Skip to main content
Top
Published in: Automatic Control and Computer Sciences 4/2023

01-08-2023

A Bit-Level Three-Dimensional Rectangular Image Encryption Algorithm Using New Chaotic Maps

Authors: Zhenhui Li, Zhouli He, Feng Huang, Renyuan Jia

Published in: Automatic Control and Computer Sciences | Issue 4/2023

Login to get access

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Some two-dimensional chaotic maps are used for scrambling in image encryption. However, the encryption is often unsafe without destroying image statistical characteristics. Moreover, they can only process square image. Here, it designs a bit-level rectangular image encryption algorithm using three-dimensional chaotic maps to solve the problems. The process can permute and confuse images at the same time. Firstly, a plain image is splitted into eight layers according to the value of pixels, then the eight layers are stretched and connected to a new 8-fold image. Secondly, it introduces and improves a new two-dimensional chaotic map that can deal with rectangular images. Every pixel of a column is placed between two adjacent pixels of corresponding row one by one. When the row is longer than the column, the extra pixels are arranged in the original order. After the process, all the pixels are stretched and connected into a row of pixels. Introducing folding mechanism, the line is further mapped to a new image that is not recognized. Lastly, it uses the maps to permute the bigger image. Finally, the cipher image is combined into an original size cipher image. The process shuffles the pixels’ positions and changes the values. Simulation results validate encryption algorithm has large keys space, no statistical characteristics and fast encryption speed above 1 MB/S. It can achieve enough security requirements in public network.
Literature
5.
go back to reference Zheng, J.M. and Gao, W.Zh., Color image encryption algorithm based on chaotic map, Comp. Eng. Des., 2011, vol. 32, no. 9, pp. 2934–2937. Zheng, J.M. and Gao, W.Zh., Color image encryption algorithm based on chaotic map, Comp. Eng. Des., 2011, vol. 32, no. 9, pp. 2934–2937.
6.
go back to reference Menon, A.S. and Sarila, K.S., Image encryption based on chaotic algorithms: An overview, Int. J. Sci., Eng. Technol. Res., 2013, vol. 2, no. 6, pp. 1328–1332. Menon, A.S. and Sarila, K.S., Image encryption based on chaotic algorithms: An overview, Int. J. Sci., Eng. Technol. Res., 2013, vol. 2, no. 6, pp. 1328–1332.
24.
go back to reference Dagadu, J.C., Li, J.-P., Shah, F., Mustafa, N., and Kumar, K., DWT based encryption technique for medical images, Proc. 2016 13th Int. Computer Conf. on Wavelet Active Media Technology and Information Processing (ICCWAMTIP), Chengdu, China, 2016, IEEE, 2016, pp. 252–255. https://doi.org/10.1109/ICCWAMTIP.2016.8079849 Dagadu, J.C., Li, J.-P., Shah, F., Mustafa, N., and Kumar, K., DWT based encryption technique for medical images, Proc. 2016 13th Int. Computer Conf. on Wavelet Active Media Technology and Information Processing (ICCWAMTIP), Chengdu, China, 2016, IEEE, 2016, pp. 252–255. https://​doi.​org/​10.​1109/​ICCWAMTIP.​2016.​8079849
25.
go back to reference Slimane, N.B., Bouallegue, K., and Machhout, M., Nested chaotic image encryption scheme using two-diffusion process and the secure hash algorithm SHA-1, 2016 4th Int. Conf. on Control Engineering & Information Technology (CEIT), Hammamet, Tunisia, 2016, IEEE, 2016, pp. 1–5. https://doi.org/10.1109/ceit.2016.7929089 Slimane, N.B., Bouallegue, K., and Machhout, M., Nested chaotic image encryption scheme using two-diffusion process and the secure hash algorithm SHA-1, 2016 4th Int. Conf. on Control Engineering & Information Technology (CEIT), Hammamet, Tunisia, 2016, IEEE, 2016, pp. 1–5. https://​doi.​org/​10.​1109/​ceit.​2016.​7929089
32.
go back to reference Yu, X., Huang, F., and Feng, Yo., A symmetric image encryption scheme based on a simple novel two-dimensional map, Int. J. Innovative Comput., Inf. Control, 2010, vol. 3, no. 6B, pp. 1593–1602. Yu, X., Huang, F., and Feng, Yo., A symmetric image encryption scheme based on a simple novel two-dimensional map, Int. J. Innovative Comput., Inf. Control, 2010, vol. 3, no. 6B, pp. 1593–1602.
Metadata
Title
A Bit-Level Three-Dimensional Rectangular Image Encryption Algorithm Using New Chaotic Maps
Authors
Zhenhui Li
Zhouli He
Feng Huang
Renyuan Jia
Publication date
01-08-2023
Publisher
Pleiades Publishing
Published in
Automatic Control and Computer Sciences / Issue 4/2023
Print ISSN: 0146-4116
Electronic ISSN: 1558-108X
DOI
https://doi.org/10.3103/S0146411623040053

Other articles of this Issue 4/2023

Automatic Control and Computer Sciences 4/2023 Go to the issue