A novel chaotic map and an improved chaos-based image encryption scheme.

Published on Jul 20, 2014in The Scientific World Journal
· DOI :10.1155/2014/713541
Xianhan Zhang1
Estimated H-index: 1
(SEU: Southeast University),
Yang Cao1
Estimated H-index: 1
(NUPT: Nanjing University of Posts and Telecommunications)
Sources
Abstract
In this paper, we present a novel approach to create the new chaotic map and propose an improved image encryption scheme based on it. Compared with traditional classic one-dimensional chaotic maps like Logistic Map and Tent Map, this newly created chaotic map demonstrates many better chaotic properties for encryption, implied by a much larger maximal Lyapunov exponent. Furthermore, the new chaotic map and Arnold's Cat Map based image encryption method is designed and proved to be of solid robustness. The simulation results and security analysis indicate that such method not only can meet the requirement of imagine encryption, but also can result in a preferable effectiveness and security, which is usable for general applications.
📖 Papers frequently viewed together
4 Authors (Chunhu Li, ..., Chunbao Li)
178 Citations
38 Citations
References33
Newest
A new hybrid chaotic map is constructed in this paper and applied to image encryption and hiding. MD5 is used as part of initial condition and control parameter to perturb the trajectory in order to further increase the security against plaintext-chosen attacks and differential attacks. Ciphered image is embedded into several carrier images to reduce suspiciousness and to increase robustness. The results demonstrate that the proposed scheme is of great security, robustness, and efficiency.
21 CitationsSource
#1Luo Runzi (NCU: Nanchang University)H-Index: 7
#2Wang YinglanH-Index: 3
In this paper, the finite-time stochastic combination synchronization of three different chaotic systems is investigated. Based on the adaptive technique and the properties of Weiner process, a novel sufficient condition is obtained to ensure combination synchronization under stochastic perturbations. Moreover, a secure communication scheme based on the adaptive combination synchronization of three different systems, i.e., the Lorenz system, Chen system, and Lu system, with uncertainties, unknow...
72 CitationsSource
#1Mohammadreza Naeemabadi (Islamic Azad University, Isfahan)H-Index: 3
#2Morteza Zabihi (TUT: Tampere University of Technology)H-Index: 7
Last. Mehrdad Sadeghi Ordoubadi (IAU: Islamic Azad University)H-Index: 2
view all 6 authors...
According to expanding the use of wireless communication technology in transmitting critical data the importance of privacy and security of data are irrevocable. Numerous data encryption algorithms are being done currently. Predetermined fixed key with least 128 bits is being used by most of these algorithms. Considering that vital signals are periodic and with attention to encrypted output fixed key, periodic behavior can be observed, which reduces the security level. In this paper, key is chan...
1 CitationsSource
#1Oh-Min Kwon (CBNU: Chungbuk National University)H-Index: 60
#2Ju H. Park (Yeungnam University)H-Index: 95
Last. Sang-Moon Lee (Daegu University)H-Index: 51
view all 3 authors...
In this paper, a synchronization method of Lur’e systems for chaotic secure communication systems with interval time-varying delay feedback control is proposed. To increase communication security, the transmitted message is encrypted with the techniques of N-shift cipher and public key. Based on Lyapunov method and linear matrix inequality (LMI) formulation, new delay-dependent synchronization criteria are established to not only guarantee stable synchronization of both transmitter and receiver ...
130 CitationsSource
By computing the Lyapunov exponent, which is the inverse of the instability time scale associated with this geodesic motion we show that for a general Kehagias-Sfetsos (KS) solution, there is two region of space which in both of them the equatorial timelike geodesics are stable via Lyapunov measure of stability.
41 CitationsSource
#1Jiansheng GuoH-Index: 2
#2Zhenzhen LvH-Index: 2
Last. Lei ZhangH-Index: 2
view all 3 authors...
This paper analyzes a new image encryption scheme proposed in "A new encryption based on Henon mapping" and proves that this encryption algorithm is insecure in the image-known attack. By analyzing the properties of the round function, there are two weaknesses: on the one hand, the confusing process will not completely destroy the correlation of image pixels, on the other hand, because of the transform function’s unbalance, the adversary can use the bit-wise XOR operation as the right transform ...
2 CitationsSource
By computing the Lyapunov exponent, which is the inverse of the instability time scale associated with this geodesic motion we show that there is two region of space which in both of them the equatorial timelike geodesics are stable via Lyapunov measure of stability.
48 CitationsSource
#1Ivan Zelinka (Tomas Bata University in Zlín)H-Index: 28
#2Guanrong Chen (CityU: City University of Hong Kong)H-Index: 157
Last. Sergej Celikovsky (CTU: Czech Technical University in Prague)H-Index: 12
view all 3 authors...
This chapter introduces the notion of chaos synthesis by means of evolutionary algorithms and develops a new method for chaotic systems synthesis. This method is similar to genetic programming and grammatical evolution and is applied alongside evolutionary algorithms: differential evolution, self-organizing migrating, genetic algorithm, simulated annealing and evolutionary strategies. The aim of this investigation is to synthesize new and “simple” chaotic systems based on some elements contained...
6 CitationsSource
#1Cahit Çokal (Işık University)H-Index: 7
#2Ercan Solak (Işık University)H-Index: 18
A chaos-based image encryption algorithm was proposed in [Z.-H. Guan, F. Huang, W. Guan, Phys. Lett. A 346 (2005) 153]. In this Letter, we analyze the security weaknesses of the proposal. By applying chosen-plaintext and known-plaintext attacks, we show that all the secret parameters can be revealed.
120 CitationsSource
#1Cai-Wan Chang-Jian (ISU: I-Shou University)H-Index: 15
#2Cha'o-Kuang Chen (NCKU: National Cheng Kung University)H-Index: 64
For a more precise description of rotor–bearing system, a nonlinear supported model is proposed in this paper, where a linear damping, a nonlinear elastic restoring force and a turbulent lubricant flow model are assumed. The dynamics of the rotor center and bearing center are studied. The spatial displacements in the horizontal and vertical directions are considered for various non-dimensional speed ratios. The dynamic equations are solved using the Runge–Kutta method. The analysis methods emplo...
44 CitationsSource
Cited By25
Newest
#1Noura Khalil (Tanta University)
#2Amany Sarhan (Tanta University)H-Index: 9
Last. Mahmoud A. M. Alshewimy (Tanta University)H-Index: 1
view all 3 authors...
Abstract null null Image encryption has become the essential way to secure image information with the high frequency of multimedia information exchange on the Internet. In this paper, an effective chaotic color/grayscale image encryption algorithm is proposed. The algorithm uses a hybrid 2D composite chaotic map combined with a sine–cosine cross-chaotic map for the transformation required to scramble the image as a confusion phase. As for the diffusion phase, a 1D combined Logistic-Tent chaotic ...
3 CitationsSource
#1Prachi Agrawal (NITH: National Institute of Technology, Hamirpur)H-Index: 2
#2Talari Ganesh (NITH: National Institute of Technology, Hamirpur)H-Index: 2
Last. Ali Wagdy Mohamed (Nile University)H-Index: 15
view all 3 authors...
The gaining sharing knowledge based optimization algorithm (GSK) is recently developed metaheuristic algorithm, which is based on how humans acquire and share knowledge during their life-time. This paper investigates a modified version of the GSK algorithm to find the best feature subsets. Firstly, it represents a binary variant of GSK algorithm by employing a probability estimation operator (Bi-GSK) on the two main pillars of GSK algorithm. And then, the chaotic maps are used to enhance the per...
Source
#1Ashish Kumar (DCE: Delhi Technological University)H-Index: 5
#2N. S. Raghava (DCE: Delhi Technological University)H-Index: 6
Source
Source
#1Xiulan Zhang (GXUN: Guangxi University for Nationalities)
This paper investigates the neural network (NN) synchronization controller design problem of fractional-order chaotic systems (FOCSs) subject to disturbances and backlash-like hysteresis input. First, we divide the backlash-like hysteresis input into two parts, one of which is the actual controller and the other that can be approximated by NNs. Then, an adaptive NN synchronization control input is implemented to drive the synchronization error between two identical FOCSs into a small domain. Fin...
Source
view all 3 authors...
Source
#1Dasari SravanthiH-Index: 2
view all 4 authors...
With the development in technology, the security of transmission and storage of digital information (basically, digital images) is a challenge to all cryptographic researchers. In recent years, for securing digital images multiple encryption techniques have been proposed. Among them, one-dimensional (1D) chaotic map based image encryption techniques render better security in storage and transmission of images. 1D chaotic maps are simple in structure and hence efficient to implement in both softw...
3 CitationsSource
#1Sakshi Dhall (Jamia Millia Islamia)H-Index: 4
#2Saibal K. Pal (AG: Analysis Group)H-Index: 13
Last. Kapil Sharma (DCE: Delhi Technological University)H-Index: 11
view all 3 authors...
Large scale internet and mobile usage has led the world witness ubiquitous increase in data transfer requirements as well as nature of data in transmissions on insecure networks. Internet of Things (IoT) has given an altogether new dimension to security challenges required to be addressed in the emerging world of smart cities specially with respect to data which is not necessarily text based and is magnanimous and requires to be processed in environments with adaptive needs. Images form one such...
Source
#1Yaroslav KrainykH-Index: 3
#2Yevhen DavydenkoH-Index: 7
In the paper, the mathematical model of memory consumption and through-put parameter estimation of a cryptographic system that employs transposition chaotic maps is investigated. The target platform for the system implementation is Field-Programmable Gate Array (FPGA) devices. The proposed mathematical model takes into account limitations of FPGA circuits and can be used to assess usage of FPGA memory resources preliminary and to evaluate throughput efficiency of the encryption system. First, ex...
Source
#1Muskaan Kalra (Bharati Vidyapeeth's College of Engineering)H-Index: 1
#2Shradha Katyal (Bharati Vidyapeeth's College of Engineering)H-Index: 1
Last. Reena Singh (Bharati Vidyapeeth's College of Engineering)H-Index: 2
view all 3 authors...
A cryptosystem incorporating multiple chaotic maps is proposed. Visual cryptography is necessary in today’s world to combat a large number of data thefts. Image encryption using chaotic maps is a common procedure, but it does not ensure absolute security. We use two maps in this paper, to curb the problem of security. The use of two chaotic maps has made the process of image encryption more secure. Image encryption is done using tent map, which is superimposed on another image encrypted using th...
1 CitationsSource