Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2014, Article ID 490179, 9 pages
http://dx.doi.org/10.1155/2014/490179
Research Article

Chaotic Image Encryption Based on Running-Key Related to Plaintext

1Electronic & Information Engineering College, Liaoning University of Technology, Jinzhou 121001, China
2School of Computer Science and Technology, Beihang University, Beijing 100191, China

Received 3 December 2013; Accepted 12 January 2014; Published 23 February 2014

Academic Editors: K. Lui and U. R. Tuzkaya

Copyright © 2014 Cao Guanghui et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. X. Wei, L. Guo, Q. Zhang, J. Zhang, and S. Lian, “A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system,” The Journal of Systems and Software, vol. 85, no. 2, pp. 290–299, 2012. View at Publisher · View at Google Scholar · View at Scopus
  2. T. Xiang, K.-W. Wong, and X. Liao, “Selective image encryption using a spatiotemporal chaotic system,” Chaos, vol. 17, no. 2, Article ID 023115, 12 pages, 2007. View at Publisher · View at Google Scholar · View at Scopus
  3. J. Fridrich, “Symmetric ciphers based on two-dimensional chaotic maps,” International Journal of Bifurcation and Chaos, vol. 8, no. 6, pp. 1259–1284, 1998. View at Google Scholar · View at Scopus
  4. G. Chen, Y. Mao, and C. K. Chui, “A symmetric image encryption scheme based on 3D chaotic cat maps,” Chaos, Solitons & Fractals, vol. 21, no. 3, pp. 749–761, 2004. View at Publisher · View at Google Scholar · View at Scopus
  5. Y. Mao, G. Chen, and S. Lian, “A novel fast image encryption scheme based on 3D chaotic baker maps,” International Journal of Bifurcation and Chaos, vol. 14, no. 10, pp. 3613–3624, 2004. View at Publisher · View at Google Scholar · View at Scopus
  6. J. Shen, X. Jin, and C. Zhou, “A color image encryption algorithm based on magic cube transformation and modular arithmetic operation,” in Advances in Multimedia Information Processing, vol. 3768 of Lecture Notes in Computer Science, pp. 270–280, Springer, 2005. View at Google Scholar · View at Scopus
  7. X. He, Q. Zhu, and P. Gu, “A new chaos-based encryption method for color image,” in Rough Sets and Knowledge Technology, vol. 4062 of Lecture Notes in Computer Science, pp. 671–678, Springer, 2006. View at Google Scholar · View at Scopus
  8. C. Li and G. Chen, “On the security of a class of image encryption schemes,” in Proceedings of the IEEE International Symposium on Circuits and Systems (ISCAS '08), pp. 3290–3293, Seattle, Wash, USA, May 2008. View at Publisher · View at Google Scholar · View at Scopus
  9. G. Alvarez and S. Li, “Some basic cryptographic requirements for chaos-based cryptosystems,” International Journal of Bifurcation and Chaos, vol. 16, no. 8, pp. 2129–2151, 2006. View at Publisher · View at Google Scholar · View at Scopus
  10. E. Solak, C. Çokal, O. T. Yildiz, and T. Biyikoǧlu, “Cryptanalysis of fridrich's chaotic image encryption,” International Journal of Bifurcation and Chaos, vol. 20, no. 5, pp. 1405–1413, 2010. View at Publisher · View at Google Scholar · View at Scopus
  11. C. Zhu and K. Sun, “Chaotic image encryption algorithm by correlating keys with plaintext,” China Communications, vol. 9, no. 1, pp. 73–79, 2012. View at Google Scholar · View at Scopus
  12. X. Zhang, G. Zhu, and S. Ma, “Remote-sensing image encryption in hybrid domains,” Optics Communications, vol. 285, no. 7, pp. 1736–1743, 2012. View at Publisher · View at Google Scholar · View at Scopus
  13. H. Liu and X. Wang, “Triple-image encryption scheme based on one-time key stream generated by chaos and plain images,” Journal of Systems and Software, vol. 86, no. 3, pp. 826–834, 2013. View at Google Scholar
  14. A. Kanso and M. Ghebleh, “A novel image encryption algorithm based on a 3D chaotic map,” Communications in Nonlinear Science and Numerical Simulation, vol. 17, no. 7, pp. 2943–2959, 2012. View at Publisher · View at Google Scholar · View at Scopus
  15. L.-Y. Sheng, Y.-Y. Xiao, and Z. Sheng, “A universal algorithm for transforming chaotic sequences into uniform pseudo-random sequences,” Acta Physica Sinica, vol. 57, no. 7, pp. 4007–4013, 2008. View at Google Scholar · View at Scopus
  16. F. Zheng, X.-J. Tian, J.-Y. Song, and X.-Y. Li, “Pseudo-random sequence generator based on the generalized Henon map,” The Journal of China Universities of Posts and Telecommunications, vol. 15, no. 3, pp. 64–68, 2008. View at Publisher · View at Google Scholar · View at Scopus
  17. S. Li, G. Chen, and X. Mou, “On the dynamical degradation of digital piecewise linear chaotic maps,” International Journal of Bifurcation and Chaos, vol. 15, no. 10, pp. 3119–3151, 2005. View at Publisher · View at Google Scholar · View at Scopus
  18. S.-B. Liu, J. Sun, Z.-Q. Xu, and J.-S. Liu, “Digital chaotic sequence generator based on coupled chaotic systems,” Chinese Physics B, vol. 18, no. 12, pp. 5219–5227, 2009. View at Publisher · View at Google Scholar · View at Scopus
  19. F. Takens, “On the numerical determination of the dimension of an attractor,” in Dynamical System and Turbulence, vol. 898 of Lecture Notes in Mathematics, pp. 230–241, Springer, 1981. View at Google Scholar
  20. C. Shannon, “Communication theory of secrecy systems,” Bell System Technical Journal, vol. 28, no. 4, pp. 656–715, 1949. View at Google Scholar
  21. R. Shaltiel, “Recent developments in explicit constructions of extractors,” Bulletin of the EATCS, vol. 77, pp. 67–95, 2002. View at Google Scholar
  22. G. Zhang and Q. Liu, “A novel image encryption method based on total shuffling scheme,” Optics Communications, vol. 284, no. 12, pp. 2775–2780, 2011. View at Publisher · View at Google Scholar · View at Scopus