Research on compound chaos image encryption method with clock- varying

Abstract

In this paper, we suggest one compound chaos image encryption method with time- varying multilevel initial parameters. This algorithm combines Subsection-linearity mapping, Chebyshev mapping with Logistic mapping in order to disturbing values of each image point and the array of original images based on chaotic second-scrambling way. The chaotic system uses time-varying system clock to change the first chaotic mapping initial parameter, and takes those chaotic sequences which generated by the first chaotic mapping as the initial parameters for the second chaotic mapping, then generate two-dimensional image pixel position scrambling matrix, and uses the same system clock to lock Chebyshev mapping initial parameter, then generate two-dimensional image pixel value transforming matrix. By this way for using the time-varying system clock, The encryption system can randomly changes many initial parameters of chaotic image encryption system to enhance image transmission security, has the capability of “one time one secret”. The simulation results show that this algorithm is simple, safe, easy to achieve with software and has huge secret key space.

Share and Cite:

MENG, X. , WANG, X. and CHU, Y. (2012) Research on compound chaos image encryption method with clock- varying. Open Journal of Applied Sciences, 2, 10-14. doi: 10.4236/ojapps.2012.24B003.

Conflicts of Interest

The authors declare no conflicts of interest.

References

[1] Zhang AiHua, Jiang ZhongQin. Improving for Chaotic Image Encryption Algorithm Based on Logistic Maping. Journal of Nanjing University Of Posts and Telecommunications (Natural Science).2009,29(4):1-2.
[2] National Institute of Standards and Technology, "Data Encryption Standard (DES)." 2001,http://csrc.nist.gov/publications/fips/fips46-3/fips46-3.pdf.
[3] Hou Qibin and Wang Yangsheng, "Security traffic image transmission based on EZW and AES," in Intelligent Transportation Systems.2003. Proceedings. 2003 IEEE, 2003, 1(1) :86-89.
[4] Chen Ling,Pan ZhongLiang. An Encryption Method for Color Images Based on Logistic and Henon Chaotic Systems. Equipment making technic. 2010:1-4.
[5] Huang Hao,Huang RuiSheng, “Chaos and Application,” Wu Han University Press,2007.
[6] Zhang YunPeng, Zuo Fei, Zhai ZhengJu. A Color Image Encryption Algorithm Based on Chaotic Chebychev and Variable-Parameters Logistic Systems. Journal of No~hwestem Polyteehnical University. 2010 , 28(4):3-4
[7] YANG Fan, XUE Mo-gen. Research on digital image encryption algorithm based on compound chaotic image second-scrambling. Journal of He Fei University of Technology. 2009, 32(8):4-5.
[8] Zhou Zhigang, Li Su-gui. Digital image hiding technology based on chaotic system with variable parameters. Journal of Computer Applications. 2009, 29(7) :2-4.
[9] Hossam El-din H. Ahmed, Hamdy M. Kalash, and Osama S. Farag Allah. An Efficient Chaos- Based Feedback Stream Cipher (ECBFSC) for Image Encryption and Decryption .Information. 2007:121–129 .
[10] Yicong Zhou, Karen Panetta, Sos Agaian. ImageEncryption Based on Edge Information. Proc. of SPIE-IS&T Electronic Imaging.SPIE-IS&T/ Vol. 7256 725603-1.
[11] Fethi Belkhouche,Ibrahim Gokcen, U. Qidwai. Chaotic gray-level image transformation. Journal of Electronic Imaging.2005,14(4).
[12] Mohamed Amin. Efficient modified RC5 based on chaos adapted to image encryption. Journal of Electronic Imaging.2010,19(1).

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.