PESEARCH ARTICLE

Security analysis of image encryption based on two-dimensional chaotic maps and improved algorithm

  • Feng HUANG , 1 ,
  • Yong FENG 2
Expand
  • 1. Department of Electrical and Information Engineering, Hunan Institute of Engineering, Xiangtan 411104, China
  • 2. School of Electrical Engineering and Automation, Harbin Institute of Technology, Harbin 150001, China

Published date: 05 Mar 2009

Copyright

2014 Higher Education Press and Springer-Verlag Berlin Heidelberg

Abstract

The article proposes a new algorithm to improve the security of image encryption based on two-dimensional chaotic maps. Chaotic maps are often used in encrypting images. However, the encryption has periodicity, no diffusion, and at the same time, the real keys space of encryption are fewer than the theoretical keys space, which consequently results in potential security problems. Thus, this article puts forward several ways to solve the problems including adding diffusion mechanism, changing the design of keys and developing a composite encryption system. It designs an algorithm for the version B of the discretized baker map, which is one of the most prevalent chaotic maps, based on which a new image encryption is proposed to avoid the above problems. The simulation results show that the new encryption algorithm is valid and the result can be applied to other two-dimensional chaotic maps, such as the cat map.

Cite this article

Feng HUANG , Yong FENG . Security analysis of image encryption based on two-dimensional chaotic maps and improved algorithm[J]. Frontiers of Electrical and Electronic Engineering, 2009 , 4(1) : 5 -9 . DOI: 10.1007/s11460-009-0016-z

Acknowledgements

This work was supported by the National Natural Science Foundation of China (Grant No. 60474016), the Scientific Research Foundation of Hunan Provincial Education Department (No. 08B015).
1
Schneier B. Applied Cryptography – Protocols, Algorithms, and Source Code in C. 2nd ed. New York: John Wiley & Sons, Inc., 1996

2
Shannon C E. Communication theory of secrecy systems. The Bell System Technical Journal, 1949, 28(4): 656–715

3
Matthews R. On the derivation of a ”chaotic“ encryption algorithm. Cryptologia, 1989, 13(1): 29–42

DOI

4
Dachselt F, Schwarz W. Chaos and cryptography. IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications, 2001, 48(12): 1498–1509

5
Lian S G, Sun J S, Wang J W, Wang Z Q. A chaotic stream cipher and the usage in video protection. Chaos, Solitons & Fractals, 2007, 34(3): 851–859

DOI

6
Wheeler D D. Problems with chaotic cryptosystems. Cryptologia, 1989, 13 (3): 243–250

DOI

7
Li S J, Mou X Q, Cai Y L, Ji Z, Zhang J H. On the security of a chaotic encryption scheme: problems with computerized chaos in finite computing precision. Computer Physics Communications, 2003, 153(1): 52–58

DOI

8
Fridrich J. Symmetric ciphers based on two-dimensional chaotic maps. International Journal of Bifurcation and Chaos, 1998, 8(6): 1259–1284

DOI

9
Feng Y, Li L J, Huang F. A symmetric image encryption approach based on line maps. In: Proceedings of the 1st International Symposium on Systems and Control in Aerospace and Astronautics (ISSCAA 2006). 2006, 1362–1367

10
Chen G R, Mao Y B, Chui C K. A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons & Fractals, 2004, 21(3): 749–761

DOI

11
Mao Y B, Chen G R, Lian S G. A novel fast image encryption scheme based on 3D chaotic baker maps. International Journal of Bifurcation and Chaos, 2004, 14(10): 3613–3624

Options
Outlines

/