A Novel Algorithm for Block Encryption of Digital Image Based on Chaos

被引:4
作者
Peng, Jun [1 ]
Zhang, Du [2 ]
Liao, Xiaofeng [3 ]
机构
[1] Chongqing Univ Sci & Technol, Chongqing, Peoples R China
[2] Calif State Univ Sacramento, Dept Comp Sci, Sacramento, CA 95819 USA
[3] Chongqing Univ, Chongqing, Peoples R China
关键词
Chen Chaotic Dynamical System; Function G; Image Encryption; S-Boxes; Security;
D O I
10.4018/jcini.2011010104
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper proposes a novel image block encryption algorithm based on three-dimensional Chen chaotic dynamical system. The algorithm works on 32-bit image blocks with a 192-bit secret key. The idea is that the key is employed to drive the Chen's system to generate a chaotic sequence that is inputted to a specially designed function G, in which we use new 8x8 S-boxes generated by chaotic maps (Tang, 2005). In order to improve the robustness against differential cryptanalysis and produce desirable avalanche effect, the function G is iteratively performed several times and its last outputs serve as the keystreams to encrypt the original image block. The design of the encryption algorithm is described along with security analyses. The results from key space analysis, differential attack analysis, and information entropy analysis, correlation analysis of two adjacent pixels prove that the proposed algorithm can resist cryptanalytic, statistical and brute force attacks, and achieve a higher level of security. The algorithm can be employed to realize the security cryptosystems over the Internet.
引用
收藏
页码:59 / 74
页数:16
相关论文
共 20 条
[1]  
ADAMS C, 1990, LECT NOTES COMPUT SC, V435, P612
[2]   Some basic cryptographic requirements for chaos-based cryptosystems [J].
Alvarez, Gonzalo ;
Li, Shujun .
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2006, 16 (08) :2129-2151
[3]  
Chen G., 1998, CHAOS ORDER METHODOL, P311, DOI [10.1142/3033, DOI 10.1142/3033]
[4]   A symmetric image encryption scheme based on 3D chaotic cat maps [J].
Chen, GR ;
Mao, YB ;
Chui, CK .
CHAOS SOLITONS & FRACTALS, 2004, 21 (03) :749-761
[5]   Yet another chaotic attractor [J].
Chen, GR ;
Ueta, T .
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 1999, 9 (07) :1465-1466
[6]   CRYPTOGRAPHY AND COMPUTER PRIVACY [J].
FEISTEL, H .
SCIENTIFIC AMERICAN, 1973, 228 (05) :15-23
[7]   Symmetric ciphers based on two-dimensional chaotic maps [J].
Fridrich, J .
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 1998, 8 (06) :1259-1284
[8]  
Hao BL., 2013, STARTING PARABOLA IN
[9]  
Kocarev L., 2001, IEEE Circuits and Systems Magazine, V1, P6, DOI 10.1109/7384.963463
[10]   Breaking a chaos-based secure communication scheme designed by an improved modulation method [J].
Li, SJ ;
Alvarez, G ;
Chen, GR .
CHAOS SOLITONS & FRACTALS, 2005, 25 (01) :109-120