All Title Author
Keywords Abstract

PLOS ONE  2014 

An Image Encryption Algorithm Utilizing Julia Sets and Hilbert Curves

DOI: 10.1371/journal.pone.0084655

Full-Text   Cite this paper   Add to My Lib


Image encryption is an important and effective technique to protect image security. In this paper, a novel image encryption algorithm combining Julia sets and Hilbert curves is proposed. The algorithm utilizes Julia sets’ parameters to generate a random sequence as the initial keys and gets the final encryption keys by scrambling the initial keys through the Hilbert curve. The final cipher image is obtained by modulo arithmetic and diffuse operation. In this method, it needs only a few parameters for the key generation, which greatly reduces the storage space. Moreover, because of the Julia sets’ properties, such as infiniteness and chaotic characteristics, the keys have high sensitivity even to a tiny perturbation. The experimental results indicate that the algorithm has large key space, good statistical property, high sensitivity for the keys, and effective resistance to the chosen-plaintext attack.


[1]  Shyu SJ (2007) Image encryption by random grids. Pattern Recognition 40: 1014–1031.
[2]  Yuen CH, Wong KW (2011) A chaos-based joint image compression and encryption scheme using DCT and SHA-1. Applied Soft Computing 11: 5092–5098.
[3]  Hermassi J, Rhouma R, Belghith S (2010) Joint compression and encryption using chaotically mutated Huffman trees. Communications in Nonlinear Science and Numerical Simulation 15: 2987–2999.
[4]  Chen GR, Mao YB, Chui CK (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons & Fractals 21: 749–761.
[5]  Kumar S (2006) Public key cryptographic system using Mandelbrot sets. Military Communications Conference in Washington DC, 1–5.
[6]  Liu WT, Sun WS (2008) Application of Fractal theory in cryptographic algorithm. Journal of China Acadamy of Electronics and Information Technology. 3: 580–585 (In Chinese)..
[7]  Rozouvan V (2009) Modulo image encryption with fractal keys. Optics and Lasers in Engineering 47: 1–6.
[8]  Lock AJJ, Loh CH, Juhari SH, Samsudin A (2010) Compression-encryption based on fractal geometric. Second International Conference on Computer Research and Development. 213–217.
[9]  Sun YY, Kong RQ, Wang XY, Bi LC (2010) An Image Encryption Algorithm Utilizing Mandelbrot Set. International Workshop on Chaos-Fractal Theories and Applications. 170–173.
[10]  Lin KT, Yeh SL (2012) Encrypting image by assembling the fractal-image addition method and the binary encoding method. Optics Communications 285: 2335–2342.
[11]  Tong XJ, Cui MG (2009) Image encryption scheme based on 3D baker with dynamical compound chaotic sequence cipher generator. Signal processing 89: 480–491.
[12]  Yuen CH, Wong KW (2012) Cryptanalysis on secure fractal image coding based on fractal parameter encryption. Fractals 20: 41–51.
[13]  Li CQ, Lo KT (2011) Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks. Signal processing 4: 949–954.
[14]  Li CQ, Zhang LY, Ou R, Wong KW, Shu S (2012) Breaking a novel colour image encryption algorithm based on chaos. Nonlinear Dynamics 70: 2383–2388.
[15]  Falconer KJ (2003) Fractal: Mathematical Foundations and Applications (Second Edition). Chichester: Wiley.
[17]  Chen GR, Mao YB, Chui CK (2004) A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons & Fractals 21: 749–761.


comments powered by Disqus