Efficient image encryption with block shuffling and chaotic map
详细信息    查看全文
  • 作者:Zhenjun Tang ; Xianquan Zhang ; Weiwei Lan
  • 关键词:Image encryption ; Image scrambling ; Arnold transform ; Block shuffling ; Chaotic map ; Skew tent map
  • 刊名:Multimedia Tools and Applications
  • 出版年:2015
  • 出版时间:July 2015
  • 年:2015
  • 卷:74
  • 期:15
  • 页码:5429-5448
  • 全文大小:3,262 KB
  • 参考文献:1.Alvarez G, Li S (2006) Some basic cryptographic requirements for chaos-based cryptosystems. Int J Bifurcation Chaos 16(8):2129鈥?151MathSciNet View Article MATH
    2.Ginesu G, Giusto DD, Onali T (2006) Wavelet domain scrambling for image-based authentication. In: Proc. of International Conference on Acoustics, Speech, and Signal Processing (ICASSP), pp. 313鈥?16
    3.Hermassi H, Belazi A, Rhouma R, Belghith SM (2013) Security analysis of an image encryption algorithm based on a DNA addition combining with chaotic maps. Multimed Tools Appl. doi:10.鈥?007/鈥媠11042-013-1533-6
    4.Monga V, Evans BL (2006) Perceptual image hashing via feature points: performance evaluation and tradeoffs. IEEE Trans Image Proc 15(11):3452鈥?465View Article
    5.Pareek NK, Patidar V, Sud KK (2006) Image encryption using chaotic logistic map. Image Vision Comput 24(9):926鈥?34View Article
    6.Patidar V, Pareek NK, Purohit G, Sud KK (2011) Robust and secure chaotic standard map based pseudorandom permutation-substitution scheme for image encryption. Opt Commun 284(19):4331鈥?339View Article
    7.Qi D (1999) Matrix transformation and its application to image hiding. J North China Univ Technol 11(1):24鈥?8 (in Chinese)
    8.Qin C, Wang Z, Chang CC (2012) Reversible data hiding scheme based on image inpainting. Fundam Informaticae 120(1):59鈥?0MathSciNet
    9.Shang Z, Ren H, Zhang J (2008) A block location scrambling algorithm of digital image based on Arnold transformation. In: Proc. of the 9th International Conference for Young Computer Scientists, pp. 2942鈥?947
    10.Shannon CE (1948) A mathematical theory of communication. Bell Syst Tech J 27(3):379鈥?23, 623鈥?56MathSciNet View Article
    11.Sun F, L眉 Z, Liu S (2010) A new cryptosystem based on spatial chaotic system. Opt Commun 283(10):2066鈥?073View Article
    12.Tang Z, Huang L, Dai Y, Yang F (2012) Robust image hashing based on multiple histograms. Int J Digit Content Technol Appl 6(23):39鈥?7View Article
    13.Tang Z, Lan W, Dai Y, He J (2011) Image encryption using mapping array and random division. ICIC Express Lett Part B Appl 2(6):1297鈥?302
    14.Tang Z, Wang S, Zhang X, Wei W, Su S (2008) Robust image hashing for tamper detection using nonnegative matrix factorization. J Ubiquit Converg Technol 2(1):18鈥?6
    15.Tang Z, Zhang X (2011) Secure image encryption without size limitation using Arnold transform and random strategies. J Multimed 6(2):202鈥?06View Article
    16.Tang Z, Zhang X, Dai Y, Lan W (2013) Perceptual image hashing using local entropies and DWT. Imaging Sci J 61(2):241鈥?51View Article
    17.The SSIM Index for Image Quality Assessment. [Online] Available: http://鈥媤ww.鈥媍ns.鈥媙yu.鈥媏du/鈥媗cv/鈥媠sim/鈥?/span>
    18.USC-SIPI Image Database. [Online] Available: http://鈥媠ipi.鈥媢sc.鈥媏du/鈥媎atabase/鈥?/span>
    19.Van De Ville D, Philips W, Van de Walle R, Lemanhieu I (2004) Image scrambling without bandwidth expansion. IEEE Trans Circ Syst Video Technol 14(6):892鈥?97View Article
    20.Venkatesan R, Koon S M, Jakubowski M H, Moulin P (2000) Robust image hashing. In: Proc. of International Conference on Image Processing (ICIP), pp. 664鈥?66
    21.Wang Z, Bovik AC, Sheikh HR, Simoncelli EP (2004) Image quality assessment: from error visibility to structural similarity. IEEE Trans Image Proc 13(4):600鈥?12View Article
    22.Wang Q, Guo Q, Zhou J (2012) Double image encryption based on linear blend operation and random phase encoding in fractional Fourier domain. Opt Commun 285(21鈥?2):4317鈥?323View Article
    23.Watanabe O, Nakazaki A, Kiya H (2004) A fast image-scramble method using public-key encryption allowing backward compatibility with JPEG2000. In: Proc. of International Conference on Image Processing (ICIP), pp. 3435鈥?438
    24.Wu Y, Zhou Y, Saveriades G, Agaian S, Noonan JP (2013) Local Shannon entropy measure with statistical tests for image randomness. Inf Sci 222:323鈥?42MathSciNet View Article MATH
    25.Xiang S, Kim H J, Huang J (2007) Histogram-based image hashing scheme robust against geometric deformations. In: Proceedings of the 9th Workshop on Multimedia & Security, ACM, New York, NY, USA, pp. 121鈥?28
    26.Zhang G, Liu Q (2011) A novel image encryption method based on total shuffling scheme. Opt Commun 284(12):2775鈥?780View Article
    27.Zhou Y, Panetta K, Agaian S, Philip Chen CL (2012) Image encryption using P-Fibonacci transform and decomposition. Opt Commun 285(5):594鈥?08View Article
    28.Zhu L, Li W, Liao L, Li H (2006) A novel algorithm for scrambling digital image based on cat chaotic mapping. In: Proc. of International Conference on Intelligent Information Hiding and Multimedia, Signal Processing (IIH-MSP), pp. 601鈥?04
  • 作者单位:Zhenjun Tang (1)
    Xianquan Zhang (1) (2) (3)
    Weiwei Lan (1)

    1. Department of Computer Science, Guangxi Normal University, No. 15 Yucai Road, Guilin, 541004, People鈥檚 Republic of China
    2. Guangxi Experiment Center of Information Science, Guilin University of Electronic Technology, Guilin, 541004, China
    3. Guangxi Key Laboratory of Trusted Software, Guilin University of Electronic Technology, Guilin, 541004, China
  • 刊物类别:Computer Science
  • 刊物主题:Multimedia Information Systems
    Computer Communication Networks
    Data Structures, Cryptology and Information Theory
    Special Purpose and Application-Based Systems
  • 出版者:Springer Netherlands
  • ISSN:1573-7721
文摘
Image encryption is a useful technique for many applications, such as image content protection, image authentication, pay-TV and data hiding. In this paper, we propose an efficient image encryption algorithm with block shuffling and chaotic map. The proposed algorithm divides an input image into overlapping blocks, shuffles image blocks to make initial encryption, exploits a chaotic map and Arnold transform to generate secret matrices, and achieves final encryption by conducting exclusive OR operations between corresponding elements of each block and a random secret matrix. Many experiments are done to validate efficiency and advantages of the proposed algorithm.
NGLC 2004-2010.National Geological Library of China All Rights Reserved.
Add:29 Xueyuan Rd,Haidian District,Beijing,PRC. Mail Add: 8324 mailbox 100083
For exchange or info please contact us via email.