A novel image encryption algorithm based on chaotic maps and GF(28) exponent transformation

被引:46
作者
Hussain, Iqtadar [1 ]
Shah, Tariq [1 ]
Gondal, Muhammad Asif [2 ]
Mahmood, Hasan [3 ]
机构
[1] Quaid I Azam Univ, Dept Math, Islamabad, Pakistan
[2] Natl Univ Comp & Emerging Sci, Dept Sci & Humanities, Islamabad, Pakistan
[3] Quaid I Azam Univ, Dept Elect, Islamabad, Pakistan
关键词
Image encryption; Arnold cat maps; Nonlinear chaotic algorithm; S-BOX;
D O I
10.1007/s11071-012-0723-5
中图分类号
TH [机械、仪表工业];
学科分类号
0802 ;
摘要
In this paper, we propose an image encryption algorithm that is based on GF(2(8)) transformations, using the Arnold cat map and incorporating the nonlinear chaotic algorithm. The plain image is processed with the nonlinear chaotic algorithm and is shuffled iteratively with the Arnold cat map, while transforming the image pixel values into GF(2(8)). We show that the encryption characteristics of this approach are better as compared to some well known encryption algorithms.
引用
收藏
页码:399 / 406
页数:8
相关论文
共 27 条
  • [1] [Anonymous], ACOUST SPEECH SIG PR
  • [2] A symmetric image encryption scheme based on 3D chaotic cat maps
    Chen, GR
    Mao, YB
    Chui, CK
    [J]. CHAOS SOLITONS & FRACTALS, 2004, 21 (03) : 749 - 761
  • [3] Color image encryption by using Arnold and discrete fractional random transforms in IHS space
    Guo, Qing
    Liu, Zhengjun
    Liu, Shutian
    [J]. OPTICS AND LASERS IN ENGINEERING, 2010, 48 (12) : 1174 - 1181
  • [4] Hussain I, 2011, WORLD APPL SCI J, V13, P2389
  • [5] Hussain I., 2010, INT J COMPUT APPL, V2, P975
  • [6] Hussain I., 2010, INT J CONT MATH SCI, V5, P1263
  • [7] Hussain I, 2011, WORLD APPL SCI J, V13, P2385
  • [8] Construction of New S-Boxes Over Finite Field and Their Application to Watermarking
    Hussain, Iqtadar
    Shah, Tariq
    Gondal, Muhammad Asif
    Mahmood, Hasan
    [J]. ZEITSCHRIFT FUR NATURFORSCHUNG SECTION A-A JOURNAL OF PHYSICAL SCIENCES, 2012, 67 (12): : 705 - 710
  • [9] A novel approach of audio watermarking based on S-box transformation
    Hussain, Iqtadar
    [J]. MATHEMATICAL AND COMPUTER MODELLING, 2013, 57 (3-4) : 963 - 969
  • [10] A group theoretic approach to construct cryptographically strong substitution boxes
    Hussain, Iqtadar
    Shah, Tariq
    Gondal, Muhammad Asif
    Khan, Waqar Ahmad
    Mahmood, Hasan
    [J]. NEURAL COMPUTING & APPLICATIONS, 2013, 23 (01) : 97 - 104