Chaotic Image Encryption Design Using Tompkins-Paige Algorithm

被引:38
作者
Borujeni, Shahram Etemadi [1 ,2 ]
Eshghi, Mohammad [1 ]
机构
[1] Shahid Beheshti Univ, Fac Comp & Elect Engn, Dept Comp Engn, Tehran 1983963113, Iran
[2] Univ Isfahan, Fac Engn, Dept Comp Engn, Esfahan 8174673441, Iran
关键词
D O I
10.1155/2009/762652
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
In this paper, we have presented a new permutation-substitution image encryption architecture using chaotic maps and Tompkins-Paige algorithm. The proposed encryption system includes two major parts, chaotic pixels permutation and chaotic pixels substitution. A logistic map is used to generate a bit sequence, which is used to generate pseudorandom numbers in Tompkins-Paige algorithm, in 2D permutation phase. Pixel substitution phase includes two process, the tent pseudorandom image (TPRI) generator and modulo addition operation. All parts of the proposed chaotic encryption system are simulated. Uniformity of the histogram of the proposed encrypted image is justified using the chi-square test, which is less than chi(2) (255, 0.05). The vertical, horizontal, and diagonal correlation coefficients, as well as their average and RMS values for the proposed encrypted image are calculated that is about 13% less than previous researches. To quantify the difference between the encrypted image and the corresponding plain-image, three measures are used. These are MAE, NPCR, and UACI, which are improved in our proposed system considerably. NPCR of our proposed system is exactly the ideal value of this criterion. The key space of our proposed method is large enough to protect the system against any Brute-force and statistical attacks. Copyright (C) 2009 S. Etemadi Borujeni and M. Eshghi.
引用
收藏
页数:22
相关论文
共 33 条
[1]  
Alligood K.T, 1997, Textbooks in Mathematical Sciences
[2]   Some basic cryptographic requirements for chaos-based cryptosystems [J].
Alvarez, Gonzalo ;
Li, Shujun .
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2006, 16 (08) :2129-2151
[3]  
[Anonymous], 2002, CRYPTOGRAPHY THEORY
[4]  
Borujeni S. E., 2007, P INT C ROB VIS INF, P63
[5]  
Borujeni SE, 2000, ICECS 2000: 7TH IEEE INTERNATIONAL CONFERENCE ON ELECTRONICS, CIRCUITS & SYSTEMS, VOLS I AND II, P290, DOI 10.1109/ICECS.2000.911539
[6]  
BORUJENI SE, 2007, P INT C ROB VIS INF, P478
[7]   A symmetric image encryption scheme based on 3D chaotic cat maps [J].
Chen, GR ;
Mao, YB ;
Chui, CK .
CHAOS SOLITONS & FRACTALS, 2004, 21 (03) :749-761
[8]   Cryptography with chaotic mixing [J].
de Oliveira, Luiz P. L. ;
Sobottka, Marcelo .
CHAOS SOLITONS & FRACTALS, 2008, 35 (03) :466-471
[9]  
EHSANI MS, 2002, P 1 INT IEEE S INT S, V1, P248
[10]  
Fridrich J, 1997, IEEE SYS MAN CYBERN, P1105, DOI 10.1109/ICSMC.1997.638097