Browse > Article
http://dx.doi.org/10.3837/tiis.2019.02.031

Image Encryption with The Cross Diffusion of Two Chaotic Maps  

Jiao, Ge (School of Environment Protection and Safety Engineering, University of South China)
Peng, Xiaojiang (Shenzhen Institutes of Advanced Technology, Chinese Academy of Sciences)
Duan, Kaiwen (College of Computer Science and Technology, Hengyang Normal University)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.13, no.2, 2019 , pp. 1064-1079 More about this Journal
Abstract
Information security has become increasingly important with the rapid development of mobile devices and internet. An efficient encryption system is a key to this end. In this paper, we propose an image encryption method based on the cross diffusion of two chaotic maps. We use two chaotic sequences, namely the Logistic map and the Chebyshev map, for key generation which has larger security key space than single one. Moreover, we use these two sequences for further image encryption diffusion which decreases the correlation of neighboring pixels significantly. We conduct extensive experiments on several well-known images like Lena, Baboon, Koala, etc. Experimental results show that our algorithm has the characteristics of large key space, fast, robust to statistic attack, etc.
Keywords
Image encryption; chaotic map; key space; NPCR; UACI;
Citations & Related Records
연도 인용수 순위
  • Reference
1 J. Li, H. Liu, "Colour image encryption based on advanced encryption standard algorithm with two-dimensional chaotic map," IET information security, 7(4), pp. 265-270, 2013.   DOI
2 Q. Zhang, Q. Ding, "Digital image encryption based on advanced encryption standard (aes)," in Proc. of Instrumentation and Measurement, Computer, Communication and Control (IMCCC), 2015 Fifth International Conference on, pp. 1218-1221, IEEE, 2015.
3 J. Daemen, V. Rijmen. "Aes proposal: Rijndael," 1999.
4 G. Chen, Y. Mao, C. K. Chui. "A symmetric image encryption scheme based on 3d chaotic cat maps," Chaos, Solitons & Fractals, 21(3), pp. 749-761, 2004.   DOI
5 N. B. Slimane, K. Bouallegue, M. Machhout, "Nested chaotic image encryption scheme using two-diffusion process and the secure hash algorithm sha-1," in Proc. of Control Engineering & Information Technology (CEIT), 2016 4th International Conference on, pp. 1-5, IEEE, 2016.
6 Y. Abanda, A. Tiedeu, "Image encryption by chaos mixing," IET Image Processing, 10(10), pp. 742-750, 2016.   DOI
7 L. Liu, S. Miao, H. Hu, M. Cheng, "N-phase logistic chaotic sequence and its application for image encryption," IET Signal Processing, 10(9), pp. 1096-1104, 2016.   DOI
8 H. Huang, S. Yang, "Colour image encryption based on logistic mapping and double random-phase encoding," IET Image Processing, 11(4), pp. 211-216, 2016.   DOI
9 H. Liu, A. Kadir, X. Sun, "Chaos-based fast colour image encryption scheme with true random number keys from environmental noise," IET Image Processing, 11(5), pp. 324-332, 2017.   DOI
10 M. Boussif, N. Aloui, A. Cherif, "Smartphone application for medical images secured exchange based on encryption using the matrix product and the exclusive addition," IET Image Processing, 11(11), pp. 1020-1026, 2017.   DOI
11 S. S. Maniccam, N. Bourbakis, "Lossless image compression and encryption using scan," Pattern Recognition, 34, pp. 1229-1245, 2001.   DOI
12 J. I. Guo, J. C. Yen. "A new chaotic mirror-like image encryption algorithm and its VLSI architecture," Pattern Recognition and Image Analysis, 10(2), pp. 236-247, 2000.
13 Manju Kumari, Shailender Gupta, Pranshul Sardana. "A Survey of Image Encryption Algorithms". 3D Research, 2017(8): 1-35.
14 A. Sinha, K. Singh, "A technique for image encryption using digital signature," Optics Communications, 218(2203), pp. 229-234, 2003.   DOI
15 R. Matthews, "On the derivation of a 'chaotic' encryption algorithm", Cryptologia, 13(1), pp. 29-42, 1989.   DOI
16 H. Gao, Y. Zhang, S. Liang, D. Li, "A new chaotic algorithm for image encryption," Chaos, Solitons & Fractals, 29(2), pp. 393-399, 2006.   DOI
17 N. K. Pareek, V. Patidar, K. K. Sud, "Image encryption using chaotic logistic map," Image and vision computing, 24(9), pp. 926-934, 2006.   DOI
18 W. Wei, J. Cong, "Image encryption scheme for android mobile platform," Computer Science, 1(8), pp. 94-96, 2014.
19 V. Patidar, N. Pareek, G. Purohit, K. Sud, "Modified substitution-diffusion image cipher using chaotic standard and logistic maps," Communications in Nonlinear Science and Numerical Simulation, 15(10), pp. 2755-2765, 2010.   DOI
20 J. W. Yoon, H. Kim, "An image encryption scheme with a pseudorandom permutation based on chaotic maps," Communications in Nonlinear Science and Numerical Simulation, 15(12), pp. 3998-4006, 2010.   DOI
21 P. Praveenkumar, R. Nisha, K. Thenmozhi, J. B. B. Rayappan, R. Amirtharajan, "Image merger encryptor: A chaotic and chebyshev key approach," Research Journal of Information Technology, 2016.
22 Nanrun Zhou, Haolin Li, Di Wang, Shumin Pan, Zhihong Zhou, "Image compression and encryption scheme based on 2D compressive sensing and fractional Mellin transform," Optics Communications, 343, 10-21, 2015.   DOI
23 M. J. Rostami, A. Shahba, S. Saryazdi, H. Nezamabadi-pour, "A novel parallel image encryption with chaotic windows based on logistic map," Computers & Electrical Engineering, 2017.
24 C. Pak, L. Huang, "A new color image encryption using combination of the 1d chaotic map," Signal Processing, 138, pp. 129-137, 2017.   DOI
25 L. Kocarev, "Chaos-based cryptography: a brief overview," IEEE Circuits &Systems Magazine, 1(3), pp. 6-21, 2001.   DOI
26 Xinpeng Zhang, "Separable Reversible Data Hiding in Encrypted Image," IEEE Transactions On Information Forensics And Security, Vol. 7, No. 2, 2014.
27 Nanrun Zhou, Shumin Pan, Shan Cheng, Zhihong Zhou, "Image compression-encryption scheme based on hyper-chaotic system and 2D compressive sensing," Optics and Laser Technology, 82: 121-133, 2016.   DOI
28 L. H. Gong, X. B. Liu, F. Zheng, N. R. Zhou, "Flexible multiple-image encryption algorithm based on log-polar transform and double random phase encoding technique," Journal of Modern Optics, 60(13): 1074-1082, 2013.   DOI
29 Y. Wu, Y. Zhou, J.P. Noonan, S.Agaian, "Design of image cipher using Latin squares," Information Sciences, 264: 317-339, 2014.   DOI
30 Chuan Qin, Zhihong He, Xiangyang Luo, Jing Dong, "Reversible data hiding in encrypted image with separable capability and high embedding capacity," Information Sciences, 465: 285-304, 2018.   DOI
31 Chuan Qin, Xinpeng Zhang, "Effective reversible data hiding in encrypted image with privacy protection for image content," J. Vis. Commun. Image R. 31, 154-164, 2015.   DOI