Research on a Novel Image Encryption Scheme Based on the Hybrid of Chaotic Maps

This paper presents a novel image encryption scheme based on a hybrid of three order chaotic Chen system and piecewise linear chaotic map (PWLCM) The initial conditions and control parameters of chaotic systems are viewed as the secret key, and combined sequences from these two chaotic systems are employed to encrypt original image The proposed scheme is described in detail, along with experimental example and security analyses including sensitivity analysis, analysis of correlation of adjacent pixels and information entropy analysis The results show that the suggested scheme has some desirable properties in a good security cryptosystem.

[1]  J. Fridrich Image encryption based on chaotic maps , 1997, 1997 IEEE International Conference on Systems, Man, and Cybernetics. Computational Cybernetics and Simulation.

[2]  L. Kocarev Chaos-based cryptography: a brief overview , 2001 .

[3]  Wenfang Zhang,et al.  Chaotic keyed hash function based on feedforward–feedback nonlinear digital filter , 2007 .

[4]  José Manoel Balthazar,et al.  Synchronization of the unified chaotic system and application in secure communication , 2009 .

[5]  Xiaojun Tong,et al.  Image encryption scheme based on 3D baker with dynamical compound chaotic sequence cipher generator , 2009, Signal Process..

[6]  Xiaofeng Liao,et al.  A Double-Piped iterated hash function based on a hybrid of chaotic maps , 2008, 2008 7th IEEE International Conference on Cognitive Informatics.

[7]  Shujun Li,et al.  Cryptanalysis of a chaotic image encryption method , 2002, 2002 IEEE International Symposium on Circuits and Systems. Proceedings (Cat. No.02CH37353).

[8]  Guanrong Chen,et al.  Breaking a chaos-based secure communication scheme designed by an improved modulation method , 2004, nlin/0411007.

[9]  Guanrong Chen,et al.  A multiple pseudorandom-bit generator based on a spatiotemporal chaotic map , 2006 .

[10]  C. Chui,et al.  A symmetric image encryption scheme based on 3D chaotic cat maps , 2004 .

[11]  Guanrong Chen,et al.  From Chaos To Order Methodologies, Perspectives and Applications , 1998 .

[12]  J. Fridrich Symmetric Ciphers Based on Two-Dimensional Chaotic Maps , 1998 .

[13]  M. T. Yassen,et al.  Chaos control of Chen chaotic dynamical system , 2003 .

[14]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[15]  Leon O. Chua,et al.  Cryptography based on chaotic systems , 1997 .

[16]  Jiun-In Guo,et al.  A new chaotic key-based design for image encryption and decryption , 2000, 2000 IEEE International Symposium on Circuits and Systems. Emerging Technologies for the 21st Century. Proceedings (IEEE Cat No.00CH36353).

[17]  Guanrong Chen,et al.  Bifurcation Analysis of Chen's equation , 2000, Int. J. Bifurc. Chaos.

[18]  Xiaofeng Liao,et al.  A Digital Image Encryption Algorithm Based on Hyper-chaotic Cellular Neural Network , 2009, Fundam. Informaticae.

[19]  Gonzalo Álvarez,et al.  Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems , 2003, Int. J. Bifurc. Chaos.