Digital Image Encryption Algorithm Based on Multi-Dimensional Chaotic System and Pixels Location

Any image encryption system divided mainly into two Methods: pixel replacement methods and pixel scrambling methods. In the pixel replacement method, each pixel in the image needs to change its value. Where, in the scrambling method the pixel needs to change its position. In this paper, we propose a new image encryption algorithm based on multi-dimensional chaotic function called a Rossler attractor; to enhance the encryption system, increase the complexity of the encryption keys and decrease the computational complexity of the cipher image. To do that, the Rossler attractor with the three dimensional planes as the encryption keys for the first level and the second level encryption are used, where, to decrease the execution time and computational complexity we used only one non-linear term function. Furthermore, our algorithm consists of two scrambling methods and two replacement methods. In which, each value in the image will be replaced by using a XORing operation with its location and change its location by using two shuffling approaches. Moreover, 3-planes chaotic function was used to scramble the pixels position as follows: in the first method we used X, Y planes of the Rossler attractor and in the second method we used X,Y and Z planes, so, the uncertainty of the adjacent pixels will be increased. However, by analyzing our algorithm, we show that the key space of our algorithm is equal to 10 45 , where, the entropy tests shown that the average entropy for the tested images is not less than 7.9971.Furthermore, after analyzing the histogram and correlation between the adjacent pixels, we show that our algorithm is strong against different types of attacks and it's sensitive to the initial conditions.

[1]  John J. Langenfeld,et al.  A model for dynamic extraction using a supercritical fluid , 1990 .

[2]  M. B. King,et al.  Measurement and correlation of binary diffusion coefficients in near critical fluids , 1994 .

[3]  Zhang Dinghui,et al.  Discrete Chaotic Encryption and Decryption of Digital Images , 2008, 2008 International Conference on Computer Science and Software Engineering.

[4]  Min Long,et al.  A Chaos-Based Data Encryption Algorithm for Image/Video , 2010, 2010 Second International Conference on Multimedia and Information Technology.

[5]  C Jeyamala,et al.  An image encryption scheme based on one time pads — A chaotic approach , 2010, 2010 Second International conference on Computing, Communication and Networking Technologies.

[6]  Rhouma Rhouma,et al.  Cryptanalysis of a new image encryption algorithm based on hyper-chaos , 2008 .

[7]  Ying Shen,et al.  Encryption algorithms using chaos and CAT methodology , 2010, 2010 International Conference on Anti-Counterfeiting, Security and Identification.

[8]  Chong Fu,et al.  An Image Encryption Scheme Based on High Dimension Chaos System , 2008, 2008 International Conference on Intelligent Computation Technology and Automation (ICICTA).

[9]  Yongchang Ren,et al.  A new method of information encryption , 2009, 2009 ISECS International Colloquium on Computing, Communication, Control, and Management.

[10]  L. Greenspan Humidity Fixed Points of Binary Saturated Aqueous Solutions , 1977, Journal of Research of the National Bureau of Standards. Section A, Physics and Chemistry.

[11]  Dong Wenming,et al.  An Image Encryption Algorithm Based on Knight's Tour and Slip Encryption-Filter , 2008, 2008 International Conference on Computer Science and Software Engineering.

[12]  Di Xiao,et al.  Analysis and improvement of a chaos-based image encryption algorithm , 2009 .

[13]  C. K. Huang,et al.  Hybrid image encryption using multi-chaos-system , 2009, 2009 7th International Conference on Information, Communications and Signal Processing (ICICS).