Abstract
Combined with two chaotic maps, a novel alternate structure is applied to image cryptosystem. In proposed algorithm, a general cat-map is used for permutation and diffusion, as well as the OCML (one-way coupled map lattice), which is applied for substitution. These two methods are operated alternately in every round of encryption process, where two subkeys employed in different chaotic maps are generated through the masterkey spreading. Decryption has the same structure with the encryption algorithm, but the masterkey in each round should be reversely ordered in decryption. The cryptanalysis shows that the proposed algorithm bears good immunities to many forms of attacks. Moreover, the algorithm features high execution speed and compact program, which is suitable for various software and hardware applications.
Article PDF
Similar content being viewed by others
Avoid common mistakes on your manuscript.
References
Ogorzatek M J, Dedieu H. Some tools for attacking secure communication systems employing chaotic carriers. In: Proceedings of the 1998 IEEE Symposium on Circuits and Systems, Monterey, 1998, 522–525
Alvarez G, Montoya F, Romera M, et al. Breaking two secure communication systems based on chaotic masking. IEEE Trans Circ Syst, 2004, 51(10): 505–506
Hu G J, Feng Z J, Meng R L. Chosen ciphertext attack on chaos communication based on chaotic synchronization. IEEE Trans Circ Syst, 2003, 50(20): 275–279
Ma Z G, Qiu S S. An image cryptosystem based on general cat map. J China Inst Commun (in Chinese), 2003, 24(2): 51–57
Fridrich J. Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifurc Chaos, 1998, 8(6): 1259–1284
Kaneko K. Spatiotemporal chaos in one-and two-dimensional coupled map lattices. Phys D, 1989, 37: 60–82
Guo J S, Jin C H. An attack with known image to an image cryptosystem based on general cat map. J China Inst Commun (in Chinese), 2005, 26(2): 131–135
Chen G, Mao Y, Chui C K. A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons & Fractals, 2004, 21(3): 749–761
Wang S H, Xiao J H, Wang X G, et al. Spatial orders appearing at instabilities of synchronous chaos of spatiotemporal systems. Eur Phys J B, 2002, 30(4): 571–575
Feistel H. Cryptography and computer privacy. Sci Am, 1973, 228(5): 15–23
Webster A F, Tavares S E. On the design of S-boxes. Advances in Cryptology: Proceedings of CRYPTO’85. Berlin: Springer-Verlag, 1985, 523–534
Author information
Authors and Affiliations
Corresponding author
Additional information
Supported by the National Natural Science Foundation of China (Grant No. 60473027)
Rights and permissions
About this article
Cite this article
Zhang, Y., Wang, Y. & Shen, X. A chaos-based image encryption algorithm using alternate structure. SCI CHINA SER F 50, 334–341 (2007). https://doi.org/10.1007/s11432-007-0026-5
Received:
Accepted:
Issue Date:
DOI: https://doi.org/10.1007/s11432-007-0026-5