A Watermark Preprocessing Algorithm Based on Arnold Transformation and Logistic Chaotic Map

2011 ◽  
Vol 341-342 ◽  
pp. 720-724 ◽  
Author(s):  
Wang Sheng Fang ◽  
Lu Lu Wu ◽  
Rong Zhang

One of the main purpose of the watermark preprocessing is to improve the robustness and security. For this reason,this paper presents an image encryption algorithm, which combines position scrambling and gray scrambling scrambled according to Arnold transform.Then all of the pixels of each sub-block are scambled by the algorithm based on Logistic chaotic map.Finally, all of the Pixels are redistributed and scrambled totally.Basing on image location scrambling,it takes advantage of multi-dimensional Arnold transformation and Logistic chaotic map, image gray scrambling is achieved. By histogram analysis,key sensitivity anslysis and correlation analysis of adjacent pixels of the results of the simulation, indicating that the scrambling effect of the algorithm is good,and the key space is large.

2012 ◽  
Vol 2012 ◽  
pp. 1-10 ◽  
Author(s):  
Qiang Zhang ◽  
Xianglian Xue ◽  
Xiaopeng Wei

We present a novel image encryption algorithm based on DNA subsequence operation. Different from the traditional DNA encryption methods, our algorithm does not use complex biological operation but just uses the idea of DNA subsequence operations (such as elongation operation, truncation operation, deletion operation, etc.) combining with the logistic chaotic map to scramble the location and the value of pixel points from the image. The experimental results and security analysis show that the proposed algorithm is easy to be implemented, can get good encryption effect, has a wide secret key's space, strong sensitivity to secret key, and has the abilities of resisting exhaustive attack and statistic attack.


2013 ◽  
Vol 694-697 ◽  
pp. 2016-2020
Author(s):  
Shu Cong Liu ◽  
Yan Xing Song ◽  
Jing Song Yang

A new image encryption algorithm based on chaotic sequence is proposed, and the over sampled techniques is used in the Chebyshev mapping and Logistic chaotic mapping to generate multi-parameter chaotic key.A chaotic image encryption transmission system is build to achieve the encryption and decryption of the image signal,and the security and the encryption properties of the algorithm are analyzed. Simulation results show that the method ia simple and easy to achieve, and with larger key space ang good encryption effect.


2014 ◽  
Vol 2014 ◽  
pp. 1-7 ◽  
Author(s):  
Yuping Hu ◽  
Congxu Zhu ◽  
Zhijian Wang

An image encryption algorithm based on improved piecewise linear chaotic map (MPWLCM) model was proposed. The algorithm uses the MPWLCM to permute and diffuse plain image simultaneously. Due to the sensitivity to initial key values, system parameters, and ergodicity in chaotic system, two pseudorandom sequences are designed and used in the processes of permutation and diffusion. The order of processing pixels is not in accordance with the index of pixels, but it is from beginning or end alternately. The cipher feedback was introduced in diffusion process. Test results and security analysis show that not only the scheme can achieve good encryption results but also its key space is large enough to resist against brute attack.


2019 ◽  
Vol 36 (5) ◽  
pp. 407-417
Author(s):  
Djamel Herbadji ◽  
Nadir Derouiche ◽  
Aissa Belmeguenai ◽  
Abderrahmane Herbadji ◽  
Selma Boumerdassi

2012 ◽  
Vol 26 (29) ◽  
pp. 1250139
Author(s):  
XINGYUAN WANG ◽  
LEI YANG

This paper puts forward a novel image encryption algorithm that is based on permutation-diffusion architecture. In pixels' permutation stage, algorithm takes full advantage of the idea of magic cube's scrambling. There is only simple cyclic shift operation in each sub-block's permutation, but when the algorithm has disposed the current sub-block, the adjacent sub-blocks will be dealt with, too. In the cyclic shift of each row, stable points will help to decrease the correlation of adjacent pixels. To make encryption procedure uncertain, this paper brings in a parameter named delay-time that is generated by chaotic map. In the diffusion stage, by combining multiple operations and dynamic look-up table together, the proposed algorithm highly increases the uncertainty of the encryption procedure. At last, the experiment results of key space analysis, information entropy analysis, histogram analysis and etc. show that the encryption algorithm has well performance and it can be used in image encryption and transmission.


Sign in / Sign up

Export Citation Format

Share Document