Improved Encryption Algorithm of Images Based on Three-Dimensional Chaos

Author(s):  
Kefeng Wang ◽  
FeiYue Ye

It describes an improved encryption algorithm of a three-dimensional image based on multiple chaotic systems. The algorithm uses a variety of chaotic encryption system to cut the image into three-dimensional matrix systems, in three-dimensional space do the image scrambling transformation, three-dimensional chaotic sequence output by multiple chaotic systems achieved three color pixel substitution transformation of the spatial color image. Finally, according to the theoretical analysis and simulation results it shows that the encryption algorithm with large key space, good confidentiality, and the pixel values of the encryption image has a random uniform distribution features and zero correlation of the neighboring pixel values, verifies the proposed scheme has high security.

2015 ◽  
Vol 734 ◽  
pp. 554-557 ◽  
Author(s):  
Ke Feng Wang ◽  
Su Zhuang ◽  
Xiao Rong Zhao

The paper decribes the JPEG image encryption algorithm based on three-dimensional multi-chaotic system. The algorithm is designed to segment the image into three-demensional matrix system with a variety of chaoic encryption system. The images are scrambled and transformed in the three-dimensional space, and then by the three-dimensional chaotic sequence from multi-chaotic system, they are respectively transformed as airspace tricolor per-pixel alternative images. Reaearch results show that the algorithm has good confusion and diffusion properties of pixels and a powerful key space of greater resistance. The encrypted image pixels are distrubuted randomly and evenly with adjacent pixels of zero correlation properties, which proves the proposed scheme has a high security.


2019 ◽  
Vol 8 (1) ◽  
pp. 2
Author(s):  
Mehdi Lotfi ◽  
Hossein Kheiri ◽  
Azizeh Jabbari

Introduction:  In this paper, an encryption algorithm for the security of medical images is presented, which has extraordinary security. Given that the confidentiality of patient data is one of the priorities of medical informatics, the algorithm can be used to store and send medical image.Material and Methods:  In this paper, the solutions of chaotic differential equations are used to generate encryption keys. This method is more than other methods used in encoding medical images, resistant to statistics attacks, low encryption and decryption time and very high key space. In the proposed algorithm, unlike other methods that use random key generation, this method uses the production of solutions of the chaotic differential equations in a given time period for generating a key. All simulations and coding are done in MATLAB software.Results:   Chaotic Differential Equations have two very important features that make it possible to encode medical images. One is the unpredictability of the system's behavior and the other is a severe sensitivity to the initial condition.Conclusion: These two features make the method resistant to possible attacks to decode the concept of synchronization chaotic systems. Using the results of the method, medical information can be made safer than existing ones.


2015 ◽  
Vol 743 ◽  
pp. 379-384 ◽  
Author(s):  
Zhang Li Lan ◽  
Lin Zhu ◽  
Yi Cai Li ◽  
Jun Liu

Key space will be reduced after using the traditional DES algorithm to directly encrypt color images. Through combining the chaotic capability of the logistic function and by means of a specific algorithm, the fake chaotic son key’s space which is produced by the logistic chaotic pseudo-random function could be acquired. Then use the key generation algorithm to replace the traditional DES key generation algorithm. Experiment illustrates that the proposed algorithm has stronger robustness and anti-jamming capability to noise, and larger key’s space, sensitive initial keys, and better encryption effect, meanwhile it is better immune to multiple attacks.


Author(s):  
Jun Peng ◽  
Du Zhang ◽  
Xiaofeng Liao

This paper proposes a novel image block encryption algorithm based on three-dimensional Chen chaotic dynamical system. The algorithm works on 32-bit image blocks with a 192-bit secret key. The idea is that the key is employed to drive the Chen’s system to generate a chaotic sequence that is inputted to a specially designed function G, in which we use new 8x8 S-boxes generated by chaotic maps (Tang, 2005). In order to improve the robustness against differental cryptanalysis and produce desirable avalanche effect, the function G is iteratively performed several times and its last outputs serve as the keystreams to encrypt the original image block. The design of the encryption algorithm is described along with security analyses. The results from key space analysis, differential attack analysis, and information entropy analysis, correlation analysis of two adjacent pixels prove that the proposed algorithm can resist cryptanalytic, statistical and brute force attacks, and achieve a higher level of security. The algorithm can be employed to realize the security cryptosystems over the Internet.


2012 ◽  
Vol 26 (20) ◽  
pp. 1250120 ◽  
Author(s):  
FUZHONG NIAN ◽  
XINGYUAN WANG

Projective synchronization investigates the synchronization of systems evolve in same orientation, however, in practice, the situation of same orientation is only minority, and the majority is different orientation. This paper investigates the latter, proposes the concept of rotating synchronization, and verifies its necessity and feasibility via theoretical analysis and numerical simulations. Three conclusions were elicited: first, in three-dimensional space, two arbitrary nonlinear chaotic systems who evolve in different orientation can realize synchronization at end; second, projective synchronization is a special case of rotating synchronization, so, the application fields of rotating synchronization is more broadly than that of the former; third, the overall evolving information can be reflected by single state variable's evolving, it has self-similarity, this is the same as the basic idea of phase space reconstruction method, it indicates that we got the same result from different approach, so, our method and the phase space reconstruction method are verified each other.


2019 ◽  
Vol 29 (09) ◽  
pp. 1950115 ◽  
Author(s):  
Guangfeng Cheng ◽  
Chunhua Wang ◽  
Hua Chen

In recent years, scholars studied and proposed some secure color image encryption algorithms. However, the majority of the published algorithms encrypted red, green and blue (called [Formula: see text], [Formula: see text], [Formula: see text] for short) components independently. In the paper, we propose a color image encryption scheme based on hyperchaotic system and permutation-diffusion architecture. The encryption algorithm utilizes a block permutation which is realized by mixing [Formula: see text], [Formula: see text], [Formula: see text] components to strengthen the dependence of each component. Besides, it can reduce time consumption. Then, the key streams generated by the hyperchaotic system are exploited to diffuse the pixels, the three components affect each other again. And in the diffusion process, we can get two totally different encrypted images even though we change the last pixel because the [Formula: see text] component is diffused in reverse order. The experimental results reveal that our algorithm possesses better abilities of resisting statistical attacks and differential attacks, larger key space, closer information entropy to 8, and faster encryption speed compared with other chaos-based color image encryption algorithms.


2014 ◽  
Vol 981 ◽  
pp. 327-330 ◽  
Author(s):  
Tie Jun Zhang ◽  
Ahmed A. Abd El-Latif ◽  
Mohamed Amin ◽  
Alaa Zaghloul

In this paper, a new color image encryption mechanism based on multiple chaotic systems is proposed. In the proposal, two modules are achieved by mixing the features of horizontally and vertically adjacent pixels with the help of adopted multiple chaotic systems, respectively. Then, substitution/confusion is accomplished by generating an intermediate chaotic key stream image based on the adopted chaotic maps. Experimental results show that the proposed scheme is able to manage the trade-offs between the speed performance and security requirements.


2018 ◽  
Vol 103 ◽  
pp. 1-8 ◽  
Author(s):  
Xingyuan Wang ◽  
Siwei Wang ◽  
Yingqian Zhang ◽  
Chao Luo

Sign in / Sign up

Export Citation Format

Share Document