Research Output
A secure image encryption scheme based on chaotic maps and affine transformation
  Due to the interesting nonlinear dynamic properties of chaotic maps, recently chaos-based encryption algorithms have gained much attention in cryptographic communities. However, many encryption schemes do not fulfil the minimum key space requirement, which is an essential concern in many secure data applications. In this paper, an efficient chaos-based image encryption scheme with higher key space is presented. Even with a single round of encryption, a significantly larger key space can be achieved. The proposed scheme removes correlation among image pixels via random chaotic sequences, simply by XOR and addition operations. In order to resist against numerous attacks, we apply the affine transformation to get the final ciphertext image. The security of the proposed scheme is proved through histogram, contrast, PSNR, entropy, correlation, key space, key sensitivity and differential attack analysis. Many significant properties of chaotic maps, sensitivity to initial condition and control parameters, structure and attack complexity, make the anticipated scheme very reliable, practical and robust in various secure communication applications.

  • Type:

    Article

  • Date:

    15 October 2015

  • Publication Status:

    Published

  • Publisher

    Springer Science and Business Media LLC

  • DOI:

    10.1007/s11042-015-2973-y

  • Cross Ref:

    2973

  • ISSN:

    1380-7501

  • Library of Congress:

    QA75 Electronic computers. Computer science

  • Dewey Decimal Classification:

    004 Data processing & computer science

  • Funders:

    Ministry of Science, ICT and Future Planning; National Research Foundation of Korea

Citation

Ahmad, J., & Hwang, S. O. (2016). A secure image encryption scheme based on chaotic maps and affine transformation. Multimedia Tools and Applications, 75(21), 13951-13976. https://doi.org/10.1007/s11042-015-2973-y

Authors

Keywords

Chaotic maps; Cryptography; Key space; TD-ERCS map; PWLCM; Image encryption; Affine transformation; Security analysis; Secure communication

Monthly Views:

Available Documents