Abstract
The article proposes a new algorithm to improve the security of image encryption based on twodimensional chaotic maps. Chaotic maps are often used in encrypting images. However, the encryption has periodicity, no diffusion, and at the same time, the real keys space of encryption are fewer than the theoretical keys space, which consequently results in potential security problems. Thus, this article puts forward several ways to solve the problems including adding diffusion mechanism, changing the design of keys and developing a composite encryption system. It designs an algorithm for the version B of the discretized baker map, which is one of the most prevalent chaotic maps, based on which a new image encryption is proposed to avoid the above problems. The simulation results show that the new encryption algorithm is valid and the result can be applied to other two-dimensional chaotic maps, such as the cat map.
Article PDF
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.Avoid common mistakes on your manuscript.
References
Schneier B. Applied Cryptography - Protocols, Algorithms, and Source Code in C. 2nd ed. New York: John Wiley & Sons, Inc., 1996
Shannon C E. Communication theory of secrecy systems. The Bell System Technical Journal, 1949, 28(4): 656–715
Matthews R. On the derivation of a “chaotic” encryption algorithm. Cryptologia, 1989, 13(1): 29–42
Dachselt F, Schwarz W. Chaos and cryptography. IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications, 2001, 48(12): 1498–1509
Lian S G, Sun J S, Wang J W, Wang Z Q. A chaotic stream cipher and the usage in video protection. Chaos, Solitons & Fractals, 2007, 34(3): 851–859
Wheeler D D. Problems with chaotic cryptosystems. Cryptologia, 1989, 13 (3): 243–250
Li S J, Mou X Q, Cai Y L, Ji Z, Zhang J H. On the security of a chaotic encryption scheme: problems with computerized chaos in finite computing precision. Computer Physics Communications, 2003, 153(1): 52–58
Fridrich J. Symmetric ciphers based on two-dimensional chaotic maps. International Journal of Bifurcation and Chaos, 1998, 8(6): 1259–1284
Feng Y, Li L J, Huang F. A symmetric image encryption approach based on line maps. In: Proceedings of the 1st International Symposium on Systems and Control in Aerospace and Astronautics (ISSCAA 2006). 2006, 1362–1367
Chen G R, Mao Y B, Chui C K. A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons & Fractals, 2004, 21(3): 749–761
Mao Y B, Chen G R, Lian S G. A novel fast image encryption scheme based on 3D chaotic baker maps. International Journal of Bifurcation and Chaos, 2004, 14(10): 3613–3624
Author information
Authors and Affiliations
Corresponding author
Additional information
__________
Translated from Journal of Harbin Institute of Technology, 2007, 39(9): 1411–1414 [译自: 哈尔滨工业大学学报]
About this article
Cite this article
Huang, F., Feng, Y. Security analysis of image encryption based on twodimensional chaotic maps and improved algorithm. Front. Electr. Electron. Eng. China 4, 5–9 (2009). https://doi.org/10.1007/s11460-009-0016-z
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11460-009-0016-z