Table of Contents Author Guidelines Submit a Manuscript
Journal of Electrical and Computer Engineering
Volume 2017, Article ID 8672716, 10 pages
https://doi.org/10.1155/2017/8672716
Research Article

Image Encryption Algorithm Based on a Novel Improper Fractional-Order Attractor and a Wavelet Function Map

1Department of Information Engineering, Henan Polytechnic, Zhengzhou, China
2Department of Minzu, Huanghe Science and Technology College, Zhengzhou, China
3Department of Mathematics and Physics, Zhengzhou Institute of Aeronautical Industry Management, Zhengzhou 450015, China

Correspondence should be addressed to Shu-ying Wang; moc.621@7070ysw

Received 12 November 2016; Revised 21 January 2017; Accepted 8 February 2017; Published 22 March 2017

Academic Editor: Jucheng Yang

Copyright © 2017 Jian-feng Zhao et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. B. Schneier, Applied Cryptography: Protocols, Algorithms, and Source Code in C, John Wiley & Sons, New York, NY, USA, 2nd edition, 1996.
  2. J. Daemen and V. Rijmen, The Design of Rijndael: AES-The Advanced Encryption Standard, Springer, Berlin, Germany, 2002. View at Publisher · View at Google Scholar · View at MathSciNet
  3. L. Kocarev, G. Jakimoski, T. Stojanovski, and U. Parlitz, “From chaotic maps to encryption schemes,” in Proceedings of the IEEE International Symposium on Circuits and Systems (ISCAS '98), pp. 514–517, IEEE, Monterey, Calif, USA, June 1998. View at Scopus
  4. C. E. Shannon, “Communication theory of secrecy systems,” The Bell System Technical Journal, vol. 28, no. 4, pp. 656–715, 1949. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  5. N. K. Pareek, V. Patidar, and K. K. Sud, “Discrete chaotic cryptography using external key,” Physics Letters. A, vol. 309, no. 1-2, pp. 75–82, 2003. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet · View at Scopus
  6. X. Wang and L. Teng, “An image blocks encryption algorithm based on spatiotemporal chaos,” Nonlinear Dynamics. An International Journal of Nonlinear Dynamics and Chaos in Engineering Systems, vol. 67, no. 1, pp. 365–371, 2012. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  7. S. Behnia, A. Akhshani, H. Mahmodi, and A. Akhavan, “A novel algorithm for image encryption based on mixture of chaotic maps,” Chaos, Solitons & Fractals, vol. 35, no. 2, pp. 408–419, 2008. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet · View at Scopus
  8. D. Xiao, X. Liao, and P. Wei, “Analysis and improvement of a chaos-based image encryption algorithm,” Chaos, Solitons & Fractals, vol. 40, no. 5, pp. 2191–2199, 2009. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  9. X.-Y. Wang and X.-M. Bao, “A novel block cryptosystem based on the coupled chaotic map lattice,” Nonlinear Dynamics, vol. 72, no. 4, pp. 707–715, 2013. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  10. G. Jakimoski and L. C. Kocarev, “Analysis of some recently proposed chaos-based encryption algorithms,” Physics Letters. A, vol. 291, no. 6, pp. 381–384, 2001. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  11. S. Behnia, A. Akhshani, H. Mahmodi, and A. Akhavan, “A novel algorithm for image encryption based on mixture of chaotic maps,” Chaos, Solitons & Fractals, vol. 35, no. 2, pp. 408–419, 2008. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  12. O. Mirzaei, M. Yaghoobi, and H. Irani, “A new image encryption method: parallel sub-image encryption with hyper chaos,” Nonlinear Dynamics, vol. 67, no. 1, pp. 557–566, 2012. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  13. Y. Wang, K.-W. Wong, X. F. Liao, and G. R. Chen, “A new chaos-based fast image encryption algorithm,” Applied Soft Computing, vol. 11, no. 1, pp. 514–522, 2011. View at Publisher · View at Google Scholar · View at Scopus
  14. A. I. Ismail, A. Mohammed, and D. Hossam, “A digital image encryption algorithm based a composition of two chaotic Wavelet function map,” International Journal of Network Security, vol. 11, no. 1, pp. 1–10, 2010. View at Google Scholar
  15. R. Rhouma and S. Belghith, “Cryptanalysis of a new image encryption algorithm based on hyper-chaos,” Physics Letters, Section A: General, Atomic and Solid State Physics, vol. 372, no. 38, pp. 5973–5978, 2008. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at Scopus
  16. X.-F. Li, K. E. Chlouverakis, and D.-L. Xu, “Nonlinear dynamics and circuit realization of a new chaotic flow: a variant of Lorenz, Chen and Lü,” Nonlinear Analysis. Real World Applications. An International Multidisciplinary Journal, vol. 10, no. 4, pp. 2357–2368, 2009. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  17. J. F. Zhao, S. Y. Wang, Y. X. Chang, and X. F. Li, “A novel image encryption scheme based on an improper fractional-order chaotic system,” Nonlinear Dynamics, vol. 80, no. 4, pp. 1721–1729, 2015. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  18. X. Wu, H. Wang, and H. Lu, “Modified generalized projective synchronization of a new fractional-order hyperchaotic system and its application to secure communication,” Nonlinear Analysis. Real World Applications, vol. 13, no. 3, pp. 1441–1450, 2012. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  19. O. Mannai, R. Bechikh, H. Hermassi, R. Rhouma, and S. Belghith, “A new image encryption scheme based on a simple first-order time-delay system with appropriate nonlinearity,” Nonlinear Dynamics, vol. 82, no. 1-2, pp. 107–117, 2015. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  20. Q. Liu, P.-Y. Li, M.-C. Zhang, Y.-X. Sui, and H.-J. Yang, “A novel image encryption algorithm based on chaos maps with Markov properties,” Communications in Nonlinear Science and Numerical Simulation, vol. 20, no. 2, pp. 506–515, 2015. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at Scopus
  21. W.-B. Yu and X.-P. Wei, “Bifurcation diagram of a wavelet function,” Acta Physica Sinica, vol. 55, no. 8, pp. 3969–3973, 2006. View at Google Scholar · View at Scopus