Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2014, Article ID 536930, 21 pages
http://dx.doi.org/10.1155/2014/536930
Research Article

A Chaotic Cryptosystem for Images Based on Henon and Arnold Cat Map

1Software Technology and Management Center (Softam), Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia, 43600 Bangi, Selangor, Malaysia
2Center for Artificial Intelligence Technology (CAIT), Faculty of Information Science and Technology, Universiti Kebangsaan Malaysia, 43600 Bangi, Selangor, Malaysia

Received 30 April 2014; Accepted 15 July 2014; Published 28 August 2014

Academic Editor: Iftikhar Ahmad

Copyright © 2014 Ali Soleymani et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. A. Soleymani, Z. Ali, and M. Nordin, “A survey on principal aspects of secure image transmission,” in Proceedings of World Academy of Science, Engineering and Technology, pp. 247–254, 2012.
  2. P. P. Dang and P. M. Chau, “Image encryption for secure internet multimedia applications,” IEEE Transactions on Consumer Electronics, vol. 46, no. 3, pp. 395–403, 2000. View at Publisher · View at Google Scholar · View at Scopus
  3. P. P. Dang and P. M. Chau, “Implementation IDEA algorithm for image encryption,” in Mathematics and Applications of Data/Image Coding, Compression, and Encryption III, vol. 4122 of Proceedings of SPIE, pp. 1–9, August 2000. View at Publisher · View at Google Scholar · View at Scopus
  4. B. Furht, E. Muharemagic, and D. Socek, Multimedia Encryption and Watermarking, vol. 28 of Multimedia Systems and Applications, Springer, 2006.
  5. B. Subramanyan, V. M. Chhabria, and T. G. Sankar Babu, “Image encryption based on AES key expansion,” in Proceedings of the 2nd International Conference on Emerging Applications of Information Technology (EAIT '11), pp. 217–220, Kolkata, India, February 2011. View at Publisher · View at Google Scholar · View at Scopus
  6. E. Lorenz, Predictability: Does the Flap of a Butterfly’s Wings in Brazil Set Off a Tornado in Texas, American Association for the Advancement of Science, 1972.
  7. M. G. Signorini and M. Ferrario, “Nonlinear analysis of experimental time series,” in Advanced Methods of Biomedical Signal Processing, pp. 347–378, John Wiley & Sons, New York, NY, USA, 2011. View at Google Scholar
  8. L. Shujun, M. Xuanqin, and C. Yuanlong, “Pseudo-random bit generator based on couple chaotic systems and its applications in stream-cipher cryptography,” in Progress in Cryptology — INDOCRYPT 2001, vol. 2247 of Lecture Notes in Computer Science, pp. 316–329, 2001. View at Google Scholar
  9. Z. Zhu, W. Zhang, K. Wong, and H. Yu, “A chaos-based symmetric image encryption scheme using a bit-level permutation,” Information Sciences, vol. 181, no. 6, pp. 1171–1186, 2011. View at Publisher · View at Google Scholar · View at Scopus
  10. S.-J. Xu, X.-B. Chen, R. Zhang, Y.-X. Yang, and Y.-C. Guo, “An improved chaotic cryptosystem based on circular bit shift and XOR operations,” Physics Letters A, vol. 376, no. 10-11, pp. 1003–1010, 2012. View at Publisher · View at Google Scholar · View at Scopus
  11. Z. Zhang and T. Cao, “A chaos-based image encryption scheme with confusion- diffusion architecture,” Communications in Computer and Information Science, vol. 152, no. 1, pp. 258–263, 2011. View at Publisher · View at Google Scholar · View at Scopus
  12. C. Fu, B. Lin, Y. Miao, X. Liu, and J. Chen, “A novel chaos-based bit-level permutation scheme for digital image encryption,” Optics Communications, vol. 284, no. 23, pp. 5415–5423, 2011. View at Publisher · View at Google Scholar · View at Scopus
  13. Y. Zhang, P. Xu, and L. Xiang, “Research of image encryption algorithm based on chaotic magic square,” Advances in Intelligent and Soft Computing, vol. 149, no. 2, pp. 103–109, 2012. View at Publisher · View at Google Scholar · View at Scopus
  14. M. Ghebleh, A. Kanso, and H. Noura, “An image encryption scheme based on irregularly decimated chaotic maps,” Signal Processing: Image Communication, vol. 29, no. 5, pp. 618–627, 2014. View at Publisher · View at Google Scholar
  15. A. M. Elshamy, A. N. Z. Rashed, A. E. A. Mohamed et al., “Optical image encryption based on chaotic baker map and double random phase encoding,” Journal of Lightwave Technology, vol. 31, no. 15, pp. 2533–2539, 2013. View at Publisher · View at Google Scholar · View at Scopus
  16. R. Ye and W. Zhou, “An image encryption scheme based on 2D tent map and coupled map lattice,” International Journal of Information and Communication Technology Research, vol. 1, pp. 344–348, 2011. View at Google Scholar
  17. R. Ye and W. Zhou, “A chaos-based image encryption scheme using 3D skew tent map and coupled map lattice,” International Journal of Computer Network and Information Security, vol. 4, pp. 38–44, 2012. View at Google Scholar
  18. X. Wang, F. Chen, and T. Wang, “A new compound mode of confusion and diffusion for block encryption of image based on chaos,” Communications in Nonlinear Science and Numerical Simulation, vol. 15, no. 9, pp. 2479–2485, 2010. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet · View at Scopus
  19. S. Al-Maadeed, A. Al-Ali, and T. Abdalla, “A new chaos-based image-encryption and compression algorithm,” Journal of Electrical and Computer Engineering, vol. 2012, Article ID 179693, 11 pages, 2012. View at Publisher · View at Google Scholar · View at MathSciNet
  20. V. Patidar, N. K. Pareek, and K. K. Sud, “A new substitution-diffusion based image cipher using chaotic standard and logistic maps,” Communications in Nonlinear Science and Numerical Simulation, vol. 14, no. 7, pp. 3056–3075, 2009. View at Publisher · View at Google Scholar · View at Scopus
  21. K. Wong, B. S. Kwok, and W. Law, “A fast image encryption scheme based on chaotic standard map,” Physics Letters, Section A: General, Atomic and Solid State Physics, vol. 372, no. 15, pp. 2645–2652, 2008. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at Scopus
  22. C. Guanghuia, H. Kai, Z. Yizhi, Z. Jun, and Z. Xing, “Chaotic image encryption based on running-key related to plaintext,” The Scientific World Journal, vol. 2014, Article ID 490179, 9 pages, 2014. View at Publisher · View at Google Scholar
  23. Q. Zhang, X. Xue, and X. Wei, “A novel image encryption algorithm based on DNA subsequence operation,” The Scientific World Journal, vol. 2012, Article ID 286741, 10 pages, 2012. View at Publisher · View at Google Scholar · View at Scopus
  24. H. Liu, Z. Zhu, H. Jiang, and B. Wang, “A novel image encryption algorithm based on improved 3D chaotic cat map,” in Proceedings of the 9th International Conference for Young Computer Scientists (ICYCS '08), pp. 3016–3021, November 2008. View at Publisher · View at Google Scholar · View at Scopus
  25. K. Wong, “Image Encryption Using Chaotic Maps,” 2009.
  26. C. Zhu, “A novel image encryption scheme based on improved hyperchaotic sequences,” Optics Communications, vol. 285, no. 1, pp. 29–37, 2012. View at Publisher · View at Google Scholar · View at Scopus
  27. J. S. A. Fouda, J. Y. Effa, S. L. Sabat, and M. Ali, “A fast chaotic block cipher for image encryption,” Communications in Nonlinear Science and Numerical Simulation, vol. 19, no. 3, pp. 578–588, 2014. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  28. J. Chen, Z. Zhu, C. Fu, H. Yu, and L. Zhang, “A fast chaos-based image encryption scheme with a dynamic state variables selection mechanism,” Communications in Nonlinear Science and Numerical Simulation, 2014. View at Publisher · View at Google Scholar
  29. R. Matthews, “On the derivation of a “chaotic” encryption algorithm,” Cryptologia, vol. 13, no. 1, pp. 29–42, 1989. View at Publisher · View at Google Scholar · View at MathSciNet
  30. X. Wang, L. Teng, and X. Qin, “A novel colour image encryption algorithm based on chaos,” Signal Processing, vol. 92, no. 4, pp. 1101–1108, 2012. View at Publisher · View at Google Scholar · View at Scopus
  31. C. Li, L. Y. Zhang, R. Ou, K.-W. Wong, and S. Shu, “Breaking a novel colour image encryption algorithm based on chaos,” Nonlinear Dynamics. An International Journal of Nonlinear Dynamics and Chaos in Engineering Systems, vol. 70, no. 4, pp. 2383–2388, 2012. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  32. C. Li, Y. Liu, T. Xie, and M. Z. Q. Chen, “Breaking a novel image encryption scheme based on improved hyperchaotic sequences,” Nonlinear Dynamics. An International Journal of Nonlinear Dynamics and Chaos in Engineering Systems, vol. 73, no. 3, pp. 2083–2089, 2013. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet · View at Scopus
  33. X. Wang, L. Yang, R. Liu, and A. Kadir, “A chaotic image encryption algorithm based on perceptron model,” Nonlinear Dynamics, vol. 62, no. 3, pp. 615–621, 2010. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at Scopus
  34. Y. Zhang, C. Li, Q. Li, and D. Zhang, “Breaking a chaotic image encryption algorithm based on perceptron model,” Nonlinear Dynamics, vol. 69, no. 3, pp. 1091–1096, 2012. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  35. G. Alvarez and S. Li, “Some basic cryptographic requirements for chaos-based cryptosystems,” International Journal of Bifurcation and Chaos in Applied Sciences and Engineering, vol. 16, no. 8, pp. 2129–2151, 2006. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet · View at Scopus
  36. G. Alvarez and S. Li, “Breaking an encryption scheme based on chaotic baker map,” Physics Letters A, vol. 352, no. 1-2, pp. 78–82, 2006. View at Publisher · View at Google Scholar · View at Scopus
  37. R. F. Machado, M. S. Baptista, and C. Grebogi, “Cryptography with chaos at the physical level,” Chaos, Solitons and Fractals, vol. 21, no. 5, pp. 1265–1269, 2004. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at Scopus
  38. G. Alvarez and S. Li, “Cryptanalyzing a nonlinear chaotic algorithm (NCA) for image encryption,” Communications in Nonlinear Science and Numerical Simulation, vol. 14, no. 11, pp. 3743–3749, 2009. View at Publisher · View at Google Scholar · View at Scopus
  39. H. Gao, Y. Zhang, S. Liang, and D. Li, “A new chaotic algorithm for image encryption,” Chaos, Solitons and Fractals, vol. 29, no. 2, pp. 393–399, 2006. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at Scopus
  40. Z. Guan, F. Huang, and W. Guan, “Chaos-based image encryption algorithm,” Physics Letters A: General, Atomic and Solid State Physics, vol. 346, no. 1–3, pp. 153–157, 2005. View at Publisher · View at Google Scholar · View at Scopus
  41. D. Xiao, X. Liao, and P. Wei, “Analysis and improvement of a chaos-based image encryption algorithm,” Chaos, Solitons and Fractals, vol. 40, no. 5, pp. 2191–2199, 2009. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at Scopus
  42. T. Xiang, X. Liao, G. Tang, Y. Chen, and K. Wong, “A novel block cryptosystem based on iterating a chaotic map,” Physics Letters A: General, Atomic and Solid State Physics, vol. 349, no. 1–4, pp. 109–115, 2006. View at Publisher · View at Google Scholar · View at Scopus
  43. M. Hénon, “A two-dimensional mapping with a strange attractor,” Communications in Mathematical Physics, vol. 50, no. 1, pp. 69–77, 1976. View at Publisher · View at Google Scholar · View at MathSciNet
  44. E. Lorenz, “Deterministic nonperiodic flow,” Journal of Atmospheric Sciences, vol. 20, no. 2, pp. 130–141, 1963. View at Google Scholar
  45. C. Shannon, “Communication theory of secrecy systems,” The Bell System Technical Journal, vol. 28, no. 4, pp. 656–715, 1949. View at Google Scholar