Skip to main content
Erschienen in:
Buchtitelbild

2015 | OriginalPaper | Buchkapitel

An Image Encryption Algorithm Based on Zigzag Transformation and 3-Dimension Chaotic Logistic Map

verfasst von : Yuzhen Li, Xiaodong Li, Xin Jin, Geng Zhao, Shiming Ge, Yulu Tian, Xiaokun Zhang, Kejun Zhang, Ziyi Wang

Erschienen in: Applications and Techniques in Information Security

Verlag: Springer Berlin Heidelberg

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

An image encryption algorithm based on Zigzag transformation and 3-Dimension Logistic chaotic map by making use of the permutation-diffusion encryption structure is proposed. The algorithm consists of two parts: firstly, Zigzag transformation is used to scramble pixel position of the color image through three channels; then, 3-Dimension Logistic chaotic map is utilized to diffuse pixel values through three channels. To solve the problem of large computation and space overhead of color image encryption algorithm, the iterative chaotic sequences are used several times in the diffusion process to improve encryption efficiency. The key space of the algorithm is large enough to resist brute-force attack and simulation results show that it also has high key sensitivity, high encryption speed and the strong ability to resist exhaustive attack and statistical attack.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Jin, X., Liu, Y., Li, X.D., Zhao, G., Chen, Y.Y., Guo, K.: Privacy preserving face identication through sparse representation. In: To Appear in the Proceedings of the 10th Chinese Conference on Biometric Recognition (CCBR) (2015) Jin, X., Liu, Y., Li, X.D., Zhao, G., Chen, Y.Y., Guo, K.: Privacy preserving face identication through sparse representation. In: To Appear in the Proceedings of the 10th Chinese Conference on Biometric Recognition (CCBR) (2015)
2.
Zurück zum Zitat Guellier, A., Bidan, C., Prigent, N.: Homomorphic cryptography-based privacy-preserving network communications. In: Batten, L., Li, G., Niu, W., Warren, M. (eds.) ATIS 2014. CCIS, vol. 490, pp. 159–170. Springer, Heidelberg (2014) Guellier, A., Bidan, C., Prigent, N.: Homomorphic cryptography-based privacy-preserving network communications. In: Batten, L., Li, G., Niu, W., Warren, M. (eds.) ATIS 2014. CCIS, vol. 490, pp. 159–170. Springer, Heidelberg (2014)
3.
4.
Zurück zum Zitat Patidar, V., Pareek, N.K., Purohit, G., et al.: A robust and secure chaotic standard map based pseudorandom permutation-substitution scheme for image encryption. Opt. Commun. 284(19), 4331–4339 (2011)CrossRef Patidar, V., Pareek, N.K., Purohit, G., et al.: A robust and secure chaotic standard map based pseudorandom permutation-substitution scheme for image encryption. Opt. Commun. 284(19), 4331–4339 (2011)CrossRef
5.
Zurück zum Zitat Zhao, J., Guo, W., Ye, R.: A chaos-based image encryption scheme using permutation-substitution architecture. Int. J. Comput. Trends Technol. 15(4), 174–185 (2014)CrossRef Zhao, J., Guo, W., Ye, R.: A chaos-based image encryption scheme using permutation-substitution architecture. Int. J. Comput. Trends Technol. 15(4), 174–185 (2014)CrossRef
6.
Zurück zum Zitat Mandal, M.K., Banik, G.D., Chattopadhyay, D., et al.: An image encryption process based on chaotic logistic map. Iete Technical Review 29(5), 395–404 (2012)CrossRef Mandal, M.K., Banik, G.D., Chattopadhyay, D., et al.: An image encryption process based on chaotic logistic map. Iete Technical Review 29(5), 395–404 (2012)CrossRef
7.
Zurück zum Zitat Ye, G., Wong, K.W.: An efficient chaotic image encryption algorithm based on a generalized Arnold map. Nonlinear Dyn. 69(4), 2079–2087 (2012)MathSciNetCrossRef Ye, G., Wong, K.W.: An efficient chaotic image encryption algorithm based on a generalized Arnold map. Nonlinear Dyn. 69(4), 2079–2087 (2012)MathSciNetCrossRef
8.
Zurück zum Zitat Wang, Y., Ren, G., Jiang, J., et al.: Image encryption method based on chaotic map. In: ICIEA 2007, 2nd IEEE Conference on IEEE Industrial Electronics and Applications, pp. 2558–2560 (2007) Wang, Y., Ren, G., Jiang, J., et al.: Image encryption method based on chaotic map. In: ICIEA 2007, 2nd IEEE Conference on IEEE Industrial Electronics and Applications, pp. 2558–2560 (2007)
9.
Zurück zum Zitat Huang, F., Zhang, G.: A new image permutation approach using combinational chaotic maps. Inf. Technol. J. 12(4), 835–840 (2013)CrossRef Huang, F., Zhang, G.: A new image permutation approach using combinational chaotic maps. Inf. Technol. J. 12(4), 835–840 (2013)CrossRef
11.
Zurück zum Zitat Sathishkumar, G.A., Bhoopathy Bagan, K., Sriraam, N.: Image encryption based on diffusion and multiple chaotic maps. Int. J. Netw. Secur. Appl. 3(2), 181–194 (2011). doi:10.5121/ijnsa.2011.3214 Sathishkumar, G.A., Bhoopathy Bagan, K., Sriraam, N.: Image encryption based on diffusion and multiple chaotic maps. Int. J. Netw. Secur. Appl. 3(2), 181–194 (2011). doi:10.​5121/​ijnsa.​2011.​3214
12.
Zurück zum Zitat Wang, Y., Wong, K.W., Liao, X., et al.: A new chaos-based fast image encryption algorithm. Appl. Soft Comput. 11(1), 514–522 (2011)CrossRef Wang, Y., Wong, K.W., Liao, X., et al.: A new chaos-based fast image encryption algorithm. Appl. Soft Comput. 11(1), 514–522 (2011)CrossRef
13.
Zurück zum Zitat Xu, X., Feng, J.: Research and Implementation of Image Encryption Algorithm Based on Zigzag Transformation and Inner Product Polarization Vector, 2013 IEEE International Conference on Granular Computing (GrC) pp. 556–561. IEEE (2010) Xu, X., Feng, J.: Research and Implementation of Image Encryption Algorithm Based on Zigzag Transformation and Inner Product Polarization Vector, 2013 IEEE International Conference on Granular Computing (GrC) pp. 556–561. IEEE (2010)
14.
Zurück zum Zitat Khade, P.N., Narnaware, M.: 3D chaotic functions for image encryption. Int. J. Comput. Sci. Issues 9(3), 323–328 (2012) Khade, P.N., Narnaware, M.: 3D chaotic functions for image encryption. Int. J. Comput. Sci. Issues 9(3), 323–328 (2012)
15.
Zurück zum Zitat Çokal, C., Solak, E.: Cryptanalysis of a chaos-based image encryption algorithm. Physics Letters A 373(15), 1357–1360 (2009)MATHMathSciNetCrossRef Çokal, C., Solak, E.: Cryptanalysis of a chaos-based image encryption algorithm. Physics Letters A 373(15), 1357–1360 (2009)MATHMathSciNetCrossRef
Metadaten
Titel
An Image Encryption Algorithm Based on Zigzag Transformation and 3-Dimension Chaotic Logistic Map
verfasst von
Yuzhen Li
Xiaodong Li
Xin Jin
Geng Zhao
Shiming Ge
Yulu Tian
Xiaokun Zhang
Kejun Zhang
Ziyi Wang
Copyright-Jahr
2015
Verlag
Springer Berlin Heidelberg
DOI
https://doi.org/10.1007/978-3-662-48683-2_1