scholarly journals Image Encryption with Double Spiral Scans and Chaotic Maps

2019 ◽  
Vol 2019 ◽  
pp. 1-15 ◽  
Author(s):  
Zhenjun Tang ◽  
Ye Yang ◽  
Shijie Xu ◽  
Chunqiang Yu ◽  
Xianquan Zhang

Image encryption is a useful technique of image content protection. In this paper, we propose a novel image encryption algorithm by jointly exploiting random overlapping block partition, double spiral scans, Henon chaotic map, and Lü chaotic map. Specifically, the input image is first divided into overlapping blocks and pixels of every block are scrambled via double spiral scans. During spiral scans, the start-point is randomly selected under the control of Henon chaotic map. Next, image content based secret keys are generated and used to control the Lü chaotic map for calculating a secret matrix with the same size of input image. Finally, the encrypted image is obtained by calculating XOR operation between the corresponding elements of the scrambled image and the secret matrix. Experimental result shows that the proposed algorithm has good encrypted results and outperforms some popular encryption algorithms.

Entropy ◽  
2018 ◽  
Vol 20 (12) ◽  
pp. 974 ◽  
Author(s):  
Xiaoling Huang ◽  
Guodong Ye

An image encryption algorithm is presented in this paper based on a chaotic map. Different from traditional methods based on the permutation-diffusion structure, the keystream here depends on both secret keys and the pre-processed image. In particular, in the permutation stage, a middle parameter is designed to revise the outputs of the chaotic map, yielding a temporal delay phenomena. Then, diffusion operation is applied after a group of random numbers is inserted into the permuted image. Therefore, the gray distribution can be changed and is different from that of the plain-image. This insertion acts as a one-time pad. Moreover, the keystream for the diffusion operation is designed to be influenced by secret keys assigned in the permutation stage. As a result, the two stages are mixed together to strengthen entirety. Experimental tests also suggest that our algorithm, permutation– insertion–diffusion (PID), performs better when expecting secure communications for images.


2011 ◽  
Vol 216 ◽  
pp. 293-296
Author(s):  
Feng Huang ◽  
Xiang Jun Ouyang ◽  
Xing Ping Liu

The paper analyzes a symmetric image encryption scheme based on a new chaotic two-dimensional map. The map can encrypt image. The numbers of the left-map and the right-map are used as the secret keys of encryption. A diffusion mechanism was used to diffuse the pixels of image. But it isn’t enough safe. Firstly there are a lot of week keys and duplicate keys. Secondly the diffusion mechanism is too simple to ensure the information security. The paper designs a new method of keys generation. The keys are non-zero and random. It has a large keys space and avoids the duplicate keys. Then it takes parts of keys as the parameters of a classic chaotic map. The process is the new diffusion mechanism. It solves the problem of weak keys. Simulation results show the effectiveness of the method.


2017 ◽  
Vol 31 (7) ◽  
pp. 2395-2405 ◽  
Author(s):  
Obaida M. Al-Hazaimeh ◽  
Mohammad F. Al-Jamal ◽  
Nouh Alhindawi ◽  
Abedalkareem Omari

2018 ◽  
Vol 7 (3) ◽  
pp. 1944
Author(s):  
Lokesh B S ◽  
Dr. Manjunatha M B

Most of the thermal image information concentrated on a particular region and 50% of image information stored in Most Significant Bit (MSB) plane. Based on these two strategy, proposed an thermal image encryption based on region of interest (ROI) and chaotic map. Firstly extract the MSB bit plane of thermal input image. This  MSB bit plane undergo ROI calculation method. This method involves the partition of MSB bit plane into several 16*16 blocks. Apply the thresholding function to each block to separate the ROI blocks. Then selected part from input thermal image undergo XOR operation between random image generated from chaotic map. For lossless decryption at the receiver side, embedded the index of ROI blocks using LSB embedding algorithm. Simulation results shows the proposed algorithm achieves good security and more efficiency.


2020 ◽  
Vol 38 (3B) ◽  
pp. 98-103
Author(s):  
Atyaf S. Hamad ◽  
Alaa K. Farhan

This research presents a method of image encryption that has been designed based on the algorithm of complete shuffling, transformation of substitution box, and predicated image crypto-system. This proposed algorithm presents extra confusion in the first phase because of including an S-box based on using substitution by AES algorithm in encryption and its inverse in Decryption. In the second phase, shifting and rotation were used based on secrete key in each channel depending on the result from the chaotic map, 2D logistic map and the output was processed and used for the encryption algorithm. It is known from earlier studies that simple encryption of images based on the scheme of shuffling is insecure in the face of chosen cipher text attacks. Later, an extended algorithm has been projected. This algorithm performs well against chosen cipher text attacks. In addition, the proposed approach was analyzed for NPCR, UACI (Unified Average Changing Intensity), and Entropy analysis for determining its strength.


IEEE Access ◽  
2018 ◽  
Vol 6 ◽  
pp. 23733-23746 ◽  
Author(s):  
Xingyuan Wang ◽  
Xiaoqiang Zhu ◽  
Yingqian Zhang

Sign in / Sign up

Export Citation Format

Share Document