High Security Nested PWLCM Chaotic Map Bit-Level Permutation Based Image Encryption

DOI: 10.4236/ijcns.2012.59065   PDF   HTML     4,817 Downloads   7,614 Views   Citations


Chaotic systems produce pseudo-random sequences with good randomness; therefore, these systems are suitable to efficient image encryption. In this paper, a low complexity image encryption based on Nested Piece Wise Linear Chaotic Map (NPWLCM) is proposed. Bit planes of the grey or color levels are shuffled to increase the encryption complexity. A security analysis of the proposed system is performed and presented. The proposed method combine pixel shuffling, bit shuffling, and diffusion, which is highly disorder the original image. The initial values and the chaos control parameters of NPWLCM maps are derived from external secret key. The cipher image generated by this method is the same size as the original image and is suitable for practical use in the secure transmission of confidential information over the Internet. The experimental results of the proposed method show advantages of low complexity, and high-level security.

Share and Cite:

Q. Nasir and H. H. Abdlrudha, "High Security Nested PWLCM Chaotic Map Bit-Level Permutation Based Image Encryption," International Journal of Communications, Network and System Sciences, Vol. 5 No. 9, 2012, pp. 548-556. doi: 10.4236/ijcns.2012.59065.

Conflicts of Interest

The authors declare no conflicts of interest.


[1] S. Lian, “A Block Cipher Based on Chaotic Neural Networks,” Neurocomputing, Vol. 72, No. 4-6, 2009, pp. 1296-1301. doi:10.1016/j.neucom.2008.11.005
[2] R. Matthews, “On the Derivation of a chaotic Encryption Algorithm,” Cryptologia, Vol. 13, No. 1, 1989, pp. 29-42. doi:10.1080/0161-118991863745
[3] Z. Li and D. Xu, “A Secure Communication Scheme Using Projective Chaos Synchronization,” Chaos, Solitons and Fractals, Vol. 22, No. 2, 2004, pp. 477-481. doi:10.1016/j.chaos.2004.02.019
[4] F.-Y. Wang and G.-W. Cui, “A New Image Encryption Algorithm Based on the Logistic Chaotic System,” The 3rd IEEE International Conference on Computer Science and Information Technology (ICCSIT), Chengdu, 9-11 July 2010, pp. 192-194.
[5] C. M. Li and L. X. Hong, “A New Image Encryption Scheme Based on Hyperchaotic Sequences,” IEEE International Workshop on Anti-Counterfeiting, Security, Identification, Xiamen, 16-18 April 2007, pp. 237-240.
[6] Y. Cheng, S. Yang and S.-F. Li, “Image Encryption of Multiple Keys Method Based on Chaotic Maps,” First International Conference on Pervasive Computing Signal Processing and Applications (PCSPA), Harbin, 17-19 September 2010, pp. 891-894. doi:10.1109/PCSPA.2010.220
[7] M. Ashtiyani, P. M. Birgani and H. M. Hosseini, “Chaos-Based Medical Image Encryption Using Symmetric Cryptography,” The 3rd International Conference on Information and Communication Technologies: From Theory to Applications, Damascus, 7-11 April 2008, pp. 1-5.
[8] M. Ahmad, C. Gupta and A. Varshney, “Digital Image Encryption Based on Chaotic Map for Secure Transmission,” International Multimedia Signal Processing and Communication Technologies, Aligarh, 14-16 March 2009, pp. 292-295. doi:10.1109/MSPCT.2009.5164233
[9] D. Socek, S. Li, S. S. Magliveras and B. Furht, “Enhanced 1-D Chaotic Key Based Algorithm for Image Encryption,” First International Conference on Security and Privacy for Emerging Areas in Communications Networks, Athens, 5-9 September 2005, pp. 406-407.
[10] G. Alvarez, F. Montoya, M. Romera and G Pastor, “Cryptanalysis of an Ergodic Chaotic Cipher,” Physics Letters A, Vol. 311, No. 2-3, 2003, pp. 172-179. doi:10.1016/S0375-9601(03)00469-9
[11] A. Awad, S. E. Assad, Q. Wang, C. Vladeanu and B. Bakhache, “Comparative Study of 1-D Chaotic Generators for Digital Data Encryption,” International Journal of Computer Science, Vol. 35, No. 4, 2008, pp. 483-488.
[12] A. Awad, “A New Chaos-Based Cryptosystem for Secure Transmitted Images,” IEEE Transactions on Computers, No. 99, 2011, p. 1.
[13] C. X. Zhu, Z. G. Chen and W. W. Ouyang, “A New Image Encryption Algorithm Based on General Chen’s Chaotic System,” Journal of Central South University of Technology, Vol. 37, No. 6, 2006, pp. 1142-1148.
[14] C. K. Huang and H. H. Nein, “Multi Chaotic Systems Based Pixel Shuffle for Image Encryption,” Optics Communication, Vol. 282, No. 11, 2009, pp. 2123-2127
[15] A. Abid, Q. Nasir and A. Elwakil, “Implementation of an Encrypted Wireless Communication System Using Nested Chaotic Maps,” International Journal of Bifurcation and Chaos, Vol. 20, No. 12, 2010, pp. 4087-4096. doi:10.1142/S0218127410027957
[16] S. Li, G. Chen and X. Mou, “On the Dynamical Degradation of Digital Piecewise Linear Chaotic Maps,” International Journal of Bifurcation and Chaos, Vol. 15, No. 10, 2005, pp. 3119-3151. doi:10.1142/S0218127405014052
[17] T. Addabbo, M. Alioto, A. Fort, S. Rocchi and V. Vignoli, “A Feedback Strategy to Improve the Entropy of a Chaos-Based Random Bit Generator,” IEEE Transactions on Circuits and Systems, Vol. 53, No. 2, 2006, pp. 326-337. doi:10.1109/TCSI.2005.856670
[18] M. Drutarovsky and P. Galajda, “Chaos-Based True Random Number Generator Embedded in a Mixed-Signal Reconfigurable Hardware,” Journal of Electrical Engineering, Vol. 57, No. 4, 2006, pp. 218-225.
[19] A. M. Abid, “An Implementation of Chaotic Encryption in Wireless Voice Transmission,” M.Sc. Thesis, University of Sharjah, Sharjah, 2009.

comments powered by Disqus

Copyright © 2020 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.