Y., Wong, K.W., Liao, X., et al.: A new chaos-based fast image encryption algorithm. Appl. Soft Comput. 11(1), 514–522 (2011)

    Article  Google Scholar 

  13. Xu, X., Feng, J.: Research and Implementation of Image Encryption Algorithm Based on Zigzag Transformation and Inner Product Polarization Vector, 2013 IEEE International Conference on Granular Computing (GrC) pp. 556–561. IEEE (2010)

    Google Scholar 

  14. Khade, P.N., Narnaware, M.: 3D chaotic functions for image encryption. Int. J. Comput. Sci. Issues 9(3), 323–328 (2012)

    Google Scholar 

  15. Çokal, C., Solak, E.: Cryptanalysis of a chaos-based image encryption algorithm. Physics Letters A 373(15), 1357–1360 (2009)

    Article  MATH  MathSciNet  Google Scholar 

Download references

Acknowledgements

This work is partially supported by the National Natural Science Foundation of China (No.61402021, No.61402023, No.61170037), the Fundamental Research Funds for the Central Universities (No.2014XSYJ01, No.2015XSYJ25), and the Science and Technology Project of the State Archives Administrator. (No.2015-B-10).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xin Jin .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Li, Y. et al. (2015). An Image Encryption Algorithm Based on Zigzag Transformation and 3-Dimension Chaotic Logistic Map. In: Niu, W., et al. Applications and Techniques in Information Security. ATIS 2015. Communications in Computer and Information Science, vol 557. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-48683-2_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-48683-2_1

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-48682-5

  • Online ISBN: 978-3-662-48683-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics