Security analysis of image encryption based on two-dimensional chaotic maps and improved algorithm

Feng HUANG, Yong FENG

PDF(222 KB)
PDF(222 KB)
Front. Electr. Electron. Eng. ›› 2009, Vol. 4 ›› Issue (1) : 5-9. DOI: 10.1007/s11460-009-0016-z
PESEARCH ARTICLE
PESEARCH ARTICLE

Security analysis of image encryption based on two-dimensional chaotic maps and improved algorithm

Author information +
History +

Abstract

The article proposes a new algorithm to improve the security of image encryption based on two-dimensional chaotic maps. Chaotic maps are often used in encrypting images. However, the encryption has periodicity, no diffusion, and at the same time, the real keys space of encryption are fewer than the theoretical keys space, which consequently results in potential security problems. Thus, this article puts forward several ways to solve the problems including adding diffusion mechanism, changing the design of keys and developing a composite encryption system. It designs an algorithm for the version B of the discretized baker map, which is one of the most prevalent chaotic maps, based on which a new image encryption is proposed to avoid the above problems. The simulation results show that the new encryption algorithm is valid and the result can be applied to other two-dimensional chaotic maps, such as the cat map.

Keywords

chaotic map / baker map / image encryption

Cite this article

Download citation ▾
Feng HUANG, Yong FENG. Security analysis of image encryption based on two-dimensional chaotic maps and improved algorithm. Front Elect Electr Eng Chin, 2009, 4(1): 5‒9 https://doi.org/10.1007/s11460-009-0016-z

References

[1]
Schneier B. Applied Cryptography – Protocols, Algorithms, and Source Code in C. 2nd ed. New York: John Wiley & Sons, Inc., 1996
[2]
Shannon C E. Communication theory of secrecy systems. The Bell System Technical Journal, 1949, 28(4): 656–715
[3]
Matthews R. On the derivation of a ”chaotic“ encryption algorithm. Cryptologia, 1989, 13(1): 29–42
CrossRef Google scholar
[4]
Dachselt F, Schwarz W. Chaos and cryptography. IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications, 2001, 48(12): 1498–1509
[5]
Lian S G, Sun J S, Wang J W, Wang Z Q. A chaotic stream cipher and the usage in video protection. Chaos, Solitons & Fractals, 2007, 34(3): 851–859
CrossRef Google scholar
[6]
Wheeler D D. Problems with chaotic cryptosystems. Cryptologia, 1989, 13 (3): 243–250
CrossRef Google scholar
[7]
Li S J, Mou X Q, Cai Y L, Ji Z, Zhang J H. On the security of a chaotic encryption scheme: problems with computerized chaos in finite computing precision. Computer Physics Communications, 2003, 153(1): 52–58
CrossRef Google scholar
[8]
Fridrich J. Symmetric ciphers based on two-dimensional chaotic maps. International Journal of Bifurcation and Chaos, 1998, 8(6): 1259–1284
CrossRef Google scholar
[9]
Feng Y, Li L J, Huang F. A symmetric image encryption approach based on line maps. In: Proceedings of the 1st International Symposium on Systems and Control in Aerospace and Astronautics (ISSCAA 2006). 2006, 1362–1367
[10]
Chen G R, Mao Y B, Chui C K. A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons & Fractals, 2004, 21(3): 749–761
CrossRef Google scholar
[11]
Mao Y B, Chen G R, Lian S G. A novel fast image encryption scheme based on 3D chaotic baker maps. International Journal of Bifurcation and Chaos, 2004, 14(10): 3613–3624

Acknowledgements

This work was supported by the National Natural Science Foundation of China (Grant No. 60474016), the Scientific Research Foundation of Hunan Provincial Education Department (No. 08B015).

RIGHTS & PERMISSIONS

2014 Higher Education Press and Springer-Verlag Berlin Heidelberg
PDF(222 KB)

Accesses

Citations

Detail

Sections
Recommended

/