An image encryption scheme based on cross chaotic map

被引:33
作者
Wang, Ling [1 ,2 ]
Ye, Qun [2 ]
Xiao, Yaoqiang [1 ,3 ]
Zou, Yongxing [2 ]
Zhang, Bo [2 ]
机构
[1] Hunan Univ, Coll Elect & Informat Engn, Changsha 410082, Hunan, Peoples R China
[2] Hunan Univ, Coll Phys & Informat Engn, Changsha 410081, Hunan, Peoples R China
[3] Hunan Univ, Sch Comp & Commun, Changsha 410082, Hunan, Peoples R China
来源
CISP 2008: FIRST INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING, VOL 3, PROCEEDINGS | 2008年
关键词
D O I
10.1109/CISP.2008.129
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In the paper, a cross chaotic map using Logistic map and Chebyshev map is presented With the exceptionally desirable properties of non-periodical motion and non-convergence of chaos, scheme for image encryption has suggested a new and efficient way to deal with the intractable problem of fast and highly secure image. In order to realize image encryption, every pixel of image is randomly changed according to encryption matrix in the process of grayscale substitution; simultaneously scrambling transformation technique (row rotation and column rotation technique) is used in the process of position permutation. The experimental results indicate the scheme is more secure and efficient than conventional ones, and it is feasible.
引用
收藏
页码:22 / +
页数:2
相关论文
共 12 条
[1]   IMAGE ENCRYPTION METHOD USING A CLASS OF FRACTALS [J].
ALEXOPOULOS, C ;
BOURBAKIS, NG ;
IOANNOU, N .
JOURNAL OF ELECTRONIC IMAGING, 1995, 4 (03) :251-259
[2]   A symmetric image encryption scheme based on 3D chaotic cat maps [J].
Chen, GR ;
Mao, YB ;
Chui, CK .
CHAOS SOLITONS & FRACTALS, 2004, 21 (03) :749-761
[3]   Image encryption for secure Internet multimedia applications [J].
Dang, PP ;
Chau, PM .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2000, 46 (03) :395-403
[4]  
FU C, 2007, 3 INT C NAT COMP, V3, P189
[5]   A new chaotic algorithm for image encryption [J].
Gao, HJ ;
Zhang, YS ;
Liang, SY ;
Li, DQ .
CHAOS SOLITONS & FRACTALS, 2006, 29 (02) :393-399
[6]   Chaos-based image encryption algorithm [J].
Guan, ZH ;
Huang, FJ ;
Guan, WJ .
PHYSICS LETTERS A, 2005, 346 (1-3) :153-157
[7]  
Matthews R., 1989, CRYPTOLOGIA, V13, P29, DOI [10.1080/0161-118991863745, DOI 10.1080/0161-118991863745]
[8]   STEPS TOWARD UNMASKING SECURE COMMUNICATIONS [J].
SHORT, KM .
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 1994, 4 (04) :959-977
[9]   Unmasking a modulated chaotic communications scheme [J].
Short, KM .
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 1996, 6 (02) :367-375
[10]  
Wang Y, 2004, 2004 IEEE CONFERENCE ON CYBERNETICS AND INTELLIGENT SYSTEMS, VOLS 1 AND 2, P1172