Limits...
An improved piecewise linear chaotic map based image encryption algorithm.

Hu Y, Zhu C, Wang Z - ScientificWorldJournal (2014)

Bottom Line: The order of processing pixels is not in accordance with the index of pixels, but it is from beginning or end alternately.The cipher feedback was introduced in diffusion process.Test results and security analysis show that not only the scheme can achieve good encryption results but also its key space is large enough to resist against brute attack.

View Article: PubMed Central - PubMed

Affiliation: School of Information, Guangdong University of Finance & Economics, Guangzhou 510320, China.

ABSTRACT
An image encryption algorithm based on improved piecewise linear chaotic map (MPWLCM) model was proposed. The algorithm uses the MPWLCM to permute and diffuse plain image simultaneously. Due to the sensitivity to initial key values, system parameters, and ergodicity in chaotic system, two pseudorandom sequences are designed and used in the processes of permutation and diffusion. The order of processing pixels is not in accordance with the index of pixels, but it is from beginning or end alternately. The cipher feedback was introduced in diffusion process. Test results and security analysis show that not only the scheme can achieve good encryption results but also its key space is large enough to resist against brute attack.

Show MeSH
Histogram of the plain image and the cipher image. (a) Plain Lena, (b) encrypted Lena, (c) histogram of plain Lena, (d) histogram of encrypted Lena.
© Copyright Policy - open-access
Related In: Results  -  Collection


getmorefigures.php?uid=PMC3921974&req=5

fig4: Histogram of the plain image and the cipher image. (a) Plain Lena, (b) encrypted Lena, (c) histogram of plain Lena, (d) histogram of encrypted Lena.

Mentions: Histograms of Encrypted Images. Select several 256 gray-level images with size of 256 × 256 which have different contents and calculate their histograms. One typical example (Sailboat) among them is shown in Figure 4. From Figure 4, we can see that the histogram of the cipher image is fairly uniformed and is significantly different from that of the original image.


An improved piecewise linear chaotic map based image encryption algorithm.

Hu Y, Zhu C, Wang Z - ScientificWorldJournal (2014)

Histogram of the plain image and the cipher image. (a) Plain Lena, (b) encrypted Lena, (c) histogram of plain Lena, (d) histogram of encrypted Lena.
© Copyright Policy - open-access
Related In: Results  -  Collection

Show All Figures
getmorefigures.php?uid=PMC3921974&req=5

fig4: Histogram of the plain image and the cipher image. (a) Plain Lena, (b) encrypted Lena, (c) histogram of plain Lena, (d) histogram of encrypted Lena.
Mentions: Histograms of Encrypted Images. Select several 256 gray-level images with size of 256 × 256 which have different contents and calculate their histograms. One typical example (Sailboat) among them is shown in Figure 4. From Figure 4, we can see that the histogram of the cipher image is fairly uniformed and is significantly different from that of the original image.

Bottom Line: The order of processing pixels is not in accordance with the index of pixels, but it is from beginning or end alternately.The cipher feedback was introduced in diffusion process.Test results and security analysis show that not only the scheme can achieve good encryption results but also its key space is large enough to resist against brute attack.

View Article: PubMed Central - PubMed

Affiliation: School of Information, Guangdong University of Finance & Economics, Guangzhou 510320, China.

ABSTRACT
An image encryption algorithm based on improved piecewise linear chaotic map (MPWLCM) model was proposed. The algorithm uses the MPWLCM to permute and diffuse plain image simultaneously. Due to the sensitivity to initial key values, system parameters, and ergodicity in chaotic system, two pseudorandom sequences are designed and used in the processes of permutation and diffusion. The order of processing pixels is not in accordance with the index of pixels, but it is from beginning or end alternately. The cipher feedback was introduced in diffusion process. Test results and security analysis show that not only the scheme can achieve good encryption results but also its key space is large enough to resist against brute attack.

Show MeSH