Image encryption algorithm using chaotic Chebyshev generator

被引:182
作者
Huang, Xiaoling [1 ]
机构
[1] Guangdong Ocean Univ, Coll Sci, Zhanjiang 524088, Peoples R China
关键词
Image encryption; Chebyshev function; Confusion; Diffusion; Key stream generation; SCHEME; STANDARD; MAPS;
D O I
10.1007/s11071-011-0155-7
中图分类号
TH [机械、仪表工业];
学科分类号
0802 ;
摘要
In this paper, we present a chaotic image encryption algorithm in which the key stream is generated by nonlinear Chebyshev function. The novel method of designing pseudorandom chaotic sequence is carried out with the created secret keys depending on with each other. We then make multiple permutation of pixels to decrease the strong correlation between adjacent pixels in original plain image. Further, a two-dimensional Chebyshev function is considered to avoid known-plaintext and chosen-plaintext attacks in diffusion process, i.e., even with a one-bit change in original plain image, the encrypted image would become different greatly. Simulation results are given to show that the proposed method can offer us an efficient way of encrypting image.
引用
收藏
页码:2411 / 2417
页数:7
相关论文
共 28 条
[11]   A novel fast image encryption scheme based on 3D chaotic baker maps [J].
Mao, YB ;
Chen, GR ;
Lian, SG .
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2004, 14 (10) :3613-3624
[12]   Image encryption using chaotic logistic map [J].
Pareek, N. K. ;
Patidar, Vinod ;
Sud, K. K. .
IMAGE AND VISION COMPUTING, 2006, 24 (09) :926-934
[13]   Modified substitution-diffusion image cipher using chaotic standard and logistic maps [J].
Patidar, Vinod ;
Pareek, N. K. ;
Purohit, G. ;
Sud, K. K. .
COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2010, 15 (10) :2755-2765
[14]  
Schneier B., 1996, Applied Cryptography: Protocols, Algorithms, and Source Code in C
[15]   A new cryptosystem based on spatial chaotic system [J].
Sun, Fuyan ;
Lue, Zongwang ;
Liu, Shutang .
OPTICS COMMUNICATIONS, 2010, 283 (10) :2066-2073
[16]   Image encryption with compound chaotic sequence cipher shifting dynamically [J].
Tong, Xiaojun ;
Cui, Minggen .
IMAGE AND VISION COMPUTING, 2008, 26 (06) :843-850
[17]   Chaos-based secure satellite imagery cryptosystem [J].
Usama, Muhammad ;
Khan, Muhammad Khurram ;
Alghathbar, Khaled ;
Lee, Changhoon .
COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2010, 60 (02) :326-337
[18]   An image encryption scheme based on cross chaotic map [J].
Wang, Ling ;
Ye, Qun ;
Xiao, Yaoqiang ;
Zou, Yongxing ;
Zhang, Bo .
CISP 2008: FIRST INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING, VOL 3, PROCEEDINGS, 2008, :22-+
[19]   Image Encryption Based on Chaotic Map and DNA Coding [J].
Wang, Qian ;
Zhang, Qiang ;
Wei, Xiaopeng ;
Xue, Xianglian ;
Guo, Ling .
JOURNAL OF COMPUTATIONAL AND THEORETICAL NANOSCIENCE, 2010, 7 (02) :388-393
[20]   Cryptanalysis on a parallel keyed hash function based on chaotic neural network [J].
Wang, Xing-yuan ;
Zhao, Jian-feng .
NEUROCOMPUTING, 2010, 73 (16-18) :3224-3228