Image encryption algorithm with compound chaotic maps

This paper proposes a novel image encryption scheme based on two even-symmetric chaotic maps and a skew tent chaotic map. In the permutation process, a P-box produced by sorting an even-symmetric chaotic sequence is applied to shuffle the positions of all image pixels. In the diffusion process, both...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Journal of ambient intelligence and humanized computing 2015-10, Vol.6 (5), p.563-570
Hauptverfasser: Li, Xuan, Zhang, Guoji, Zhang, Xiayan
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 570
container_issue 5
container_start_page 563
container_title Journal of ambient intelligence and humanized computing
container_volume 6
creator Li, Xuan
Zhang, Guoji
Zhang, Xiayan
description This paper proposes a novel image encryption scheme based on two even-symmetric chaotic maps and a skew tent chaotic map. In the permutation process, a P-box produced by sorting an even-symmetric chaotic sequence is applied to shuffle the positions of all image pixels. In the diffusion process, both even-symmetric chaotic map and skew tent map are used to generate the key stream. The pixels in the permuted image determine which of two even-symmetric chaotic maps is iterated for next byte in the keystream each time, so the keystream is closely related to the plain image. The performance and security of the proposed method are evaluated thoroughly histogram, correlation of adjacent pixels, information entropy and sensitivity analysis. Results are encouraging and suggest that the scheme is reliable to be adopted for the secure image communication application.
doi_str_mv 10.1007/s12652-013-0217-4
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2919732972</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2919732972</sourcerecordid><originalsourceid>FETCH-LOGICAL-c386t-2067b75fb82f07cf6873677ac9c4a3e40ff832bb67359a518c9989496ac1760d3</originalsourceid><addsrcrecordid>eNp1kEtLAzEQx4MoWGo_gLcFz9FMsnkdpfgoFLzoOWTTpN3S3azJFum3N2VFT85hZg7_B_wQugVyD4TIhwxUcIoJMEwoSFxfoBkooTCHml_-_kxeo0XOe1KGaQYAM8RXnd36yvcunYaxjX1lD9uY2nHXVV9lVy52Qzz2m8rtbBxbV3V2yDfoKthD9oufO0cfz0_vy1e8fntZLR_X2DElRkyJkI3koVE0EOmCUJIJKa3TrrbM1yQExWjTCMm4thyU01rpWgvrQAqyYXN0N-UOKX4efR7NPh5TXyoN1aAlo1rSooJJ5VLMOflghtR2Np0MEHMGZCZApgAyZ0CmLh46eXLR9luf_pL_N30DGdRmlQ</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2919732972</pqid></control><display><type>article</type><title>Image encryption algorithm with compound chaotic maps</title><source>SpringerNature Journals</source><source>ProQuest Central UK/Ireland</source><source>ProQuest Central</source><creator>Li, Xuan ; Zhang, Guoji ; Zhang, Xiayan</creator><creatorcontrib>Li, Xuan ; Zhang, Guoji ; Zhang, Xiayan</creatorcontrib><description>This paper proposes a novel image encryption scheme based on two even-symmetric chaotic maps and a skew tent chaotic map. In the permutation process, a P-box produced by sorting an even-symmetric chaotic sequence is applied to shuffle the positions of all image pixels. In the diffusion process, both even-symmetric chaotic map and skew tent map are used to generate the key stream. The pixels in the permuted image determine which of two even-symmetric chaotic maps is iterated for next byte in the keystream each time, so the keystream is closely related to the plain image. The performance and security of the proposed method are evaluated thoroughly histogram, correlation of adjacent pixels, information entropy and sensitivity analysis. Results are encouraging and suggest that the scheme is reliable to be adopted for the secure image communication application.</description><identifier>ISSN: 1868-5137</identifier><identifier>EISSN: 1868-5145</identifier><identifier>DOI: 10.1007/s12652-013-0217-4</identifier><language>eng</language><publisher>Berlin/Heidelberg: Springer Berlin Heidelberg</publisher><subject>Algorithms ; Artificial Intelligence ; Chaos theory ; Computational Intelligence ; Data encryption ; Digital signatures ; Engineering ; Entropy (Information theory) ; Original Research ; Permutations ; Pixels ; Random variables ; Robotics and Automation ; Sensitivity analysis ; User Interfaces and Human Computer Interaction</subject><ispartof>Journal of ambient intelligence and humanized computing, 2015-10, Vol.6 (5), p.563-570</ispartof><rights>Springer-Verlag Berlin Heidelberg 2014</rights><rights>Springer-Verlag Berlin Heidelberg 2014.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c386t-2067b75fb82f07cf6873677ac9c4a3e40ff832bb67359a518c9989496ac1760d3</citedby><cites>FETCH-LOGICAL-c386t-2067b75fb82f07cf6873677ac9c4a3e40ff832bb67359a518c9989496ac1760d3</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/s12652-013-0217-4$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://www.proquest.com/docview/2919732972?pq-origsite=primo$$EHTML$$P50$$Gproquest$$H</linktohtml><link.rule.ids>315,782,786,21395,27931,27932,33751,41495,42564,43812,51326,64392,64396,72476</link.rule.ids></links><search><creatorcontrib>Li, Xuan</creatorcontrib><creatorcontrib>Zhang, Guoji</creatorcontrib><creatorcontrib>Zhang, Xiayan</creatorcontrib><title>Image encryption algorithm with compound chaotic maps</title><title>Journal of ambient intelligence and humanized computing</title><addtitle>J Ambient Intell Human Comput</addtitle><description>This paper proposes a novel image encryption scheme based on two even-symmetric chaotic maps and a skew tent chaotic map. In the permutation process, a P-box produced by sorting an even-symmetric chaotic sequence is applied to shuffle the positions of all image pixels. In the diffusion process, both even-symmetric chaotic map and skew tent map are used to generate the key stream. The pixels in the permuted image determine which of two even-symmetric chaotic maps is iterated for next byte in the keystream each time, so the keystream is closely related to the plain image. The performance and security of the proposed method are evaluated thoroughly histogram, correlation of adjacent pixels, information entropy and sensitivity analysis. Results are encouraging and suggest that the scheme is reliable to be adopted for the secure image communication application.</description><subject>Algorithms</subject><subject>Artificial Intelligence</subject><subject>Chaos theory</subject><subject>Computational Intelligence</subject><subject>Data encryption</subject><subject>Digital signatures</subject><subject>Engineering</subject><subject>Entropy (Information theory)</subject><subject>Original Research</subject><subject>Permutations</subject><subject>Pixels</subject><subject>Random variables</subject><subject>Robotics and Automation</subject><subject>Sensitivity analysis</subject><subject>User Interfaces and Human Computer Interaction</subject><issn>1868-5137</issn><issn>1868-5145</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2015</creationdate><recordtype>article</recordtype><sourceid>AFKRA</sourceid><sourceid>AZQEC</sourceid><sourceid>BENPR</sourceid><sourceid>CCPQU</sourceid><sourceid>DWQXO</sourceid><sourceid>GNUQQ</sourceid><recordid>eNp1kEtLAzEQx4MoWGo_gLcFz9FMsnkdpfgoFLzoOWTTpN3S3azJFum3N2VFT85hZg7_B_wQugVyD4TIhwxUcIoJMEwoSFxfoBkooTCHml_-_kxeo0XOe1KGaQYAM8RXnd36yvcunYaxjX1lD9uY2nHXVV9lVy52Qzz2m8rtbBxbV3V2yDfoKthD9oufO0cfz0_vy1e8fntZLR_X2DElRkyJkI3koVE0EOmCUJIJKa3TrrbM1yQExWjTCMm4thyU01rpWgvrQAqyYXN0N-UOKX4efR7NPh5TXyoN1aAlo1rSooJJ5VLMOflghtR2Np0MEHMGZCZApgAyZ0CmLh46eXLR9luf_pL_N30DGdRmlQ</recordid><startdate>20151001</startdate><enddate>20151001</enddate><creator>Li, Xuan</creator><creator>Zhang, Guoji</creator><creator>Zhang, Xiayan</creator><general>Springer Berlin Heidelberg</general><general>Springer Nature B.V</general><scope>AAYXX</scope><scope>CITATION</scope><scope>8FE</scope><scope>8FG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope></search><sort><creationdate>20151001</creationdate><title>Image encryption algorithm with compound chaotic maps</title><author>Li, Xuan ; Zhang, Guoji ; Zhang, Xiayan</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c386t-2067b75fb82f07cf6873677ac9c4a3e40ff832bb67359a518c9989496ac1760d3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2015</creationdate><topic>Algorithms</topic><topic>Artificial Intelligence</topic><topic>Chaos theory</topic><topic>Computational Intelligence</topic><topic>Data encryption</topic><topic>Digital signatures</topic><topic>Engineering</topic><topic>Entropy (Information theory)</topic><topic>Original Research</topic><topic>Permutations</topic><topic>Pixels</topic><topic>Random variables</topic><topic>Robotics and Automation</topic><topic>Sensitivity analysis</topic><topic>User Interfaces and Human Computer Interaction</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Li, Xuan</creatorcontrib><creatorcontrib>Zhang, Guoji</creatorcontrib><creatorcontrib>Zhang, Xiayan</creatorcontrib><collection>CrossRef</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><jtitle>Journal of ambient intelligence and humanized computing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Li, Xuan</au><au>Zhang, Guoji</au><au>Zhang, Xiayan</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Image encryption algorithm with compound chaotic maps</atitle><jtitle>Journal of ambient intelligence and humanized computing</jtitle><stitle>J Ambient Intell Human Comput</stitle><date>2015-10-01</date><risdate>2015</risdate><volume>6</volume><issue>5</issue><spage>563</spage><epage>570</epage><pages>563-570</pages><issn>1868-5137</issn><eissn>1868-5145</eissn><abstract>This paper proposes a novel image encryption scheme based on two even-symmetric chaotic maps and a skew tent chaotic map. In the permutation process, a P-box produced by sorting an even-symmetric chaotic sequence is applied to shuffle the positions of all image pixels. In the diffusion process, both even-symmetric chaotic map and skew tent map are used to generate the key stream. The pixels in the permuted image determine which of two even-symmetric chaotic maps is iterated for next byte in the keystream each time, so the keystream is closely related to the plain image. The performance and security of the proposed method are evaluated thoroughly histogram, correlation of adjacent pixels, information entropy and sensitivity analysis. Results are encouraging and suggest that the scheme is reliable to be adopted for the secure image communication application.</abstract><cop>Berlin/Heidelberg</cop><pub>Springer Berlin Heidelberg</pub><doi>10.1007/s12652-013-0217-4</doi><tpages>8</tpages></addata></record>
fulltext fulltext
identifier ISSN: 1868-5137
ispartof Journal of ambient intelligence and humanized computing, 2015-10, Vol.6 (5), p.563-570
issn 1868-5137
1868-5145
language eng
recordid cdi_proquest_journals_2919732972
source SpringerNature Journals; ProQuest Central UK/Ireland; ProQuest Central
subjects Algorithms
Artificial Intelligence
Chaos theory
Computational Intelligence
Data encryption
Digital signatures
Engineering
Entropy (Information theory)
Original Research
Permutations
Pixels
Random variables
Robotics and Automation
Sensitivity analysis
User Interfaces and Human Computer Interaction
title Image encryption algorithm with compound chaotic maps
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-04T08%3A17%3A48IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Image%20encryption%20algorithm%20with%20compound%20chaotic%20maps&rft.jtitle=Journal%20of%20ambient%20intelligence%20and%20humanized%20computing&rft.au=Li,%20Xuan&rft.date=2015-10-01&rft.volume=6&rft.issue=5&rft.spage=563&rft.epage=570&rft.pages=563-570&rft.issn=1868-5137&rft.eissn=1868-5145&rft_id=info:doi/10.1007/s12652-013-0217-4&rft_dat=%3Cproquest_cross%3E2919732972%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2919732972&rft_id=info:pmid/&rfr_iscdi=true