Security analysis of image encryption based on two-dimensional chaotic maps and improved algorithm
Feng HUANG, Yong FENG
Security analysis of image encryption based on two-dimensional chaotic maps and improved algorithm
The article proposes a new algorithm to improve the security of image encryption based on two-dimensional chaotic maps. Chaotic maps are often used in encrypting images. However, the encryption has periodicity, no diffusion, and at the same time, the real keys space of encryption are fewer than the theoretical keys space, which consequently results in potential security problems. Thus, this article puts forward several ways to solve the problems including adding diffusion mechanism, changing the design of keys and developing a composite encryption system. It designs an algorithm for the version B of the discretized baker map, which is one of the most prevalent chaotic maps, based on which a new image encryption is proposed to avoid the above problems. The simulation results show that the new encryption algorithm is valid and the result can be applied to other two-dimensional chaotic maps, such as the cat map.
chaotic map / baker map / image encryption
[1] |
Schneier B. Applied Cryptography – Protocols, Algorithms, and Source Code in C. 2nd ed. New York: John Wiley & Sons, Inc., 1996
|
[2] |
Shannon C E. Communication theory of secrecy systems. The Bell System Technical Journal, 1949, 28(4): 656–715
|
[3] |
Matthews R. On the derivation of a ”chaotic“ encryption algorithm. Cryptologia, 1989, 13(1): 29–42
CrossRef
Google scholar
|
[4] |
Dachselt F, Schwarz W. Chaos and cryptography. IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications, 2001, 48(12): 1498–1509
|
[5] |
Lian S G, Sun J S, Wang J W, Wang Z Q. A chaotic stream cipher and the usage in video protection. Chaos, Solitons & Fractals, 2007, 34(3): 851–859
CrossRef
Google scholar
|
[6] |
Wheeler D D. Problems with chaotic cryptosystems. Cryptologia, 1989, 13 (3): 243–250
CrossRef
Google scholar
|
[7] |
Li S J, Mou X Q, Cai Y L, Ji Z, Zhang J H. On the security of a chaotic encryption scheme: problems with computerized chaos in finite computing precision. Computer Physics Communications, 2003, 153(1): 52–58
CrossRef
Google scholar
|
[8] |
Fridrich J. Symmetric ciphers based on two-dimensional chaotic maps. International Journal of Bifurcation and Chaos, 1998, 8(6): 1259–1284
CrossRef
Google scholar
|
[9] |
Feng Y, Li L J, Huang F. A symmetric image encryption approach based on line maps. In: Proceedings of the 1st International Symposium on Systems and Control in Aerospace and Astronautics (ISSCAA 2006). 2006, 1362–1367
|
[10] |
Chen G R, Mao Y B, Chui C K. A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons & Fractals, 2004, 21(3): 749–761
CrossRef
Google scholar
|
[11] |
Mao Y B, Chen G R, Lian S G. A novel fast image encryption scheme based on 3D chaotic baker maps. International Journal of Bifurcation and Chaos, 2004, 14(10): 3613–3624
|
/
〈 | 〉 |