Please wait a minute...
Chin. Phys. B, 2011, Vol. 20(4): 040506    DOI: 10.1088/1674-1056/20/4/040506
GENERAL Prev   Next  

Digital image encryption with chaotic map lattices

Sun Fu-Yan(孙福艳) and Lü Zong-Wang(吕宗旺)
College of Information Science and Engineering, Henan University of Technology, Zhengzhou 450001, China
Abstract  This paper proposes a secure approach for encryption and decryption of digital images with chaotic map lattices. In the proposed encryption process, eight different types of operations are used to encrypt the pixels of an image and one of them will be used for particular pixels decided by the outcome of the chaotic map lattices. To make the cipher more robust against any attacks, the secret key is modified after encrypting each block of sixteen pixels of the image. The experimental results and security analysis show that the proposed image encryption scheme achieves high security and efficiency.
Keywords:  image encryption      image decryption      chaotic map lattice      cryptography      spatiotemporal chaotic system  
Received:  05 September 2010      Revised:  29 November 2010      Accepted manuscript online: 
PACS:  05.45.-a (Nonlinear dynamics and chaos)  
  05.45.Gg (Control of chaos, applications of chaos)  
Fund: Project supported by the National Natural Science Foundation of China (Grant Nos. 61001099 and 10971120) and the Foundation for the Author of National Excellent Doctoral Dissertation of China (Grant No. 200444).

Cite this article: 

Sun Fu-Yan(孙福艳) and Lü Zong-Wang(吕宗旺) Digital image encryption with chaotic map lattices 2011 Chin. Phys. B 20 040506

[1] Xiang F and Qiu S S 2008 Acta Phys. Sin. 57 6132 (in Chinese)
[2] Wang X Y and Wang M Y 2008 Acta Phys. Sin. 57 731 (in Chinese)
[3] Sun F Y, Liu S T and Lü Z W 2007 Chin. Phys. 16 3616
[4] Schenier B 1998 J. Electron Imaging 7 318
[5] Bourbakis N and Alexopoulos C 1992 Pattern Recogn. 25 567
[6] Fridrich J 1998 Int. J. Bifur. Chaos 8 1259
[7] Dachselt F and Schwarz W 2001 IEEE Trans. Circ. Syst. I 48 1498
[8] Matthews R 1989 Cryptologia 13 29
[9] Baptista M S 1998 Phys. Lett. A 240 50
[10] Chang C C, Hwang M S and Chen T S 2001 J. Syst. Software 58 83
[11] Chen G and Mao Y B 2004 Chaos, Solitons and Fractals 21 749
[12] Mao Y B, Chen G and Lian S G 2004 Int. J. Bifur. Chaos 14 3613
[13] Zhang L H, Liao X F and Wang X B 2005 Chaos, Solitons and Fractals 24 759
[14] Pareek N K, Vinod P and Sud K K 2005 Commun. Nonlinear Sci. Numer. Simul. 10 715
[15] Xiang T, Liao X, Tang G, Chen Y and Wong K W 2006 Phys. Lett. A 349 109
[16] Li P, Li Z, Halang W A and Chen G 2006 Phys. Lett. A 349 467
[17] Li P, Li Z, Halang W A and Chen G 2007 Chaos, Solitons and Fractals 32 1867
[18] Lu H P, Wang S H, Li X W, Tang G N, Kuang J Y, Ye W P, et al. 2004 Chaos 14 617
[19] Garcia P, Parravano A, Cosenza M G, Jimenez J and Marcano A 2002 Phys. Rev. E 65 045201
[20] Wang S H, Liu W R, Lu H P, Kuang J Y and Hu G 2004 Int. J. Mod. Phys. B 18 2617
[21] Wang S H, Kuang J Y, Li J, Luo Y, Lu H P and Hu G 2002 Phys. Rev. E 66 065202(R)
[22] Tang G, Wang S, Lu H and Hu G 2003 Phys. Lett. A 318 388
[23] Kaneko K and Tsuda I 1996 Complex Systems: Chaos and Beyond (Tokyo: Asakura)
[1] Asymmetric image encryption algorithm based ona new three-dimensional improved logistic chaotic map
Guo-Dong Ye(叶国栋), Hui-Shan Wu(吴惠山), Xiao-Ling Huang(黄小玲), and Syh-Yuan Tan. Chin. Phys. B, 2023, 32(3): 030504.
[2] A color image encryption algorithm based on hyperchaotic map and DNA mutation
Xinyu Gao(高昕瑜), Bo Sun(孙博), Yinghong Cao(曹颖鸿), Santo Banerjee, and Jun Mou(牟俊). Chin. Phys. B, 2023, 32(3): 030501.
[3] Lossless embedding: A visually meaningful image encryption algorithm based on hyperchaos and compressive sensing
Xing-Yuan Wang(王兴元), Xiao-Li Wang(王哓丽), Lin Teng(滕琳), Dong-Hua Jiang(蒋东华), and Yongjin Xian(咸永锦). Chin. Phys. B, 2023, 32(2): 020503.
[4] Exponential sine chaotification model for enhancing chaos and its hardware implementation
Rui Wang(王蕊), Meng-Yang Li(李孟洋), and Hai-Jun Luo(罗海军). Chin. Phys. B, 2022, 31(8): 080508.
[5] Synchronously scrambled diffuse image encryption method based on a new cosine chaotic map
Xiaopeng Yan(闫晓鹏), Xingyuan Wang(王兴元), and Yongjin Xian(咸永锦). Chin. Phys. B, 2022, 31(8): 080504.
[6] Quantum private comparison of arbitrary single qubit states based on swap test
Xi Huang(黄曦), Yan Chang(昌燕), Wen Cheng(程稳), Min Hou(侯敏), and Shi-Bin Zhang(张仕斌). Chin. Phys. B, 2022, 31(4): 040303.
[7] Neural-mechanism-driven image block encryption algorithm incorporating a hyperchaotic system and cloud model
Peng-Fei Fang(方鹏飞), Han Liu(刘涵), Cheng-Mao Wu(吴成茂), and Min Liu(刘旻). Chin. Phys. B, 2022, 31(4): 040501.
[8] FPGA implementation and image encryption application of a new PRNG based on a memristive Hopfield neural network with a special activation gradient
Fei Yu(余飞), Zinan Zhang(张梓楠), Hui Shen(沈辉), Yuanyuan Huang(黄园媛), Shuo Cai(蔡烁), and Sichun Du(杜四春). Chin. Phys. B, 2022, 31(2): 020505.
[9] Finite-time complex projective synchronization of fractional-order complex-valued uncertain multi-link network and its image encryption application
Yong-Bing Hu(胡永兵), Xiao-Min Yang(杨晓敏), Da-Wei Ding(丁大为), and Zong-Li Yang(杨宗立). Chin. Phys. B, 2022, 31(11): 110501.
[10] An image encryption algorithm based on spatiotemporal chaos and middle order traversal of a binary tree
Yining Su(苏怡宁), Xingyuan Wang(王兴元), and Shujuan Lin(林淑娟). Chin. Phys. B, 2022, 31(11): 110503.
[11] Fractal sorting vector-based least significant bit chaotic permutation for image encryption
Yong-Jin Xian(咸永锦), Xing-Yuan Wang(王兴元), Ying-Qian Zhang(张盈谦), Xiao-Yu Wang(王晓雨), and Xiao-Hui Du(杜晓慧). Chin. Phys. B, 2021, 30(6): 060508.
[12] An image encryption algorithm based on improved baker transformation and chaotic S-box
Xing-Yuan Wang(王兴元), Huai-Huai Sun(孙怀怀), and Hao Gao(高浩). Chin. Phys. B, 2021, 30(6): 060507.
[13] Ghost imaging-based optical cryptosystem for multiple images using integral property of the Fourier transform
Yi Kang(康祎), Leihong Zhang(张雷洪), Hualong Ye(叶华龙), Dawei Zhang(张大伟), and Songlin Zhuang(庄松林). Chin. Phys. B, 2021, 30(12): 124207.
[14] A secure image protection algorithm by steganography and encryption using the 2D-TSCC
Qi Li(李琦), Xingyuan Wang(王兴元), He Wang(王赫), Xiaolin Ye(叶晓林), Shuang Zhou(周双), Suo Gao(高锁), and Yunqing Shi(施云庆). Chin. Phys. B, 2021, 30(11): 110501.
[15] Memristor-based hyper-chaotic circuit for image encryption
Jiao-Jiao Chen(陈娇娇), Deng-Wei Yan(闫登卫), Shu-Kai Duan(段书凯), and Li-Dan Wang(王丽丹). Chin. Phys. B, 2020, 29(11): 110504.
No Suggested Reading articles found!