An image encryption approach based on chaotic maps. (English) Zbl 1083.94011

Summary: It is well-known that images are different from texts in many aspects, such as highly redundancy and correlation, the local structure and the characteristics of amplitude-frequency. As a result, the methods of conventional encryption cannot be applicable to images. In this paper, we improve the properties of confusion and diffusion in terms of discrete exponential chaotic maps, and design a key scheme for the resistance to statistic attack, differential attack and grey code attack. Experimental and theoretical results also show that our scheme is efficient and very secure.


94A60 Cryptography
94A08 Image processing (compression, reconstruction, etc.) in information and communication theory
Full Text: DOI


[1] Habutsu, T., A secret cryptosystem by iterating a chaotic map, Eurocrypt, 127-140, (1991) · Zbl 0766.94011
[2] Álvarez, E.; Fernandez, A., New approach to chaotic encryption, Phys lett A, 263, 373-375, (1999)
[3] Baptista, M.S., Cryptography with chaos, Phys lett A, 240, 50-54, (1998) · Zbl 0936.94013
[4] Álvarez, G.; Montoya, F., Cryptanalytic methods in chaotic cryptosystems, Phys lett A, 311, 172-179, (2003) · Zbl 1027.94009
[5] Jakimoski, G.; Kocarev, L., Chaos and cryptography: block encryption ciphers based on chaotic maps, IEEE trans circ syst—I, 48, 20, 163-169, (2001) · Zbl 0998.94016
[6] Jakimoski, G.; Kocarev, L., Analysis of some recently proposed chaos-based encryption algorithms, Phys lett A, 291, 381-384, (2001) · Zbl 0978.68061
[7] Wang, K.-W., A combined cryptographic and hashing scheme, Phys lett A, 307, 292-298, (2003) · Zbl 1008.94018
[8] Li, S.; Mou, X., Performance analysis of jakimoski-kocarev attack on a class of chaotic cryptosystems, Phys lett A, 307, 22-28, (2003) · Zbl 1006.94018
[9] Li, S.; Mou, X., Improving security of a chaotic encryption approach, Phys lett A, 290, 127-133, (2001)
[10] Jakimoski, G.; Kocarev, L., Differential and linear probabilities of a block-encryption cipher, IEEE trans circ syst—I, 50, 1, 121-123, (2003) · Zbl 1368.94103
[11] Tang, G., Chaos-based cryptograph incorporated with S-box algebraic operation, Phys lett A, 3189, 388-398, (2003) · Zbl 1031.94015
[12] Matsui, M., Linear cryptanalysis method for des cipher, (), 3-72
[13] Chen, G.; Mao, Y., A symmetric image encryption scheme based on 3D chaotic cat maps, J chaos, solitons & fractals, 21, 749-761, (2004) · Zbl 1049.94009
[14] Zhou, H.; Ling, X., Generating chaotic secure sequences with desired statistical properties and high security, Int J bifurc chaos, 7, 1, 205-213, (1997) · Zbl 0884.94013
[15] Li, S.; Mou, X., On the security of a chaotic encryption scheme: problems with computerized chaos in finite computing precision, Comput phys commun, 153, 52-58, (2003) · Zbl 1196.94057
[16] Gonzalez, J.A.; Pino, R., Chaotic and stochastic functions, Physica, 76, 425-440, (2000)
[17] Li, C., An image encryption algorithm based on random key and quasi-standard map, Chin J comput, 26, 4, 465-469, (2003), [in Chinese]
[18] Kohda, T., Information sources using chaotic dynamics, Proc IEEE, 90, 5, 641-661, (2002)
[19] Qiu, Y.; He, C., Construction and analysis of one class chaotic running key generator, J Shanghai jiaotong univ, 136, 3, 344-347, (2002), [in Chinese]
[20] Li, H.; Feng, D., Composite discrete chaotic dynamical systems and keyed hash functions, Chin J comput, 26, 4, 460-464, (2003), [in Chinese]
[21] Götz, M.; Kelber, K., Discrete-time chaotic encryption system—part I: statistical design approach, IEEE trans circ syst—I, 44, 10, 963-970, (1997)
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. It attempts to reflect the references listed in the original paper as accurately as possible without claiming the completeness or perfect precision of the matching.