Spatial chaos-based image encryption design

In recent years, the chaos based cryptographic algorithms have suggested some new and efficient ways to develop secure image encryption techniques, but the drawbacks of small key space and weak security in one-dimensional chaotic cryptosystems are obvious. In this paper, permutation and substitution methods are incorporated to present a stronger image encryption algorithm. Spatial chaotic maps are used to realize the position permutation, and to confuse the relationship between the cipher-image and the plain-image. The experimental results demonstrate that the suggested encryption scheme of image has the advantages of large key space and high security; moreover, the distribution of grey values of the encrypted image has a random-like behavior.

[1]  Guanrong Chen,et al.  Nonlinear feedback-controlled generalized synchronization of spatial chaos , 2004 .

[2]  Yiu-ming Cheung,et al.  Security of public key encryption technique based on multiple chaotic systems , 2005, nlin/0510017.

[3]  Kunihiko Kaneko,et al.  Complex Systems: Chaos and Beyond , 2001 .

[4]  Jinyu Kuang,et al.  PERIODICITY OF CHAOTIC TRAJECTORIES IN REALIZATIONS OF FINITE COMPUTER PRECISIONS AND ITS IMPLICATION IN CHAOS COMMUNICATIONS , 2003, nlin/0309005.

[5]  C Zhou,et al.  Extracting messages masked by chaotic signals of time-delay systems. , 1999, Physical review. E, Statistical physics, plasmas, fluids, and related interdisciplinary topics.

[6]  C. Chui,et al.  A symmetric image encryption scheme based on 3D chaotic cat maps , 2004 .

[7]  Guanrong Chen,et al.  On generalized synchronization of spatial chaos , 2003 .

[8]  Shu Tang Liu Nuclear fission and spatial chaos , 2006 .

[9]  Jinyu Kuang,et al.  Periodicity of chaotic trajectories of single and coupled maps in realizations of finite computer precisions , 2003 .

[10]  M. Mackey,et al.  Chaos, Fractals, and Noise: Stochastic Aspects of Dynamics , 1998 .

[11]  Guanrong Chen,et al.  Asymptotic behavior of delay 2-D discrete logistic systems , 2002 .

[12]  Guanrong Chen,et al.  A multiple pseudorandom-bit generator based on a spatiotemporal chaotic map , 2006 .

[13]  Kevin M. Short,et al.  Reconstructing the keystream from a chaotic encryption scheme , 2001 .

[14]  Hong Zhou,et al.  Problems with the chaotic inverse system encryption approach , 1997 .

[15]  Guanrong Chen,et al.  On Spatial Lyapunov Exponents and Spatial Chaos , 2003, Int. J. Bifurc. Chaos.

[16]  M G Cosenza,et al.  Coupled map networks as communication schemes. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.

[17]  Xiaowen Li,et al.  A new spatiotemporally chaotic cryptosystem and its security and performance analyses. , 2004, Chaos.

[18]  Henry Ker-Chang Chang,et al.  A linear quadtree compression scheme for image encryption , 1997, Signal Process. Image Commun..

[19]  Michael C. Mackey,et al.  Chaos, Fractals, and Noise , 1994 .

[20]  Vinod Patidar,et al.  Cryptography using multiple one-dimensional chaotic maps , 2005 .

[21]  Guanrong Chen,et al.  On Spatial Periodic orbits and Spatial Chaos , 2003, Int. J. Bifurc. Chaos.

[22]  W.-M. Yang,et al.  On the largest Lyapunov exponent for coupled surjective map lattice with weak diffusive coupling , 1991 .

[23]  Shu Tang Liu,et al.  Spacial chaos behavior of molecular orbit , 2007 .

[24]  Sitao Wu,et al.  Uniformity of Spatial Physical Motion Systems and Spatial Chaos Behavior in the Sense of Li-yorke , 2006, Int. J. Bifurc. Chaos.

[25]  Vinod Patidar,et al.  Image encryption using chaotic logistic map , 2006, Image Vis. Comput..

[26]  Chen Wenjian,et al.  Chaotic laser synchronization and its application in optical fiber secure communication , 2004 .

[27]  L. Chua,et al.  CLARIFYING CHAOS: EXAMPLES AND COUNTEREXAMPLES , 1996 .

[28]  Jiun-In Guo,et al.  A new chaotic key-based design for image encryption and decryption , 2000, 2000 IEEE International Symposium on Circuits and Systems. Emerging Technologies for the 21st Century. Proceedings (IEEE Cat No.00CH36353).