Browse > Article
http://dx.doi.org/10.3837/tiis.2017.03.029

An Efficient Chaotic Image Encryption Algorithm Based on Self-adaptive Model and Feedback Mechanism  

Zhang, Xiao (Key Laboratory of Mathematics, Informatics and Behavioral Semantics, Ministry of Education, and School of Mathematics and Systems Science, Beihang University)
Wang, Chengqi (Key Laboratory of Mathematics, Informatics and Behavioral Semantics, Ministry of Education, and School of Mathematics and Systems Science, Beihang University)
Zheng, Zhiming (Key Laboratory of Mathematics, Informatics and Behavioral Semantics, Ministry of Education, and School of Mathematics and Systems Science, Beihang University)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.11, no.3, 2017 , pp. 1785-1801 More about this Journal
Abstract
In recent years, image encryption algorithms have been developed rapidly in order to ensure the security of image transmission. With the assistance of our previous work, this paper proposes a novel chaotic image encryption algorithm based on self-adaptive model and feedback mechanism to enhance the security and improve the efficiency. Different from other existing methods where the permutation is performed by the self-adaptive model, the initial values of iteration are generated in a novel way to make the distribution of initial values more uniform. Unlike the other schemes which is on the strength of the feedback mechanism in the stage of diffusion, the piecewise linear chaotic map is first introduced to produce the intermediate values for the sake of resisting the differential attack. The security and efficiency analysis has been performed. We measure our scheme through comprehensive simulations, considering key sensitivity, key space, encryption speed, and resistance to common attacks, especially differential attack.
Keywords
Image encryption; Chaotic systems; Self-adaptive model; Feedback mechanism; Network security;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 Y. Wang, K. W. Wong, X. F. Liao, T. Xiang and G. R. Chen, "A chaos-based image encryption algorithm with variable control parameters," Chaos, Solitons & Fractals, vol. 41, no. 4, pp. 1773-1783, 2009.   DOI
2 C. Fu, W. H. Meng, Y. F. Zhan, Z. L. Zhu, F. C. M. Lau, C. K. Tse and H. F. Ma, "An efficient and secure medical image protection scheme based on chaotic maps," Computers in biology and medicine, vol. 43, no. 8, pp. 1000-1010, 2013.   DOI
3 N. K. Pareek, V. Patidar and K. K. Sud, "Cryptography using multiple one-dimensional chaotic maps," Communications in Nonlinear Science and Numerical Simulation, vol. 10, no. 7, pp. 715-723, 2005.   DOI
4 Q. Mao, C. C. Chang and H. L. Wu, "An image encryption scheme based on concatenated torus automorphisms," KSII Transactions on Internet & Information Systems, vol. 7, no. 6, pp. 1492-1511, 2013.   DOI
5 K. Muhammad, J. Ahmad, H. Farman, Z. Jan, M. Sajjad and S. W. Baik, "A Secure Method for Color Image Steganography using Gray-Level Modification and Multi-level Encryption," KSII Transactions on Internet & Information Systems, vol. 9, no. 5, pp. 1938-1962, 2015.   DOI
6 Y. J. Liu and Y. Q. Zheng, "Adaptive robust fuzzy control for a class of uncertain chaotic systems," Nonlinear dynamics, vol. 57, no. 3, pp. 431-439, 2009.   DOI
7 C. Q. Wang, X. Zhang and Z. M. Zheng, "Cryptanalysis and improvement of a biometric-based multi-server authentication and key agreement scheme," PLoS One, vol. 11, no. 2, pp. e0149173, 2016.   DOI
8 C. Q. Wang, X. Zhang and Z. M. Zheng, "A novel image encryption algorithm based on multiple chaotic systems and self-adaptive model," in Proc. of the 2015 International Conference on Communications, Signal Processing, and Systems, pp. 677-685, 2016.
9 O. Fatih, O. B. Ahmet and Y. Sirma, "Cryptanalysis of a novel image encryption scheme based on improved hyperchaotic sequences," Optics Communications, vol. 285, no. 24, pp. 4946-4948, 2012.   DOI
10 D. Xiao, X. F. Liao, S. J. Deng, "A novel key agreement protocol based on chaotic maps," Information Sciences, vol. 177, no. 4, pp.1136-1142, 2007.   DOI
11 C. C. Lee, C. L. Chen, C. Y. Wu and S. Y. Huang, "An extended chaotic maps-based key agreement protocol with user anonymity," Nonlinear Dynamics, vol. 69, no. 1, pp. 79-87, 2012.   DOI
12 B. Norouzi, S. Mirzakuchaki, S. M. Seyedzadeh and M. R. Mosavi, "A simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion," Multimedia tools and applications, vol. 71, no. 3, pp. 1469-1497, 2014.   DOI
13 C. Q. Li, Y. S. Liu, T. Xie and M. Z. Q. Chen, "Breaking a novel image encryption scheme based on improved hyper-chaotic sequences," Nonlinear Dynamics, vol. 73, no. 3, pp. 2083-2089, 2013.   DOI
14 C. Q. Wang, X. Zhang and Z. M. Zheng, "An improved biometrics based authentication scheme using extended chaotic maps for multimedia medicine information systems," Multimedia Tools and Applications, pp. 1-27, 2016.
15 C. X. Zhu, "A novel image encryption scheme based on improved hyperchaotic sequences," Optics Communications, vol. 285, no. 1, pp. 29-37, 2012.   DOI
16 C. Q. Li, Y. S. Liu, T. Xie and M. Z. Q. Chen, "Breaking a novel image encryption scheme based on improved hyperchaotic sequences," Nonlinear Dynamics, vol. 73, no. 3, pp. 2083-2089, 2013.   DOI
17 Y. S. Zhang, D. Xiao, W. Y. Wen and M. Li, "Breaking an image encryption algorithm based on hyper-chaotic system with only one round diffusion process," Nonlinear Dynamics, vol. 76, no. 3, pp. 1645-1650, 2014.   DOI
18 E. Solak, C. Cokal, O. T. Yildiz and T. Biyikoglu, "Cryptanalysis of Fridrich's chaotic image encryption," International Journal of Bifurcation and Chaos, vol. 20, no. 5, pp. 1405-1413, 2010.   DOI
19 Y. P. Hu, C. X. Zhu and Z. J. Wang, "An improved piecewise linear chaotic map based image encryption algorithm," The Scientific World Journal, pp. 1-7, 2014.
20 Y. T. Li, D. Xiao, S. J. Deng, Q. Han and G. Zhou, "Parallel Hash function construction based on chaotic maps with changeable parameters," Neural Computing and Applications, vol. 20, no. 8, pp. 1305-1312, 2011.   DOI
21 G. R. Chen, Y. B. Mao and C. K. Chui, "A symmetric image encryption scheme based on 3D chaotic cat maps," Chaos, Solitons & Fractals, vol. 21, no. 3, pp. 749-761, 2004.   DOI
22 T. G. Gao and Z. Q. Chen, "A new image encryption algorithm based on hyper-chaos," Physics Letters A, vol. 372, no. 4, pp. 394-400, 2008.   DOI
23 G. Alvarez and S. J. Li, "Some basic cryptographic requirements for chaos-based cryptosystems," International Journal of Bifurcation and Chaos, vol. 16, no. 8, pp. 2129-2151, 2006.   DOI
24 P. Ping, F. Xu and Z. J. Wang, "Image encryption based on non-affine and balanced cellular automata," Signal Processing, vol. 105, pp. 419-429, 2014.   DOI
25 X. Y. Wang and C. Q. Jin, "Image encryption using game of life permutation and PWLCM chaotic system," Optics Communications, vol. 285, no. 4, pp. 412-417, 2012.   DOI
26 R. J. Chen and J. L. Lai, "Image security system using recursive cellular automata substitution," Pattern Recognition, vol. 40, no. 5, pp. 1621-1631, 2007.   DOI
27 L. Y. Zhang, X. B. Hu, Y. S. Liu, K. W. Wong and J. Gan, "A chaotic image encryption scheme owning temp-value feedback," Communications in Nonlinear Science and Numerical Simulation, vol. 19, no. 10, pp. 3653-3659, 2014.   DOI
28 C. Q. Wang, X. Zhang and Z. M. Zheng, "An efficient image encryption algorithm based on a novel chaotic map," Multimedia Tools and Applications, pp. 1-30, 2016.
29 V. Patidar, N. K. Pareek, G. Purohit and K. K. Sud, "A robust and secure chaotic standard map based pseudorandom permutation-substitution scheme for image encryption," Optics Communications, vol. 284, no. 19, pp. 4331-4339, 2011.   DOI
30 X. L. Huang and G. D. Ye, "An efficient self-adaptive model for chaotic image encryption algorithm," Communications in Nonlinear Science and Numerical Simulation, vol. 19, no. 12, pp. 4094-4104, 2014.   DOI
31 C. Q. Li, "Cracking a hierarchical chaotic image encryption algorithm based on permutation," Signal Processing, vol. 118, pp. 203-210, 2016.   DOI
32 Z. X. Qian, H. Zhou, X. P. Zhang and W. M. Zhang, "Separable Reversible Data Hiding in Encrypted JPEG Bitstreams," IEEE Transactions on Dependable and Secure Computing, pp. 1-13, 2016.
33 Z. X. Qian, X. P. Zhang and S. Z. Wang, "Reversible data hiding in encrypted JPEG bitstream," IEEE transactions on multimedia, vol. 16, no. 5, pp. 1486-1491, 2014.   DOI