logo

SCIENCE CHINA Information Sciences, Volume 61, Issue 5: 058104(2018) https://doi.org/10.1007/s11432-017-9191-x

Spatial image encryption algorithm based on chaotic map and pixel frequency

More info
  • ReceivedMay 19, 2017
  • AcceptedJul 19, 2017
  • PublishedNov 20, 2017

Abstract

There is no abstract available for this article.


Acknowledgment

This work was supported by National Natural Science Foundation of China (Grant Nos. 61602124, 61702116), Natural Science Foundations of Guangdong Province of China (Grant Nos. 2016A030310333, 2015A030313614, 2015A030313620), Science and Technology Planning Project of Guangdong Province of China (Grant No. 2017A010101025), China Postdoctoral Science Foundation (Grant No. 2017M611991), Program for Scientific Research Start-up Funds of Guangdong Ocean University of China (Grant No. R17037), and Special Funding Program for Excellent Young Scholars of Guangdong Ocean University of China (Grant No. HDYQ2017006). The authors would like to thank Professor Guanrong Chen at City University of Hong Kong for correcting the expressions in this whole manuscript.


Supplement

Appendix A–C.


References

[1] Dzwonkowski M, Papaj M, Rykaczewski R. A New Quaternion-Based Encryption Method for DICOM Images. IEEE Trans Image Process, 2015, 24: 4614-4622 CrossRef PubMed ADS Google Scholar

[2] Ye G D, Huang X L. An image encryption algorithm based on autoblocking and electrocardiography. IEEE Multimedia, 2016, 23: 64--71. Google Scholar

[3] Jolfaei A, Wu X W, Muthukkumarasamy V. On the Security of Permutation-Only Image Encryption Schemes. IEEE TransInformForensic Secur, 2016, 11: 235-246 CrossRef Google Scholar

[4] Chen G, Mao Y, Chui C K. A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Solitons Fractals, 2004, 21: 749-761 CrossRef ADS Google Scholar

[5] Tong X J, Zhang M, Wang Z. A joint color image encryption and compression scheme based on hyper-chaotic system. NOnlinear Dyn, 2016, 84: 2333-2356 CrossRef Google Scholar

[6] Ge X, Lu B, Liu F. An Image Encryption Algorithm Based on Information Hiding. Int J Bifurcation Chaos, 2016, 26: 1650192 CrossRef ADS Google Scholar

[7] Wang X, Liu C, Xu D. Image encryption scheme using chaos and simulated annealing algorithm. NOnlinear Dyn, 2016, 84: 1417-1429 CrossRef Google Scholar

[8] Belazi A, Abd El-Latif A A, Belghith S. A novel image encryption scheme based on substitution-permutation network and chaos. Signal Processing, 2016, 128: 155-170 CrossRef Google Scholar

  • Figure 1

    Cipher-image of Lena.

  •   
    Algorithm 1 (For encryption)
    Input: image $P$, keys $x_{0}$, $y_{0}$, $z_{0}$.
    Output: image $E$.
    Let $D=P$, $E=zeros(m,~n)$;
    for $i=1:m$ do
    D(1, :)=[~];
    Compute $s$ using Eq. (2) for $D$;
    $s=floor(s\times10^{14})+i~\textrm{mod}~m$;
    $H=T((i-1)n+1+s:~in+s)$;
    $E(i,~:)=~P(i,~:)+H+E(i-1,~:)~\textrm{mod}~256$;
    end for
  •   
    Algorithm 2 (For encryption)
    Input: image $E$, keys $x_{0}$, $y_{0}$, $z_{0}$.
    Output: cipher-image $C$.
    Let $D=E$, $C=zeros(m,~n)$;
    for $j=1:n$ do
    D(:, 1)=[~];
    Compute $s$ using Eq. (2) for $D$;
    $s=floor(s\times10^{14})+j~\textrm{mod}~n$;
    $L=T((j-1)m+1+s:~jm+s)$;
    $C(:,~j)=~E(:,~j)+L+C(:,~j-1)~\textrm{mod}~256$;
    end for

Copyright 2020 Science China Press Co., Ltd. 《中国科学》杂志社有限责任公司 版权所有

京ICP备18024590号-1       京公网安备11010102003388号