Image Encryption Algorithm Based on Arnold Transformation and Logistic Mapping

Author(s):  
Li Tu ◽  
Juan Hu ◽  
Chi Zhang ◽  
Gang Liu
2010 ◽  
Vol 40-41 ◽  
pp. 537-542
Author(s):  
Zong Ying Li

In order to improve the capability of scrambling encryption and anti-aggressive, we extended the two-dimensional Arnold transformation to three-dimensional, and designed one kind of new diffusion equation of the digital image pixel gray value, then introduced a novel digital image encryption algorithm based on them. The large number of simulation results and analysis have both shown that the proposed scheme is a very effective encryption algorithm.


2011 ◽  
Vol 341-342 ◽  
pp. 720-724 ◽  
Author(s):  
Wang Sheng Fang ◽  
Lu Lu Wu ◽  
Rong Zhang

One of the main purpose of the watermark preprocessing is to improve the robustness and security. For this reason,this paper presents an image encryption algorithm, which combines position scrambling and gray scrambling scrambled according to Arnold transform.Then all of the pixels of each sub-block are scambled by the algorithm based on Logistic chaotic map.Finally, all of the Pixels are redistributed and scrambled totally.Basing on image location scrambling,it takes advantage of multi-dimensional Arnold transformation and Logistic chaotic map, image gray scrambling is achieved. By histogram analysis,key sensitivity anslysis and correlation analysis of adjacent pixels of the results of the simulation, indicating that the scrambling effect of the algorithm is good,and the key space is large.


Author(s):  
Xing-Yuan Wang ◽  
Zhi-Ming Li

AbstractIn this paper, a new chaotic image encryption scheme is proposed, which uses the combination of stream cipher and block cipher to spread and then uses the Logistic mapping matrix to perform the block sort transformation to complete the confusion. The specific method is as follows: First, perform the triple XOR operation, non-linear S-box transformation and linear cyclic shift transformation on the key. Second, the triple XOR operation of the transformed key and the plaintext and Logistic mapping sequence are used to obtain the semi-ciphertext. And set the obtained semi-ciphertext and plaintext as key components of the next round of encryption. Finally, the transformation of sorting and partition of the Logistic mapping matrix are used to confuse the semi-ciphertext. The experimental results show that the proposed algorithm improves the encryption efficiency, has good security and can resist common attacks.


Sign in / Sign up

Export Citation Format

Share Document