A New Hybrid Chaotic Map and Its Application on Image Encryption and Hiding

A new hybrid chaotic map is constructed in this paper and applied to image encryption and hiding. MD5 is used as part of initial condition and control parameter to perturb the trajectory in order to further increase the security against plaintext-chosen attacks and differential attacks. Ciphered image is embedded into several carrier images to reduce suspiciousness and to increase robustness. The results demonstrate that the proposed scheme is of great security, robustness, and efficiency.

[1]  D. Baleanu,et al.  Discrete fractional logistic map and its chaos , 2014 .

[2]  Xing-yuan Wang,et al.  A chaotic image encryption algorithm based on perceptron model , 2010 .

[3]  Bernd Girod,et al.  Digital watermarking of text, image, and video documents , 1998, Comput. Graph..

[4]  Vincent Rijmen,et al.  The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .

[5]  D. K. Branstad,et al.  Data Encryption Standard: past and future , 1988, Proc. IEEE.

[6]  X. Mou,et al.  On the security of a chaotic encryption scheme: problems with computerized chaos in finite computing precision , 2003 .

[7]  K. Ikeda Multiple-valued stationary state and its instability of the transmitted light by a ring cavity system , 1979 .

[8]  Ljupco Kocarev,et al.  Chaos-Based Cryptography - Theory, Algorithms and Applications , 2011, Chaos-Based Cryptography.

[9]  Guanrong Chen,et al.  On the security defects of an image encryption scheme , 2009, Image Vis. Comput..

[10]  P. Verhulst Recherches mathématiques sur la loi d’accroissement de la population , 2022, Nouveaux mémoires de l'Académie royale des sciences et belles-lettres de Bruxelles.

[11]  Zengqiang Chen,et al.  A new image encryption algorithm based on hyper-chaos , 2008 .

[12]  Robert A. J. Matthews,et al.  On the Derivation of a "Chaotic" Encryption Algorithm , 1989, Cryptologia.

[13]  Michael S. Gaines,et al.  Biological Populations with Nonoverlapping Generations : Stable Points , Stable Cycles , and Chaos , 2007 .

[14]  S. Agaian,et al.  NPCR and UACI Randomness Tests for Image Encryption , 2011 .

[15]  G. Álvarez,et al.  Cryptanalysis of an ergodic chaotic cipher , 2003 .

[16]  Sang Joon Kim,et al.  A Mathematical Theory of Communication , 2006 .

[17]  William Stallings,et al.  Cryptography and network security , 1998 .

[18]  G. Álvarez,et al.  Cryptanalysis of a discrete chaotic cryptosystem using external key , 2003 .

[19]  Kwok-Wo Wong,et al.  A Fast Image Encryption Scheme based on Chaotic Standard Map , 2006, ArXiv.

[20]  Alessandro Cilardo,et al.  Elliptic Curve Cryptography Engineering , 2006, Proceedings of the IEEE.

[21]  A. Akhavan,et al.  A fast chaotic encryption scheme based on piecewise nonlinear chaotic maps , 2007 .

[22]  Michael Ganley,et al.  Encryption algorithms , 1992 .

[23]  Naser Pariz,et al.  A chaotic secure communication scheme using fractional chaotic systems based on an extended fractional Kalman filter , 2009 .

[24]  Andreas Uhl,et al.  Image And Video Encryption: From Digital Rights Management To Secured Personal Communication (Advances in Information Security) , 2004 .

[25]  Vinod Patidar,et al.  Image encryption using chaotic logistic map , 2006, Image Vis. Comput..

[26]  Mohammed Ghanbari,et al.  Scope of validity of PSNR in image/video quality assessment , 2008 .

[27]  Hongjun Liu,et al.  Color image encryption based on one-time keys and robust chaotic maps , 2010, Comput. Math. Appl..

[28]  M. Baptista Cryptography with chaos , 1998 .

[29]  Bernard P. Zajac Applied cryptography: Protocols, algorithms, and source code in C , 1994 .

[30]  M. Hénon A two-dimensional mapping with a strange attractor , 1976 .

[31]  Vinod Patidar,et al.  Cryptography using multiple one-dimensional chaotic maps , 2005 .

[32]  A. Wolf,et al.  Determining Lyapunov exponents from a time series , 1985 .

[33]  Chuan-Kuei Huang,et al.  Multi chaotic systems based pixel shuffle for image encryption , 2009 .