A new algorithm of the combination of image compression and encryption technology based on cross chaotic map

Springer Science and Business Media LLC - Tập 72 - Trang 229-241 - 2013
Xiao-Jun Tong1, Zhu Wang1, Miao Zhang1, Yang Liu1
1School of Computer Science and Technology, Harbin Institute of Technology, Weihai, China

Tóm tắt

Since the size of the image file is not reduced after encryption, the flow rate of image file transmission cannot be reduced. Transmission time is wasted. To meet the requirements of security and real-time, wavelet transform and chaotic image encryption technology are combined. A cross-chaos map has been proposed based on Devaney’s theory. The image pixels are scrambled under the control of high-dimensional chaotic sequence, which is generated by the cross chaotic map. The image pixels are substituted by the ciphertext feedback algorithm. The algorithm can relate to encryption parameters with plaintext, and can make one plaintext byte affect more ciphertext bytes. In the process of image wavelet transform, image encryption and image compression are combined. The low frequency region of the wavelet transform is encrypted. Security analysis and experimental validation illuminated that the algorithm has high security, good encryption speed, and compression effect. The algorithm has good practical value.

Tài liệu tham khảo

Zong, S.D.: Information Security and Application Infrastructure. Chongqing University Press, Chongqing (2005) Kocarev, L., Jakimoski, G., Stojanovski, T., From, P.U.: Chaotic maps to encryption schemes. In: Symposium on Circuits and Systems, vol. 4, pp. 514–517 (1998) Wang, X.Y.: Complex Chaos in Nonlinear System. Publishing House of Electronics Industry, Beijing (2003) Palmore, J.: Computer arithmetic chaos and fractals. Physica D 42, 99–110 (2006) NIST: A statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications, vol. 5, pp. 6–125 (2001) Liu, J.L., Zhang, H., Wang, Y.: Analysis and improvement of a class of iterative chaos block cipher. Comput. Sci. 16, 141–144 (2008) Zhang, Y., Li, C., Li, Q.: Breaking a chaotic image encryption algorithm based on perceptron model. Nonlinear Dyn. 69, 1091–1096 (2012) Li, C.Q., Lo, K.T.: Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks. Signal Process. 91, 49–54 (2011) Wang, Y., Wong, K.W., Liao, X., Chen, G.: A new chaos-based fast image encryption algorithm. Appl. Soft Comput. 11, 514–522 (2011) Solak, E., Yildiz, O.T., Biyikoglu, T.: Cryptanalysis of Fridrich’s chaotic image encryption. Int. J. Bifurc. Chaos Appl. Sci. Eng. 20, 5–13 (2010) Shatheesh Sam, I., Devaraj, P., Bhuvaneswaran, R.S.: An intertwining chaotic maps based image encryption scheme. Nonlinear Dynamics 69, 1995–2007 (2012) Liu, F.: Video image coding technology and international standards. Beijing University of Posts and Telecommunications Press, Beijing (2005) Wang, Y.: Image encryption based on chaotic sequence of research. Comput. Eng. Appl. 20, 99–102 (2002) Patidar, V., Pareek, N.K., Sud, K.K.: A new substitution-diffusion based image cipher using chaotic standard and logistic maps. Commun. Nonlinear Sci. Numer. Simul. 14, 3056–3075 (2009) Hu, R., Wang, L., Luo, Z.W.: Wavelet domain image encryption modulo operation to achieve. Comput. Eng. Appl. 20, 99–102 (2002) Han, F.Y., Zhu, C.X.: One kid based on double dimensional chaos system picture encryption algorithm. Comput. Eng. Appl. 43, 50–51 (2007) Geisel, T., Fairen, V.: Statistical properties of chaos in Chebyshev maps. Phys. Lett. A 105, 263–266 (1984) Wang, L., Ye, Q., Xiao, Y., Zou, Y., Zhang, B.: An image encryption scheme based on cross chaotic map. In: International Congress on Image and Signal Processing, vol. 3, pp. 22–26 (2008)