All Title Author
Keywords Abstract

Image Encryption Based on the General Approach for Multiple Chaotic Systems

DOI: 10.4236/jsip.2011.23033, PP. 238-244

Keywords: Lorenz Equations, Rossler Systems, Image Encryption, Chaos

Full-Text   Cite this paper   Add to My Lib


In the recent years, researchers developed image encryption methods based on chaotic systems. This paper proposed new image encryption technique based on new chaotic system by adding two chaotic systems: the Lorenz chaotic system and the Rössler chaotic system. The main advantage of this technique is stronger security, as is shown in the encryption tests.


[1]  Z. Guan, F. Huang and W. Guan, “Chaos-Based Image Encryption Algorithm,” Physics Letters A, Vol. 346, No. 1-3, 2005, pp. 153-157. doi:10.1016/j.physleta.2005.08.006
[2]  H. H. Nien, C. K. Huang, S. K. Changchien, H. W. Shieh, C. T. Chen and Y. Y. Tuan, “Digital Color Image Encoding and Decoding Using a Novel Chaotic Random Generator,” Chaos Solitons and Fractals, Vol. 32, No. 3, 2005, pp. 1070-1080. doi:10.1016/j.chaos.2005.11.057
[3]  Q. Alsafasfeh and A. Alshabatat, “Image Encryption Based on Synchronized Communication Chaotic Circuit,” Journal of Applied Sciences Research, Vol. 7, No. 4, 2011, pp. 392-399.
[4]  H. Gao, Y. Zhang, S. Liang and D. Li, “A New Chaotic Algorithm for Image Encryption,” Chaos Solitons and Fractals, Vol. 29, No. 2, 2006, pp. 393-399. doi:10.1016/j.chaos.2005.08.110
[5]  C. Fu, Z. Zhang and Y. Cao, “An Improved Image Encryption Algorithm Based on Chaotic Maps,” Third International Conference on Natural Computation, Vol. 3, Washington, 2007, pp. 24-27.
[6]  L. Zhang, X. Liao and X. Wang, “An Image Encryption Approach Based on Chaotic Maps,” Chaos Solitons and Fractals, Vol. 24, No. 3, 2005, pp. 759-765. doi:10.1016/j.chaos.2004.09.035
[7]  S. Bu and B. Wang, “Improving the Security of Chaotic Encryption by Using a Simple Modulating Method,” Chaos Solitons and Fractals, Vol. 19, No. 4, 2003, pp. 919-924. doi:10.1016/S0960-0779(03)00260-1
[8]  X. Wu, H. Hu and B. Zhang, “Analyzing and Improving a Chaotic Encryption Method,” Chaos Solitons and Fractals, Vol. 22, No. 2, 2004, pp. 367-373. doi:10.1016/j.chaos.2004.02.009
[9]  G. Chen, Y. Mao and C. K. Chui, “A Symmetric Image Encryption Scheme Based on 3D Chaotic Cat Maps,” Chaos Solitons and Fractals, Vol. 21, No. 3, 2003, pp. 749-761. doi:10.1016/j.chaos.2003.12.022
[10]  F. Chiaraluce, L. Ciccarelli, E. Gambi, P. Pierleoni and M. Reginelli, “A New Chaotic Algorithm for Video Encryption,” IEEE Transactions on Consumer Electronics, Vol. 48, No. 4, 2002, pp. 838-844. doi:10.1109/TCE.2003.1196410
[11]  K. Wong, B. Kwok and W. Law, “A Fast Image Encryption Scheme Based on Chaotic Standard Map,” City University of Hong Kong, Hong Kong.
[12]  L. Wang, Q. Ye, Y. Xiao, Y. Zou and B. Zhang, “An Image Encryption Scheme Based on Cross Chaotic Map,” Congress on Image and Signal Processing, Sanya, 27-30 May 2008, pp. 27-26.
[13]  Q. Alsafasfeh and M. Alarni, “A New Chaotic Attractor from Lorenz and Rossler Systems and Its Electronic Experimental Implementation,” Circuits and Systems, Vol. 2, No. 2, 2011, pp. 101-105. doi:10.4236/cs.2011.22015
[14]  T. Ga and Z. Chen, “Image Encryption Based on a New Total Shuffling Algorithm,” Chaos Solitons & Fractals, Vol. 38, No. 1, 2008, pp. 213-220. doi:10.1016/j.chaos.2006.11.009
[15]  N. K. Pareek, V. Patidar and K. K. Sud, “Image Encryption Using Chaotic Logistic Map,” Image and Vision Computing, Vol. 24, No. 9, 2006, pp. 926-934. doi:10.1016/j.imavis.2006.02.021
[16]  V. Patidar, N. K. Pareek and K. K. Sud, “A New Substitution-Diffusion Based Image Encrypete Using Chaotic Standard and Logistic Maps,” Communications in Non-Linear Science and Numerical Simulation, Vol. 14, No. 7, 2009, pp. 3056-3075. doi:10.1016/j.cnsns.2008.11.005


comments powered by Disqus

Contact Us


微信:OALib Journal