Security analysis of image encryption based on two-dimensional chaotic maps and improved algorithm
Published date: 05 Mar 2009
Copyright
The article proposes a new algorithm to improve the security of image encryption based on two-dimensional chaotic maps. Chaotic maps are often used in encrypting images. However, the encryption has periodicity, no diffusion, and at the same time, the real keys space of encryption are fewer than the theoretical keys space, which consequently results in potential security problems. Thus, this article puts forward several ways to solve the problems including adding diffusion mechanism, changing the design of keys and developing a composite encryption system. It designs an algorithm for the version B of the discretized baker map, which is one of the most prevalent chaotic maps, based on which a new image encryption is proposed to avoid the above problems. The simulation results show that the new encryption algorithm is valid and the result can be applied to other two-dimensional chaotic maps, such as the cat map.
Key words: chaotic map; baker map; image encryption
Feng HUANG , Yong FENG . Security analysis of image encryption based on two-dimensional chaotic maps and improved algorithm[J]. Frontiers of Electrical and Electronic Engineering, 2009 , 4(1) : 5 -9 . DOI: 10.1007/s11460-009-0016-z
1 |
Schneier B. Applied Cryptography – Protocols, Algorithms, and Source Code in C. 2nd ed. New York: John Wiley & Sons, Inc., 1996
|
2 |
Shannon C E. Communication theory of secrecy systems. The Bell System Technical Journal, 1949, 28(4): 656–715
|
3 |
Matthews R. On the derivation of a ”chaotic“ encryption algorithm. Cryptologia, 1989, 13(1): 29–42
|
4 |
Dachselt F, Schwarz W. Chaos and cryptography. IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications, 2001, 48(12): 1498–1509
|
5 |
Lian S G, Sun J S, Wang J W, Wang Z Q. A chaotic stream cipher and the usage in video protection. Chaos, Solitons & Fractals, 2007, 34(3): 851–859
|
6 |
Wheeler D D. Problems with chaotic cryptosystems. Cryptologia, 1989, 13 (3): 243–250
|
7 |
Li S J, Mou X Q, Cai Y L, Ji Z, Zhang J H. On the security of a chaotic encryption scheme: problems with computerized chaos in finite computing precision. Computer Physics Communications, 2003, 153(1): 52–58
|
8 |
Fridrich J. Symmetric ciphers based on two-dimensional chaotic maps. International Journal of Bifurcation and Chaos, 1998, 8(6): 1259–1284
|
9 |
Feng Y, Li L J, Huang F. A symmetric image encryption approach based on line maps. In: Proceedings of the 1st International Symposium on Systems and Control in Aerospace and Astronautics (ISSCAA 2006). 2006, 1362–1367
|
10 |
Chen G R, Mao Y B, Chui C K. A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons & Fractals, 2004, 21(3): 749–761
|
11 |
Mao Y B, Chen G R, Lian S G. A novel fast image encryption scheme based on 3D chaotic baker maps. International Journal of Bifurcation and Chaos, 2004, 14(10): 3613–3624
|
/
〈 | 〉 |