Computer Science ›› 2020, Vol. 47 ›› Issue (4): 278-284.doi: 10.11896/jsjkx.190600059

• Information Security • Previous Articles     Next Articles

Efficient Image Encryption Algorithm Based on 1D Chaotic Map

BAN Duo-han, LV Xin, WANG Xin-yuan   

  1. College of Computer & Information,Hohai University,Nanjing 211100,China
  • Received:2019-06-12 Online:2020-04-15 Published:2020-04-15
  • Contact: LV Xin,born in 1983,Ph.D,lecturer,is a member of China Computer Federation.His research is mainly focused on network and information security.
  • About author:BAN Duo-han,born in 1994,postgra-duate.Her main research interests include image encryption and network security.
  • Supported by:
    This work was supported by the National Key Research and Development Program of China (2018YFC0407105) and NSF-China and Guangdong Province Joint Project (U1301252)

Abstract: With the development of multimedia technologies,the applications based on digital images have become more and more popular,the security issues of the image itself and the privacy problems of the image owners are more severe in current environment.Different from text,digital images data as a two-dimensional data with large volume of data,high redundancy and strong correlation between pixels.It is difficult to achieve the effect of encryption when traditional encryption method is applied directly to image encryption.At present,encryption based on chaos theory is one of the mainstream methods in the field of image encryption,which using the classical structure of scrambling-diffusion,making use of the high randomness of the chao-tic sequences to ensure the security of the encryption results,and has a high encryption efficiency at the same time.In order to further improve the security of chaotic encryption algorithms,a large number of complex chaotic maps,such as hyper-chaos and multi-level chaos,have been proposed,however,the computational complexity is much higher than that of one-dimensional chaotic maps.To solve this problem,an efficient chaotic map called SPM is designed through combining Sine map and PWLCM,which expands thechao-tic range,enhances the ergodicity and lifts up the generation speed of chaotic sequence without reducing security.Based on this,an image encryption algorithm based on a novel structure is designed.Only one round of scrambling-diffusion-scrambling is needed to complete the encryption in this method,which reduces the encryption rounds compared to traditional methods and further improves the efficiency of encryption.The fully experiments show that the proposed method can effectively resist the chosen plain-image/cipher-image attacks and the encryption efficiency is improved by about 58% on average,meaning a high practicability.

Key words: Chosen plain-image/cipher-image encryption attack, Compound chaotic map, Image encryption, One-round encryption, Pseudo-randomness

CLC Number: 

  • TP309.7
[1]ZHANG X Q,WANG M M,ZHU G L.Research on the New Development of Image Encryption Algorithms[J].Computer Engineering & Science,2012,34(5):1-6.
[2]YE G.Image scrambling encryption algorithm of pixel bit based on chaos map[J].Pattern Recognition Letters,2010,31(5):347-354.
[3]LI Y J,ZHANG R Z,GE J H,et al.Periods of the 3-ArnoldTransformation and Its Application in Image Encryption[J].Journal of University of Electronic Science and Technology of China,2015,44(2):289-294.
[4]SHAMIR A.How to share a secret[J].Communications of the ACM,1979,22(11):612-613.
[5]BLAKLEY G R.Safeguarding cryptographic keys[C]//Proceedings of the National Computer Conference.1979:313-317.
[6]TIAN H Q,QUAN J C,CHENG H,et al.A Summarization about Image Information Encryption Techniques[J].Information Science,2009(1):156-160.
[7]LI T Y,YORKE J A.Period three implies chaos[J].The American Mathematical Monthly,1975,82(10):985-992.
[8]CHEN G,MAO Y,CHUI C K.A symmetric image encryption scheme based on 3D chaotic cat maps[J].Chaos,Solitons and Fractals,2004,21(3):749-761.
[9]ZHOU Y,BAO L,CHEN C L P.A new 1D chaotic system for image encryption[J].Signal Processing,2014,97:172-182.
[10]PAK C,HUANG L.A new color image encryption using combination of the 1D chaotic map[J].Signal Processing,2017,138:129-137.
[11]ARROYO D,RHOUMA R,ALVAREZ G,et al.On the security of a new image encryption scheme based on chaotic map lattices[J].Chaos:An Interdisciplinary Journal of Nonlinear Science,2008,18(3):033112.
[12]SKROBEK A.Cryptanalysis of chaotic stream cipher[J].Physics Letters A,2007,363(1/2):84-90.
[13]WANG X,TENG L,QIN X.A novel colour image encryption algorithm based on chaos[J].Signal Processing,2012,92(4):1101-1108.
[14]ARROYO D,DIAZ J,RODRIGUEZ F B.Cryptanalysis of a one round chaos-based substitution permutation network[J].Signal Processing,2013,93(5):1358-1364.
[15]HUA Z,ZHOU Y,PUN C M,et al.2D Sine Logistic modulation map for image encryption[J].Information Sciences,2015,297:80-94.
[16]ZHU C.A novel image encryption scheme based on improved hyperchaotic sequences[J].Optics Communications,2012,285(1):29-37.
[17]ÖZKAYNAK F,ÖZER A B,YAVUZ S.Cryptanalysis of a novel image encryption scheme based on improved hyperchaotic sequences[J].Optics Communications,2012,285(24):4946-4948.
[18]WEN C C,WANG Q,MIAO X N,et al.Digital Image Encryption:A Survey[J].Computer Science,2012,39(12):6-9.
[19]DENG S,ZHAN Y,XIAO D,et al.Analysis and improvement of a hash-based image encryption algorithm[J].Communications in Nonlinear Science and Numerical Simulation,2011,16(8):3269-3278.
[20]WANG X,JIN C.Image encryption using game of life permutation and PWLCM chaotic system[J].Optics Communications,2012,285(4):412-417.
[21]WOLF A,SWIFT J B,SWINNEY H L,et al.Determining Lyapunov exponents from a time series[J].Physica D:Nonlinear Phenomena,1985,16(3):285-317.
[22]ECKMANN J P,RUELLE D.Ergodic theory of chaos andstrange attractors[M]//The Theory of Chaotic Attractors.New York:Springer,1985:273-312.
[23]ALVAREZ G,LI S.Some basic cryptographic requirements for chaos-based cryptosystems[J].International Journal of Bifurcation and Chaos,2006,16(8):2129-2151.
[24]HUA Z,JIN F,XU B,et al.2D Logistic-Sine-coupling map for image encryption[J].Signal Processing,2018,149:148-161.
[25]WU Y,ZHOU Y,SAVERIADES G,et al.Local Shannon entropy measure with statistical tests for image randomness[J].Information Sciences,2013,222:323-342.
[26]WU Y,ZHOU Y,NOONAN J P,et al.Design of Image Cipher Using Latin Squares[J].Information Sciences,2014,264:317-339.
[1] ZHOU Lian-bing, ZHOU Xiang-zhen, CUI Xue-rong. Compressed Image Encryption Scheme Based on Dual Two Dimensional Chaotic Map [J]. Computer Science, 2022, 49(8): 344-349.
[2] ZHANG Sai-nan, LI Qian-mu. Color Image Encryption Algorithm Based on Logistic-Sine-Cosine Mapping [J]. Computer Science, 2022, 49(1): 353-358.
[3] YU Feng,GONG Xin-hui,WANG Shi-hong. Cryptanalysis of Medical Image Encryption Algorithm Using High-speed Scrambling and Pixel Adaptive Diffusion [J]. Computer Science, 2020, 47(2): 276-280.
[4] TIAN Jun-feng, PENG Jing-jing, ZUO Xian-yu, GE Qiang, FAN Ming-hu. Image Encryption Algorithm Based on Cyclic Shift and Multiple Chaotic Maps [J]. Computer Science, 2020, 47(10): 327-331.
[5] WANG Li-juan, LI Guo-dong, LV Dong-mei. Chaotic System Image Encryption Algorithm Based on Dynamic Parameter Control [J]. Computer Science, 2019, 46(11A): 469-472.
[6] HAN Xue-juan, LI Guo-dong, WANG Si-xiu. Cryptographic Algorithm Based on Combination of Logistic and Hyperchaos [J]. Computer Science, 2019, 46(11A): 477-482.
[7] ZHAO Fang-zheng, LI Cheng-hai, LIU Chen, SONG Ya-fei. Security Analysis and Optimization of Hyper-chaotic Color Image Encryption Algorithm [J]. Computer Science, 2019, 46(11A): 483-487.
[8] ZHU Shu-qin, WANG Wen-hong and LI Jun-qing. Chosen Plaintext Attack on Chaotic Image Encryption Algorithm Based on Perceptron Model [J]. Computer Science, 2018, 45(4): 178-181.
[9] WANG Le-le, LI Guo-dong. Double Chaotic Image Encryption Algorithm Based on Run-length Sequence [J]. Computer Science, 2018, 45(11A): 361-366.
[10] ZANG Rui, YU Yang. Composite Image Encryption Algorithm Based on Involutory Matrix [J]. Computer Science, 2018, 45(11A): 389-392.
[11] WANG Le-le, LI Guo-dong. Double Chaotic Image Encryption Algorithm Based on Fractional Transform [J]. Computer Science, 2018, 45(11A): 393-397.
[12] ZHU Shu-qin, WANG Wen-hong and SUN Zhong-gui. Chosen Plaintext Attack on Image Encryption Algorithm Based on Bit Scrambling and Hyperchaos [J]. Computer Science, 2017, 44(11): 273-278.
[13] ZHU Shu-qin, LI Jun-qing and GE Guang-ying. New Image Encryption Algorithm Based on New Four-dimensional Discrete-time Chaotic Map [J]. Computer Science, 2017, 44(1): 188-193.
[14] ZHU Shu-qin, LI Jun-qing and GE Guang-ying. Fast Image Encryption Algorithm Based on Novel Five Dimensional Discrete Chaos [J]. Computer Science, 2016, 43(Z11): 411-416.
[15] CHAI Hong-yu and ZANG Hong-yan. Image Encryption Scheme Based on Generalized Chaotic Synchronization Systems [J]. Computer Science, 2016, 43(8): 100-104.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!