Limits...
An improved piecewise linear chaotic map based image encryption algorithm.

Hu Y, Zhu C, Wang Z - ScientificWorldJournal (2014)

Bottom Line: The order of processing pixels is not in accordance with the index of pixels, but it is from beginning or end alternately.The cipher feedback was introduced in diffusion process.Test results and security analysis show that not only the scheme can achieve good encryption results but also its key space is large enough to resist against brute attack.

View Article: PubMed Central - PubMed

Affiliation: School of Information, Guangdong University of Finance & Economics, Guangzhou 510320, China.

ABSTRACT
An image encryption algorithm based on improved piecewise linear chaotic map (MPWLCM) model was proposed. The algorithm uses the MPWLCM to permute and diffuse plain image simultaneously. Due to the sensitivity to initial key values, system parameters, and ergodicity in chaotic system, two pseudorandom sequences are designed and used in the processes of permutation and diffusion. The order of processing pixels is not in accordance with the index of pixels, but it is from beginning or end alternately. The cipher feedback was introduced in diffusion process. Test results and security analysis show that not only the scheme can achieve good encryption results but also its key space is large enough to resist against brute attack.

Show MeSH
Sensitivity to the secret keys. (a) Cameraman decrypted by correct keys; (b) Cameraman decrypted by wrong keys.
© Copyright Policy - open-access
Related In: Results  -  Collection


getmorefigures.php?uid=PMC3921974&req=5

fig6: Sensitivity to the secret keys. (a) Cameraman decrypted by correct keys; (b) Cameraman decrypted by wrong keys.

Mentions: A good encryption algorithm should also be sensitive to the secret keys. For the MPWLCM system, the sensitivity to x0 and q is considered as 10−16; Figure 6 shows the sensitivity to the key. Figure 6(a) is the decrypted Cameraman by correct key (x0 = 0.27) and Figure 6(b) is the decrypted Cameraman by the wrong key (x0 = 0.27 + 10−16) with a tiny change (10−16).


An improved piecewise linear chaotic map based image encryption algorithm.

Hu Y, Zhu C, Wang Z - ScientificWorldJournal (2014)

Sensitivity to the secret keys. (a) Cameraman decrypted by correct keys; (b) Cameraman decrypted by wrong keys.
© Copyright Policy - open-access
Related In: Results  -  Collection

Show All Figures
getmorefigures.php?uid=PMC3921974&req=5

fig6: Sensitivity to the secret keys. (a) Cameraman decrypted by correct keys; (b) Cameraman decrypted by wrong keys.
Mentions: A good encryption algorithm should also be sensitive to the secret keys. For the MPWLCM system, the sensitivity to x0 and q is considered as 10−16; Figure 6 shows the sensitivity to the key. Figure 6(a) is the decrypted Cameraman by correct key (x0 = 0.27) and Figure 6(b) is the decrypted Cameraman by the wrong key (x0 = 0.27 + 10−16) with a tiny change (10−16).

Bottom Line: The order of processing pixels is not in accordance with the index of pixels, but it is from beginning or end alternately.The cipher feedback was introduced in diffusion process.Test results and security analysis show that not only the scheme can achieve good encryption results but also its key space is large enough to resist against brute attack.

View Article: PubMed Central - PubMed

Affiliation: School of Information, Guangdong University of Finance & Economics, Guangzhou 510320, China.

ABSTRACT
An image encryption algorithm based on improved piecewise linear chaotic map (MPWLCM) model was proposed. The algorithm uses the MPWLCM to permute and diffuse plain image simultaneously. Due to the sensitivity to initial key values, system parameters, and ergodicity in chaotic system, two pseudorandom sequences are designed and used in the processes of permutation and diffusion. The order of processing pixels is not in accordance with the index of pixels, but it is from beginning or end alternately. The cipher feedback was introduced in diffusion process. Test results and security analysis show that not only the scheme can achieve good encryption results but also its key space is large enough to resist against brute attack.

Show MeSH