Computer Science ›› 2017, Vol. 44 ›› Issue (1): 188-193.doi: 10.11896/j.issn.1002-137X.2017.01.036

Previous Articles     Next Articles

New Image Encryption Algorithm Based on New Four-dimensional Discrete-time Chaotic Map

ZHU Shu-qin, LI Jun-qing and GE Guang-ying   

  • Online:2018-11-13 Published:2018-11-13

Abstract: A novel four-dimensional discrete-time chaotic system was constructed on the basis of a modified version of Marotto’s theorem.On the basis of this system,a digital image encryption scheme was proposed,in which the 256-bit hash value of plain image is used to generate the initial value of the chaotic sequence.Therefore,the encryption key ge-nerated by the chaotic sequence is related with plain image to enhance the security of the encryption system.Theoretical analysis and simulation experiments show that the key space of the image encryption scheme is as large as 3.4×10100.The histogram of the encrypted image is close to the uniform distribution.The correlation of pixels is eliminated.The information entropy of encrypted image is close to 8 bit and the encrypted image has no obvious statistical information.The scheme is extremely sensitive to perturbations of the initial conditions of the chaos system.Any perturbations which are larger than 10-15 will make corresponding decryptions impossible.The encrypted image is also very sensitive to the plain image and can resist differential attack.

Key words: Chaos,Image encryption,Marotto’s theorem,SHA-256 hash function,Bitwise XOR operation,Circular shifting operation

[1] GUAN Guo-rong,WU Cheng-mao,JIA Qian.An improved high performance Lorenz system and its application[J].Acta Physica Sinica,2015,64(2):31-44.(in Chinese) 官国荣,吴成茂,贾倩.一种改进的高性能Lorenz系统构造及其应用[J].物理学报,2015,64(2):31-44.
[2] WANG Xing-yuan,WANG Ming-jun.Hyperchaotic Lorenz system[J].Acta Physica Sinica,2007,6(9):5136-5141.(in Chinese) 王兴元,王明军.超混沌Lorenz系统[J].物理学报,2007,56(9):5136-5141.
[3] SUN Kei-hui,LIU Xuan,ZHU Cong-xu,et al.Hyperchaos and hyperchaos control of the sinusoidally forced simplified Lorenz system[J].Nonlinear Dynamics,2012,69(3):1383-1391.
[4] CANG Shi-jian,CHEN Zeng-qiang,YUAN Zhu-zhi.Analysis andcircuit implementation of a new four-dimensional non-autonomous hyper-chaotic system[J].Acta Physica Sinica,2008,57(3):1493-1501.(in Chinese) 仓诗建,陈增强,袁著祉.一个新四维非自治超混沌系统的分析与电路实现[J].物理学报,2008,57(3):1493-1501.
[5] LIU Yang-zheng.Circuit Implementation of Hyperchaotic Lüsystem [J].Acta Physica Sinica,2008,7(3):1139-1143.(in Chinese) 刘扬正.超混沌Lü系统的电路实现[J].物理学报,2008,57(3):1139-1143.
[6] PANG Shou-quan,LIU Yong-jian,ZHU Cong-xu.Circuit implementation and application of hyperchaotic Lorenz system[J].Computer Engineering and Applications,2013,49(7):235-239.(in Chinese) 庞寿全,刘永建,朱从旭.超混沌Lorenz系统的电路实现与应用[J].计算机工程与应用,2013,49(7):235-239.
[7] MAN Feng-quang,HOU Cheng-xi,WANG Zhong-lin,et al.Design and Implementation o f a Novel Hyper chaotic System[J].Communications Technology,2010,3(11):108-111.(in Chinese) 满峰泉,侯承玺,王忠林,等.一个新的超混沌系统设计与实现[J].通信技术,2010,43(11):108-111.
[8] SHI Xue-rong,WANG Zuo-lei.A single adaptive controller with one variable for synchronizing two identical time delay hyperchaotic Lorenz systems with mismatched parameterss[J].Nonlinear Dynamcs,2012,69(1):117-125.
[9] ZHANG Fan,LIU Jian-ming.A New Six-dimensional Hyper-chaotic System and Its Circuit Implementation[J].Science Technology and Engineering,2013,13(23):6659-6666.(in Chinese) 张帆,刘剑鸣.一种新六维超混沌系统及其电路实现[J].科学技术与工程,2013,13(23):6659-6666.
[10] HAN Shuang-shuang,MIN Le-quan,HAN Dan-dan.A pseudo-random number generator using three dimensional chaotic map[J].Hua Zhong Univ of Sci &Tech (Natural Science Edition),2013,41(8):16-19.(in Chinese) 韩双霜,闵乐泉,韩丹丹.一种基于三维离散混沌映射的伪随机数生成器[J].华中科技大学学报(自然科学版),2013,41(8):16-19.
[11] HAN Shuang-shuang,MIN Le-quan,HAN Dan-dan.The algorithm design of a new chaotic image encryption[J].Journal of Henan University of Science and Technology(Natural Science Edition),2014,5(5):37-41.(in Chinese) 韩双霜,闵乐泉,韩丹丹.一种新的混沌图像加密算法设计[J].河南科技大学学报(自然科学版),2014,35(5):37-41.
[12] SUI Lian-sheng,LIU Ben-qing,WANG Qiang,et al.Double-ima-ge encryption based on Yang-Gu mixture amplitude-phase retrieval algorithm and high dimension chaotic system in gyrator domain[J].Optics Communications,2015,354(2015):184-196.
[13] CAI Jun,CHEN Xin,XIANG Xu-dong.Substitution-Permuta-tion Network Structred image Encryption algorithm based on chaotic map[J].Computer Science,2014,41(9):158-164.(in Chinese) 蔡俊,陈昕,向旭东.一种基于混沌的代换-置换结构图像加密算[J].计算机科学,2014,41(9):158-164.
[14] HAN Feng-ying,ZHU Cong-xu.New permutation-substitutionImage Encryption Scheme Based on Chaos[J].Journal of Wuhan University(Natural Science Edition),2014,60(5):447-452(in chinese) 韩凤英,朱从旭.新型置换和替代结构的图像混沌加密算法[J].武汉大学学报(理学版),2014,60(5):447-452.
[15] HUANG Wei-qi,CHEN Zhi-gang,LIANG Di-qing,et al.Medical image encryption algorithm based on multiple chaotic systems[J].Computer Science,2012,39(12):261-263,299.(in Chinese) 黄伟琦,陈志刚,梁涤青,等.基于多混沌系统的医学图像加密算法[J].计算机科学,2012,39(12):261-263,299.
[16] ZHOU Guo-min,ZHANG Da-xing, LIU Yan-jian,et al.A novel image encryption algorithm based on chaos and Line map[J].Neurocomputing,2015,169(2015):150-157.
[17] WANG Jing,JIANG Guo-ping.Cryptanalysis of a hyper-chaotic image encryption algorithm and its improved version[J].Acta Physica Sinica,2011,60(6):83-93.(in Chinese) 王静,蒋国平.一种超混沌图像加密算法的安全性分析及其改进[J].物理学报,2011,60(6):83-93.
[18] DENG Shao-jiang,ZHANG Dai-gu,PU Zhong-liang.DigitalImage Scrambling Algorithm Based on Chaotic System[J].Computer Science,2008,35(8):238-240.(in Chinese) 邓绍江,张岱固,濮忠良.一种基于混沌的图像置乱算法[J].计算机科学,2008,35(8):238-240.
[19] ZHU Cong-xu,HU Yu-ping,SUN Ke-hui.New Image Encryption Algorithm Based on Hyperchaotic System and Ciphertext Diffusion in Crisscross Pattern[J].Journal of Electronics & Information Technology,2012,34(7):1735-1743.(in Chinese) 朱从旭,胡玉平,孙克辉.基于超混沌系统和密文交错扩散的图像加密新算法[J].电子与信息学报,2012,34(7):1735-1743.
[20] SHI Yu-ming,CHENG Guan-rong.Discrete Chaos in BanachSpaces [J].Science in China Series A:Mathematics,2005,48(2):222-238.
[21] LI Pei,MIN Le-quan,ZANG Hong-yan.A generalized chaos syn-chronization based pseudo random number generator and performance analysis [C]∥International Conference on Communications,Circuits and Systems.Cheng du:Institute of Electrical and Electronics Engineers Computer Society,2010:781-785.
[22] BEHNIA S,AKHSHANI A,MAHMODI H,et al.A Novel Algorithm for Image Encryption Based on Mixture of Chaotic Maps[J].Chaos,Solitons & Fractals,2008,5(2):408-419

No related articles found!
Full text



[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75 .
[2] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[3] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[4] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[5] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99 .
[6] ZHOU Yan-ping and YE Qiao-lin. L1-norm Distance Based Least Squares Twin Support Vector Machine[J]. Computer Science, 2018, 45(4): 100 -105 .
[7] LIU Bo-yi, TANG Xiang-yan and CHENG Jie-ren. Recognition Method for Corn Borer Based on Templates Matching in Muliple Growth Periods[J]. Computer Science, 2018, 45(4): 106 -111 .
[8] GENG Hai-jun, SHI Xin-gang, WANG Zhi-liang, YIN Xia and YIN Shao-ping. Energy-efficient Intra-domain Routing Algorithm Based on Directed Acyclic Graph[J]. Computer Science, 2018, 45(4): 112 -116 .
[9] CUI Qiong, LI Jian-hua, WANG Hong and NAN Ming-li. Resilience Analysis Model of Networked Command Information System Based on Node Repairability[J]. Computer Science, 2018, 45(4): 117 -121 .
[10] WANG Zhen-chao, HOU Huan-huan and LIAN Rui. Path Optimization Scheme for Restraining Degree of Disorder in CMT[J]. Computer Science, 2018, 45(4): 122 -125 .