Image encryption algorithm with compound chaotic maps
This paper proposes a novel image encryption scheme based on two even-symmetric chaotic maps and a skew tent chaotic map. In the permutation process, a P-box produced by sorting an even-symmetric chaotic sequence is applied to shuffle the positions of all image pixels. In the diffusion process, both...
Gespeichert in:
Veröffentlicht in: | Journal of ambient intelligence and humanized computing 2015-10, Vol.6 (5), p.563-570 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 570 |
---|---|
container_issue | 5 |
container_start_page | 563 |
container_title | Journal of ambient intelligence and humanized computing |
container_volume | 6 |
creator | Li, Xuan Zhang, Guoji Zhang, Xiayan |
description | This paper proposes a novel image encryption scheme based on two even-symmetric chaotic maps and a skew tent chaotic map. In the permutation process, a P-box produced by sorting an even-symmetric chaotic sequence is applied to shuffle the positions of all image pixels. In the diffusion process, both even-symmetric chaotic map and skew tent map are used to generate the key stream. The pixels in the permuted image determine which of two even-symmetric chaotic maps is iterated for next byte in the keystream each time, so the keystream is closely related to the plain image. The performance and security of the proposed method are evaluated thoroughly histogram, correlation of adjacent pixels, information entropy and sensitivity analysis. Results are encouraging and suggest that the scheme is reliable to be adopted for the secure image communication application. |
doi_str_mv | 10.1007/s12652-013-0217-4 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2919732972</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2919732972</sourcerecordid><originalsourceid>FETCH-LOGICAL-c386t-2067b75fb82f07cf6873677ac9c4a3e40ff832bb67359a518c9989496ac1760d3</originalsourceid><addsrcrecordid>eNp1kEtLAzEQx4MoWGo_gLcFz9FMsnkdpfgoFLzoOWTTpN3S3azJFum3N2VFT85hZg7_B_wQugVyD4TIhwxUcIoJMEwoSFxfoBkooTCHml_-_kxeo0XOe1KGaQYAM8RXnd36yvcunYaxjX1lD9uY2nHXVV9lVy52Qzz2m8rtbBxbV3V2yDfoKthD9oufO0cfz0_vy1e8fntZLR_X2DElRkyJkI3koVE0EOmCUJIJKa3TrrbM1yQExWjTCMm4thyU01rpWgvrQAqyYXN0N-UOKX4efR7NPh5TXyoN1aAlo1rSooJJ5VLMOflghtR2Np0MEHMGZCZApgAyZ0CmLh46eXLR9luf_pL_N30DGdRmlQ</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2919732972</pqid></control><display><type>article</type><title>Image encryption algorithm with compound chaotic maps</title><source>SpringerNature Journals</source><source>ProQuest Central UK/Ireland</source><source>ProQuest Central</source><creator>Li, Xuan ; Zhang, Guoji ; Zhang, Xiayan</creator><creatorcontrib>Li, Xuan ; Zhang, Guoji ; Zhang, Xiayan</creatorcontrib><description>This paper proposes a novel image encryption scheme based on two even-symmetric chaotic maps and a skew tent chaotic map. In the permutation process, a P-box produced by sorting an even-symmetric chaotic sequence is applied to shuffle the positions of all image pixels. In the diffusion process, both even-symmetric chaotic map and skew tent map are used to generate the key stream. The pixels in the permuted image determine which of two even-symmetric chaotic maps is iterated for next byte in the keystream each time, so the keystream is closely related to the plain image. The performance and security of the proposed method are evaluated thoroughly histogram, correlation of adjacent pixels, information entropy and sensitivity analysis. Results are encouraging and suggest that the scheme is reliable to be adopted for the secure image communication application.</description><identifier>ISSN: 1868-5137</identifier><identifier>EISSN: 1868-5145</identifier><identifier>DOI: 10.1007/s12652-013-0217-4</identifier><language>eng</language><publisher>Berlin/Heidelberg: Springer Berlin Heidelberg</publisher><subject>Algorithms ; Artificial Intelligence ; Chaos theory ; Computational Intelligence ; Data encryption ; Digital signatures ; Engineering ; Entropy (Information theory) ; Original Research ; Permutations ; Pixels ; Random variables ; Robotics and Automation ; Sensitivity analysis ; User Interfaces and Human Computer Interaction</subject><ispartof>Journal of ambient intelligence and humanized computing, 2015-10, Vol.6 (5), p.563-570</ispartof><rights>Springer-Verlag Berlin Heidelberg 2014</rights><rights>Springer-Verlag Berlin Heidelberg 2014.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c386t-2067b75fb82f07cf6873677ac9c4a3e40ff832bb67359a518c9989496ac1760d3</citedby><cites>FETCH-LOGICAL-c386t-2067b75fb82f07cf6873677ac9c4a3e40ff832bb67359a518c9989496ac1760d3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s12652-013-0217-4$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://www.proquest.com/docview/2919732972?pq-origsite=primo$$EHTML$$P50$$Gproquest$$H</linktohtml><link.rule.ids>315,782,786,21395,27931,27932,33751,41495,42564,43812,51326,64392,64396,72476</link.rule.ids></links><search><creatorcontrib>Li, Xuan</creatorcontrib><creatorcontrib>Zhang, Guoji</creatorcontrib><creatorcontrib>Zhang, Xiayan</creatorcontrib><title>Image encryption algorithm with compound chaotic maps</title><title>Journal of ambient intelligence and humanized computing</title><addtitle>J Ambient Intell Human Comput</addtitle><description>This paper proposes a novel image encryption scheme based on two even-symmetric chaotic maps and a skew tent chaotic map. In the permutation process, a P-box produced by sorting an even-symmetric chaotic sequence is applied to shuffle the positions of all image pixels. In the diffusion process, both even-symmetric chaotic map and skew tent map are used to generate the key stream. The pixels in the permuted image determine which of two even-symmetric chaotic maps is iterated for next byte in the keystream each time, so the keystream is closely related to the plain image. The performance and security of the proposed method are evaluated thoroughly histogram, correlation of adjacent pixels, information entropy and sensitivity analysis. Results are encouraging and suggest that the scheme is reliable to be adopted for the secure image communication application.</description><subject>Algorithms</subject><subject>Artificial Intelligence</subject><subject>Chaos theory</subject><subject>Computational Intelligence</subject><subject>Data encryption</subject><subject>Digital signatures</subject><subject>Engineering</subject><subject>Entropy (Information theory)</subject><subject>Original Research</subject><subject>Permutations</subject><subject>Pixels</subject><subject>Random variables</subject><subject>Robotics and Automation</subject><subject>Sensitivity analysis</subject><subject>User Interfaces and Human Computer Interaction</subject><issn>1868-5137</issn><issn>1868-5145</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2015</creationdate><recordtype>article</recordtype><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNp1kEtLAzEQx4MoWGo_gLcFz9FMsnkdpfgoFLzoOWTTpN3S3azJFum3N2VFT85hZg7_B_wQugVyD4TIhwxUcIoJMEwoSFxfoBkooTCHml_-_kxeo0XOe1KGaQYAM8RXnd36yvcunYaxjX1lD9uY2nHXVV9lVy52Qzz2m8rtbBxbV3V2yDfoKthD9oufO0cfz0_vy1e8fntZLR_X2DElRkyJkI3koVE0EOmCUJIJKa3TrrbM1yQExWjTCMm4thyU01rpWgvrQAqyYXN0N-UOKX4efR7NPh5TXyoN1aAlo1rSooJJ5VLMOflghtR2Np0MEHMGZCZApgAyZ0CmLh46eXLR9luf_pL_N30DGdRmlQ</recordid><startdate>20151001</startdate><enddate>20151001</enddate><creator>Li, Xuan</creator><creator>Zhang, Guoji</creator><creator>Zhang, Xiayan</creator><general>Springer Berlin Heidelberg</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>8FE</scope><scope>8FG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope></search><sort><creationdate>20151001</creationdate><title>Image encryption algorithm with compound chaotic maps</title><author>Li, Xuan ; Zhang, Guoji ; Zhang, Xiayan</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c386t-2067b75fb82f07cf6873677ac9c4a3e40ff832bb67359a518c9989496ac1760d3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2015</creationdate><topic>Algorithms</topic><topic>Artificial Intelligence</topic><topic>Chaos theory</topic><topic>Computational Intelligence</topic><topic>Data encryption</topic><topic>Digital signatures</topic><topic>Engineering</topic><topic>Entropy (Information theory)</topic><topic>Original Research</topic><topic>Permutations</topic><topic>Pixels</topic><topic>Random variables</topic><topic>Robotics and Automation</topic><topic>Sensitivity analysis</topic><topic>User Interfaces and Human Computer Interaction</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Li, Xuan</creatorcontrib><creatorcontrib>Zhang, Guoji</creatorcontrib><creatorcontrib>Zhang, Xiayan</creatorcontrib><collection>CrossRef</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><jtitle>Journal of ambient intelligence and humanized computing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Li, Xuan</au><au>Zhang, Guoji</au><au>Zhang, Xiayan</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Image encryption algorithm with compound chaotic maps</atitle><jtitle>Journal of ambient intelligence and humanized computing</jtitle><stitle>J Ambient Intell Human Comput</stitle><date>2015-10-01</date><risdate>2015</risdate><volume>6</volume><issue>5</issue><spage>563</spage><epage>570</epage><pages>563-570</pages><issn>1868-5137</issn><eissn>1868-5145</eissn><abstract>This paper proposes a novel image encryption scheme based on two even-symmetric chaotic maps and a skew tent chaotic map. In the permutation process, a P-box produced by sorting an even-symmetric chaotic sequence is applied to shuffle the positions of all image pixels. In the diffusion process, both even-symmetric chaotic map and skew tent map are used to generate the key stream. The pixels in the permuted image determine which of two even-symmetric chaotic maps is iterated for next byte in the keystream each time, so the keystream is closely related to the plain image. The performance and security of the proposed method are evaluated thoroughly histogram, correlation of adjacent pixels, information entropy and sensitivity analysis. Results are encouraging and suggest that the scheme is reliable to be adopted for the secure image communication application.</abstract><cop>Berlin/Heidelberg</cop><pub>Springer Berlin Heidelberg</pub><doi>10.1007/s12652-013-0217-4</doi><tpages>8</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1868-5137 |
ispartof | Journal of ambient intelligence and humanized computing, 2015-10, Vol.6 (5), p.563-570 |
issn | 1868-5137 1868-5145 |
language | eng |
recordid | cdi_proquest_journals_2919732972 |
source | SpringerNature Journals; ProQuest Central UK/Ireland; ProQuest Central |
subjects | Algorithms Artificial Intelligence Chaos theory Computational Intelligence Data encryption Digital signatures Engineering Entropy (Information theory) Original Research Permutations Pixels Random variables Robotics and Automation Sensitivity analysis User Interfaces and Human Computer Interaction |
title | Image encryption algorithm with compound chaotic maps |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-04T08%3A17%3A48IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Image%20encryption%20algorithm%20with%20compound%20chaotic%20maps&rft.jtitle=Journal%20of%20ambient%20intelligence%20and%20humanized%20computing&rft.au=Li,%20Xuan&rft.date=2015-10-01&rft.volume=6&rft.issue=5&rft.spage=563&rft.epage=570&rft.pages=563-570&rft.issn=1868-5137&rft.eissn=1868-5145&rft_id=info:doi/10.1007/s12652-013-0217-4&rft_dat=%3Cproquest_cross%3E2919732972%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2919732972&rft_id=info:pmid/&rfr_iscdi=true |