Table of Contents Author Guidelines Submit a Manuscript
Advances in Multimedia
Volume 2014, Article ID 409586, 15 pages
http://dx.doi.org/10.1155/2014/409586
Research Article

A New One-Dimensional Chaotic Map and Its Use in a Novel Real-Time Image Encryption Scheme

1Faculty of Computer Science, Titu Maiorescu University, 040051 Bucharest, Romania
2IT & C Department, University of South-East Europe Lumina, 021187 Bucharest, Romania

Received 15 January 2014; Revised 16 April 2014; Accepted 27 April 2014; Published 2 June 2014

Academic Editor: Stefanos Kollias

Copyright © 2014 Radu Boriga et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. A. Cheddad, J. Condell, K. Curran, and P. McKevitt, “A hash-based image encryption algorithm,” Optics Communications, vol. 283, no. 6, pp. 879–893, 2010. View at Publisher · View at Google Scholar · View at Scopus
  2. F. Riaz, S. Hameed, I. Shafi, R. Kausar, and A. Ahmed, “Enhanced image encryption techniques using modified advanced encryption standard,” Communications in Computer and Information Science, vol. 281, pp. 385–396, 2012. View at Publisher · View at Google Scholar · View at Scopus
  3. S. Dey, “SD-AEI: an advanced encryption technique for images: an advanced combined encryption technique for encrypting images using randomized byte manipulation,” in Proceedings of the 2nd International Conference on Digital Information Processing and Communications (ICDIPC '12), pp. 68–73, Klaipeda, Lithuania, July 2012. View at Publisher · View at Google Scholar · View at Scopus
  4. S. M. Seyedzade, R. E. Atani, and S. Mirzakuchaki, “A novel image encryption algorithm based on hash function,” in Proceedings of the 6th International Conference on Machine Vision and Image Processing (MVIP '10), pp. 1–6, Isfahan, Iran, October 2010. View at Publisher · View at Google Scholar · View at Scopus
  5. V. M. Silva-García, R. Flores-Carapia, and C. Rentería-Márquez, “Triple-DES block of 96 bits: an application to colour image encryption,” Applied Mathematical Sciences, vol. 7, no. 21-24, pp. 1143–1155, 2013. View at Google Scholar · View at Scopus
  6. N. K. Pareek, V. Patidar, and K. K. Sud, “Image encryption using chaotic logistic map,” Image and Vision Computing, vol. 24, no. 9, pp. 926–934, 2006. View at Publisher · View at Google Scholar · View at Scopus
  7. K.-W. Wong, B. S.-H. Kwok, and W.-S. Law, “A fast image encryption scheme based on chaotic standard map,” Physics Letters A, vol. 372, no. 15, pp. 2645–2652, 2008. View at Publisher · View at Google Scholar · View at Scopus
  8. H. Yang, X. Liao, K.-W. Wong, W. Zhang, and P. Wei, “A new cryptosystem based on chaotic map and operations algebraic,” Chaos, Solitons and Fractals, vol. 40, no. 5, pp. 2520–2531, 2009. View at Publisher · View at Google Scholar · View at Scopus
  9. G. Chen, Y. Mao, and C. K. Chui, “A symmetric image encryption scheme based on 3D chaotic cat maps,” Chaos, Solitons and Fractals, vol. 21, no. 3, pp. 749–761, 2004. View at Publisher · View at Google Scholar · View at Scopus
  10. T. Gao and Z. Chen, “A new image encryption algorithm based on hyper-chaos,” Physics Letters A, vol. 372, no. 4, pp. 394–400, 2008. View at Publisher · View at Google Scholar · View at Scopus
  11. A.-V. Diaconu and K. Loukhaoukha, “An improved secure image encryption algorithm based on rubik's cube principle and digital chaotic cipher,” Mathematical Problems in Engineering, vol. 2013, Article ID 848392, 10 pages, 2013. View at Publisher · View at Google Scholar · View at Scopus
  12. O. Mirzaei, M. Yaghoobi, and H. Irani, “A new image encryption method: parallel sub-image encryption with hyper chaos,” Nonlinear Dynamics, vol. 67, no. 1, pp. 557–566, 2012. View at Publisher · View at Google Scholar · View at Scopus
  13. C. K. Huang, C. W. Liao, S. L. Hsu, and Y. C. Jeng, “Implementation of gray image encryption with pixel shuffling and gray-level encryption by single chaotic system,” Telecommunication Systems, vol. 52, no. 2, pp. 563–571, 2013. View at Publisher · View at Google Scholar · View at Scopus
  14. G. Ye and K.-W. Wong, “An efficient chaotic image encryption algorithm based on a generalized arnold map,” Nonlinear Dynamics, vol. 69, no. 4, pp. 2079–2087, 2012. View at Publisher · View at Google Scholar · View at Scopus
  15. G. Ye and K.-W. Wong, “An image encryption scheme based on time-delay and hyperchaotic system,” Nonlinear Dynamics, vol. 71, no. 1-2, pp. 259–267, 2013. View at Publisher · View at Google Scholar · View at Scopus
  16. X. Tong and M. Cui, “Feedback image encryption algorithm with compound chaotic stream cipher based on perturbation,” Science in China F: Information Sciences, vol. 53, no. 1, pp. 191–202, 2010. View at Publisher · View at Google Scholar · View at Scopus
  17. Z.-X. Zhang and T. Cao, “A chaos-based image encryption scheme with confusion-diffusion architecture,” Communications in Computer and Information Science, vol. 152, no. 1, pp. 258–263, 2011. View at Publisher · View at Google Scholar · View at Scopus
  18. A. J. Menezes, P. C. Oorschot, and S. A. Vanstone, Handbook of Applied Cryptography, CRC Press, 1997.
  19. D. Arroyo, G. Alvarez, S. Li, C. Li, and J. Nunez, “Cryptanalysis of a discrete-time synchronous chaotic encryption system,” Physics Letters A, vol. 372, no. 7, pp. 1034–1039, 2008. View at Publisher · View at Google Scholar · View at Scopus
  20. C. Li, L. Y. Zhang, R. Ou, K.-W. Wong, and S. Shu, “Breaking a novel colour image encryption algorithm based on chaos,” Nonlinear Dynamics, vol. 70, no. 4, pp. 2383–2388, 2012. View at Publisher · View at Google Scholar · View at Scopus
  21. F. Huang and Y. Feng, “Security analysis of image encryption based on twodimensional chaotic maps and improved algorithm,” Frontiers of Electrical and Electronic Engineering in China, vol. 4, no. 1, pp. 5–9, 2009. View at Publisher · View at Google Scholar · View at Scopus
  22. J. Wang, G. Jiang, and B. Lin, “Cryptanalysis of an image encryption scheme with a pseudorandom permutation and its improved version,” Journal of Electronics, vol. 29, no. 1-2, pp. 82–93, 2012. View at Publisher · View at Google Scholar · View at Scopus
  23. R. Rhouma and S. Belghith, “Cryptanalysis of a new image encryption algorithm based on hyper-chaos,” Physics Letters A: General, Atomic and Solid State Physics, vol. 372, no. 38, pp. 5973–5978, 2008. View at Publisher · View at Google Scholar · View at Scopus
  24. G. Álvarez, F. Montoya, M. Romera, and G. Pastor, “Cryptanalysis of an ergodic chaotic cipher,” Physics Letters A: General, Atomic and Solid State Physics, vol. 311, no. 2-3, pp. 172–179, 2003. View at Publisher · View at Google Scholar · View at Scopus
  25. D. Arroyo, J. M. Amigoy, S. Li, and G. Alvarez, “On the inadequacy of unimodal maps for cryptographic applications,” in XI Reunion Espanola sobre Criptologia y Seguridad de la Informacion (XI RECSI), pp. 37–42, Universitat Rovira i Virgili, Tarragona, Spain, 2010.
  26. A. C. Dăscălescu, R. E. Boriga, and A. V. Diaconu, “Study of a new chaotic dynamical system and its usage in a novel pseudorandom bit generator,” Mathematical Problems in Engineering, vol. 2013, Article ID 769108, 10 pages, 2013. View at Publisher · View at Google Scholar
  27. C. Li, S. Li, G. Alvarez, G. Chen, and K.-T. Lo, “Cryptanalysis of two chaotic encryption schemes based on circular bit shift and XOR operations,” Physics Letters A: General, Atomic and Solid State Physics, vol. 369, no. 1-2, pp. 23–30, 2007. View at Publisher · View at Google Scholar · View at Scopus
  28. V. Patidar, K. K. Sud, and N. K. Pareek, “A pseudo random bit generator based on chaotic logistic map and its statistical testing,” Informatica, vol. 33, no. 4, pp. 441–452, 2009. View at Google Scholar · View at Scopus
  29. M. Hénon, “A two-dimensional mapping with a strange attractor,” Communications in Mathematical Physics, vol. 50, no. 1, pp. 69–77, 1976. View at Publisher · View at Google Scholar · View at Scopus
  30. S. Grossmann and S. Thomae, “Invariant distributions and stationary correlation functions of one-dimensional discrete processes,” Zeitschrift fur Naturforschung, vol. 32, pp. 1353–1363, 1977. View at Google Scholar
  31. K. T. Alligood, T. D. Sauer, and J. A. Yorke, Chaos: An Introduction to Dynamical Systems, Springer, 1st edition, 1996.
  32. M. T. Rosenstein, J. J. Collins, and C. J. De Luca, “A practical method for calculating largest Lyapunov exponents from small data sets,” Physica D: Nonlinear Phenomena, vol. 65, no. 1-2, pp. 117–134, 1993. View at Publisher · View at Google Scholar · View at Scopus
  33. H. G. Schuster, Deterministic Chaos: An Introduction, Wiley-VCH, 3rd edition, 1995.
  34. J. Fridrich, “Symmetric ciphers based on two-dimensional chaotic maps,” International Journal of Bifurcation and Chaos in Applied Sciences and Engineering, vol. 8, no. 6, pp. 1259–1284, 1998. View at Google Scholar · View at Scopus
  35. A. Wolf, J. B. Swift, H. L. Swinney, and J. A. Vastano, “Determining Lyapunov exponents from a time series,” Physica D: Nonlinear Phenomena, vol. 16, no. 3, pp. 285–317, 1985. View at Google Scholar · View at Scopus
  36. P. Grassberger and I. Procaccia, “Measuring the strangeness of strange attractors,” Physica D: Nonlinear Phenomena, vol. 9, no. 1-2, pp. 189–208, 1983. View at Google Scholar · View at Scopus
  37. J. D. Farmer, E. Ott, and J. A. Yorke, “The dimension of chaotic attractors,” Physica D: Nonlinear Phenomena, vol. 7, no. 1–3, pp. 153–180, 1983. View at Google Scholar · View at Scopus
  38. J. Theiler, “Estimating fractal dimension,” Journal of the Optical Society of America A, no. 7, pp. 1055–1079, 1990. View at Google Scholar
  39. L. I. Shujun, G. Chen, and X. Mou, “On the dynamical degradation of digital piecewise linear chaotic maps,” International Journal of Bifurcation and Chaos in Applied Sciences and Engineering, vol. 15, no. 10, pp. 3119–3151, 2005. View at Publisher · View at Google Scholar · View at Scopus
  40. A. Luca, A. Vlad, B. Badea, and M. Frunzete, “A study on statistical independence in the tent map,” in Proceedings of the International Symposium on Signals, Circuits and Systems (ISSCS '09), pp. 1–4, Iași, Romania, July 2009. View at Publisher · View at Google Scholar · View at Scopus
  41. A. Rukhin, J. Soto, J. Nechvatal et al., “A statistical test suite for the validation of random number generators and pseudo random number generators for cryptographic applications,” NIST Special Publication 800-22, 2010. View at Google Scholar
  42. http://www.stat.fsu.edu/pub/diehard/.
  43. A. C. Dăscălescu and R. E. Boriga, “A novel fast chaos-based algorithm for generating random permutations with high shift factor suitable for image scrambling,” Nonlinear Dynamics, vol. 74, no. 1-2, pp. 307–318, 2013. View at Publisher · View at Google Scholar
  44. USC-SIPI Image Database, University of South California, Signal and Image Processing Institute, http://sipi.usc.edu/database/database.php.
  45. Kodak Digital Camera Sample Pictures, Kodak, http://www.kodak.com/digitalImages/samples/samples.shtml.
  46. C. E. Shannon, “Communication theory of secrecy systems,” The Bell System Technical Journal, vol. 28, no. 4, pp. 656–715, 1949. View at Publisher · View at Google Scholar
  47. D. R. Cox and C. A. Donnelly, Principles of Applied Statistics, Cambridge University Press, 2011.
  48. H. Gao, Y. Zhang, S. Liang, and D. Li, “A new chaotic algorithm for image encryption,” Chaos, Solitons and Fractals, vol. 29, no. 2, pp. 393–399, 2006. View at Publisher · View at Google Scholar · View at Scopus
  49. H. S. Kwok and W. K. S. Tang, “A fast image encryption system based on chaotic maps with finite precision representation,” Chaos, Solitons and Fractals, vol. 32, no. 4, pp. 1518–1529, 2007. View at Publisher · View at Google Scholar · View at Scopus
  50. B. Stoyanov and K. Kordov, “Novel image encryption scheme based on Chebyshev polynomial and Duffing map,” The Scientific World Journal, vol. 2014, Article ID 283639, 11 pages, 2014. View at Publisher · View at Google Scholar
  51. N. K. Pareek, V. Patidar, and K. K. Sud, “Substitution-diffusion based Image Cipher,” International Journal of Network Security and Its Applications (IJNSA), vol. 3, no. 2, pp. 149–160, 2011. View at Publisher · View at Google Scholar
  52. M. Ghebleh, A. Kanso, and H. Noura, “An image encryption scheme based on irregularly decimated chaotic maps,” Signal Processing: Image Communication, vol. 29, no. 5, pp. 618–627, 2014. View at Publisher · View at Google Scholar