An Effective Encryption Scheme Based on Chaotic Maps Applied to Digital Image

Author(s):  
C. Lamiche
2018 ◽  
Vol 78 (8) ◽  
pp. 10373-10400 ◽  
Author(s):  
Sukalyan Som ◽  
Abhijit Mitra ◽  
Sarbani Palit ◽  
B. B. Chaudhuri

Entropy ◽  
2018 ◽  
Vol 20 (11) ◽  
pp. 843 ◽  
Author(s):  
Congxu Zhu ◽  
Guojun Wang ◽  
Kehui Sun

This paper presents an improved cryptanalysis of a chaos-based image encryption scheme, which integrated permutation, diffusion, and linear transformation process. It was found that the equivalent key streams and all the unknown parameters of the cryptosystem can be recovered by our chosen-plaintext attack algorithm. Both a theoretical analysis and an experimental validation are given in detail. Based on the analysis of the defects in the original cryptosystem, an improved color image encryption scheme was further developed. By using an image content–related approach in generating diffusion arrays and the process of interweaving diffusion and confusion, the security of the cryptosystem was enhanced. The experimental results and security analysis demonstrate the security superiority of the improved cryptosystem.


2014 ◽  
Vol 75 (1) ◽  
pp. 1-23 ◽  
Author(s):  
Ayesha Kulsoom ◽  
Di Xiao ◽  
Aqeel-ur-Rehman ◽  
Syed Ali Abbas

2010 ◽  
Vol 20 (12) ◽  
pp. 4039-4053 ◽  
Author(s):  
ALI KANSO

In this paper, we present a class of chaotic clock-controlled cipher systems based on two exact chaotic maps, where each map is capable of generating exact chaotic time series of the logistic map. This class is designed in such a way that one map controls the iterations of the second map. The suggested technique results in generating orbits possessing long cycle length and high level of security from the two periodic exact maps. In the first part of this paper, two keystream generators based on two exact chaotic logistic maps are suggested for use in cryptographic applications. The necessary conditions to generate orbits with guaranteed long enough cycle length are established. Furthermore, the generated keystreams are demonstrated to possess excellent randomness properties. In the second part, we suggest a clock-controlled encryption scheme related to Baptista's scheme and based on two exact chaotic logistic maps. This technique results in increasing the size of the key space, and hence may increase the security level against some existing cryptanalytic attacks. Furthermore, it leads to reducing the size of the ciphertext file and propably increasing the encryption speed.


Sign in / Sign up

Export Citation Format

Share Document