中国物理B ›› 2008, Vol. 17 ›› Issue (11): 4027-4032.doi: 10.1088/1674-1056/17/11/015

• GENERAL • 上一篇    下一篇

An improved image encryption algorithm based on chaotic maps

杨素香1, 徐淑奖2, 王继志2   

  1. (1)School of Statistics and Mathematics, Shandong Economic University, Jinan 250014, China; (2)Shandong Computer Science Center, Jinan 250014, China
  • 收稿日期:2008-03-10 修回日期:2008-03-20 出版日期:2008-11-20 发布日期:2008-11-20
  • 基金资助:
    Project supported by the Natural Science Foundation of Shandong Province, China (Grant No Y2007G43).

An improved image encryption algorithm based on chaotic maps

Yang Su-Xiang (徐淑奖)a, Xu Shu-Jiang (王继志)b, Wang Ji-Zhi (杨素香)b   

  1. a School of Statistics and Mathematics, Shandong Economic University, Jinan 250014, China; b Shandong Computer Science Center, Jinan 250014, China
  • Received:2008-03-10 Revised:2008-03-20 Online:2008-11-20 Published:2008-11-20
  • Supported by:
    Project supported by the Natural Science Foundation of Shandong Province, China (Grant No Y2007G43).

摘要: Recently, two chaotic image encryption schemes have been proposed, in which shuffling the positions and changing the grey values of image pixels are combined. This paper provides the chosen plaintext attack to recover the corresponding plaintext of a given ciphertext. Furthermore, it points out that the two schemes are not sufficiently sensitive to small changes of the plaintext. Based on the given analysis, it proposes an improved algorithm which includes two rounds of substitution and one round of permutation to strengthen the overall performance.

Abstract: Recently, two chaotic image encryption schemes have been proposed, in which shuffling the positions and changing the grey values of image pixels are combined. This paper provides the chosen plaintext attack to recover the corresponding plaintext of a given ciphertext. Furthermore, it points out that the two schemes are not sufficiently sensitive to small changes of the plaintext. Based on the given analysis, it proposes an improved algorithm which includes two rounds of substitution and one round of permutation to strengthen the overall performance.

Key words: chaos, chaotic cryptosystem, image encryption, chosen plaintext attack

中图分类号:  (Control of chaos, applications of chaos)

  • 05.45.Gg