Limits...
A new color image encryption scheme using CML and a fractional-order chaotic system.

Wu X, Li Y, Kurths J - PLoS ONE (2015)

Bottom Line: The cryptosystem speed is analyzed and tested as well.Moreover, an extensive tolerance analysis of some common image processing operations such as noise adding, cropping, JPEG compression, rotation, brightening and darkening, has been performed on the proposed image encryption technique.Corresponding results reveal that the proposed image encryption method has good robustness against some image processing operations and geometric attacks.

View Article: PubMed Central - PubMed

Affiliation: College of Software, Henan University, Kaifeng, China; Potsdam Institute for Climate Impact Research (PIK), Potsdam, Germany; Department of Physics, Humboldt University zu Berlin, Berlin, Germany.

ABSTRACT
The chaos-based image cryptosystems have been widely investigated in recent years to provide real-time encryption and transmission. In this paper, a novel color image encryption algorithm by using coupled-map lattices (CML) and a fractional-order chaotic system is proposed to enhance the security and robustness of the encryption algorithms with a permutation-diffusion structure. To make the encryption procedure more confusing and complex, an image division-shuffling process is put forward, where the plain-image is first divided into four sub-images, and then the position of the pixels in the whole image is shuffled. In order to generate initial conditions and parameters of two chaotic systems, a 280-bit long external secret key is employed. The key space analysis, various statistical analysis, information entropy analysis, differential analysis and key sensitivity analysis are introduced to test the security of the new image encryption algorithm. The cryptosystem speed is analyzed and tested as well. Experimental results confirm that, in comparison to other image encryption schemes, the new algorithm has higher security and is fast for practical image encryption. Moreover, an extensive tolerance analysis of some common image processing operations such as noise adding, cropping, JPEG compression, rotation, brightening and darkening, has been performed on the proposed image encryption technique. Corresponding results reveal that the proposed image encryption method has good robustness against some image processing operations and geometric attacks.

No MeSH data available.


Related in: MedlinePlus

Test of image under rotation.(a) Rotated cipher-image of Lena, (b) decrypted image under rotation.
© Copyright Policy
Related In: Results  -  Collection

License
getmorefigures.php?uid=PMC4380443&req=5

pone.0119660.g017: Test of image under rotation.(a) Rotated cipher-image of Lena, (b) decrypted image under rotation.

Mentions: Image rotation makes the coordinate axes changed. Without synchronization of the orthogonal axes, one cannot decrypt the cipher-image correctly. Here, we do not consider the question of how to recover the axes, which have been geometrically distorted. We assume that the distorted axes have been recovered before the cipher-image is decrypted. Simulations have shown that in this case we can still decipher the encrypted image (Fig. 17(b)) when the ciphered image is rotated by 45°, as shown in Fig. 17(a). Here the value of PSNR is 18.65dB.


A new color image encryption scheme using CML and a fractional-order chaotic system.

Wu X, Li Y, Kurths J - PLoS ONE (2015)

Test of image under rotation.(a) Rotated cipher-image of Lena, (b) decrypted image under rotation.
© Copyright Policy
Related In: Results  -  Collection

License
Show All Figures
getmorefigures.php?uid=PMC4380443&req=5

pone.0119660.g017: Test of image under rotation.(a) Rotated cipher-image of Lena, (b) decrypted image under rotation.
Mentions: Image rotation makes the coordinate axes changed. Without synchronization of the orthogonal axes, one cannot decrypt the cipher-image correctly. Here, we do not consider the question of how to recover the axes, which have been geometrically distorted. We assume that the distorted axes have been recovered before the cipher-image is decrypted. Simulations have shown that in this case we can still decipher the encrypted image (Fig. 17(b)) when the ciphered image is rotated by 45°, as shown in Fig. 17(a). Here the value of PSNR is 18.65dB.

Bottom Line: The cryptosystem speed is analyzed and tested as well.Moreover, an extensive tolerance analysis of some common image processing operations such as noise adding, cropping, JPEG compression, rotation, brightening and darkening, has been performed on the proposed image encryption technique.Corresponding results reveal that the proposed image encryption method has good robustness against some image processing operations and geometric attacks.

View Article: PubMed Central - PubMed

Affiliation: College of Software, Henan University, Kaifeng, China; Potsdam Institute for Climate Impact Research (PIK), Potsdam, Germany; Department of Physics, Humboldt University zu Berlin, Berlin, Germany.

ABSTRACT
The chaos-based image cryptosystems have been widely investigated in recent years to provide real-time encryption and transmission. In this paper, a novel color image encryption algorithm by using coupled-map lattices (CML) and a fractional-order chaotic system is proposed to enhance the security and robustness of the encryption algorithms with a permutation-diffusion structure. To make the encryption procedure more confusing and complex, an image division-shuffling process is put forward, where the plain-image is first divided into four sub-images, and then the position of the pixels in the whole image is shuffled. In order to generate initial conditions and parameters of two chaotic systems, a 280-bit long external secret key is employed. The key space analysis, various statistical analysis, information entropy analysis, differential analysis and key sensitivity analysis are introduced to test the security of the new image encryption algorithm. The cryptosystem speed is analyzed and tested as well. Experimental results confirm that, in comparison to other image encryption schemes, the new algorithm has higher security and is fast for practical image encryption. Moreover, an extensive tolerance analysis of some common image processing operations such as noise adding, cropping, JPEG compression, rotation, brightening and darkening, has been performed on the proposed image encryption technique. Corresponding results reveal that the proposed image encryption method has good robustness against some image processing operations and geometric attacks.

No MeSH data available.


Related in: MedlinePlus