##
**Analysis and improvement of a chaos-based image encryption algorithm.**
*(English)*
Zbl 1198.94132

Summary: The security of digital image attracts much attention recently. In Zh. Guan et al. [Phys. Lett., A 346, No. 1–3, 153–157 (2005; Zbl 1195.94056)], a chaos-based image encryption algorithm has been proposed. In this paper, the cause of potential flaws in the original algorithm is analyzed in detail, and then the corresponding enhancement measures are proposed. Both theoretical analysis and computer simulation indicate that the improved algorithm can overcome these flaws and maintain all the merits of the original one.

Editorial remark: There are doubts about a proper peer-reviewing procedure of this journal. The editor-in-chief has retired, but, according to a statement of the publisher, articles accepted under his guidance are published without additional control.

Editorial remark: There are doubts about a proper peer-reviewing procedure of this journal. The editor-in-chief has retired, but, according to a statement of the publisher, articles accepted under his guidance are published without additional control.

### MSC:

94A60 | Cryptography |

94A08 | Image processing (compression, reconstruction, etc.) in information and communication theory |

37N99 | Applications of dynamical systems |

### Citations:

Zbl 1195.94056
PDF
BibTeX
XML
Cite

\textit{D. Xiao} et al., Chaos Solitons Fractals 40, No. 5, 2191--2199 (2009; Zbl 1198.94132)

Full Text:
DOI

### References:

[1] | Guan, Z.; Huang, F.; Guan, W., Chaos-based image encryption algorithm, Phys Lett A, 346, 153-157 (2005) · Zbl 1195.94056 |

[2] | Fridrich, J., Symmetric ciphers based on two-dimensional chaotic maps, Int J Bifurc Chaos, 8, 6, 1259-1284 (1998) · Zbl 0935.94019 |

[3] | Lian, S.; Sun, J.; Wang, Z., Security analysis of a chaos-based image encryption algorithm, Phys Lett A, 351, 645-661 (2005) |

[4] | Chen, G.; Mao, Y.; Chui, C., A symmetric image encryption scheme based on 3D chaotic cat maps, Chaos, Solitons & Fractals, 21, 749-761 (2004) · Zbl 1049.94009 |

[5] | Wang, K.; Pei, W.; Zou, L.; Song, A.; He, Z., On the security of 3D Cat map based symmetric image encryption scheme, Phys Lett A, 343, 432-439 (2005) · Zbl 1194.81054 |

[6] | Zhang, L.; Liao, X.; Wang, X., An image encryption approach based on chaotic maps, Chaos, Solitions & Fractals, 24, 759-765 (2005) · Zbl 1083.94011 |

[7] | Gao, H.; Zhang, Y.; Liang, S.; Li, D., A new chaotic algorithm for image encryption, Chaos, Solitions & Fractals, 29, 393-399 (2006) · Zbl 1096.94006 |

[8] | Kwok, H.; Tang, W., A fast image encryption system based on chaotic maps with finite precision representation, Chaos, Solitions & Fractals, 32, 1518-1529 (2007) · Zbl 1127.94004 |

[9] | Behnia, S.; Akhshani, A.; Mahmodi, H.; Akhavan, A., A novel algorithm for image encryption based on mixture of chaotic maps, Chaos, Solitions & Fractals, 35, 2, 408-419 (2008) · Zbl 1134.94356 |

[10] | Gao, T.; Chen, Z., Image encryption based on a new total shuffling algorithm, Chaos, Solitons & Fractals, 38, 1, 213-220 (2008) · Zbl 1142.94310 |

[11] | Zhou, Q., Parallel image encryption algorithm based on discretized chaotic map, Chaos, Solitons & Fractals, 38, 4, 1081-1092 (2008) |

[12] | Chen, G.; Ueta, T., Yet another chaotic attractor, Int J Bifurc Chaos, 9, 6, 1465-1466 (1999) · Zbl 0962.37013 |

[13] | Stinson, D. R., Cryptography: theory and practice (1995), CRC Press: CRC Press Waterloo · Zbl 0855.94001 |

[14] | Alvarez, G.; Montoya, F.; Romera, M.; Pastor, G., Keystream cryptanalysis of a chaotic cryptographic method, Comput Phys Commun, 156, 205-207 (2004) |

This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. It attempts to reflect the references listed in the original paper as accurately as possible without claiming the completeness or perfect precision of the matching.