Abstract

An image encryption algorithm based on improved piecewise linear chaotic map (MPWLCM) model was proposed. The algorithm uses the MPWLCM to permute and diffuse plain image simultaneously. Due to the sensitivity to initial key values, system parameters, and ergodicity in chaotic system, two pseudorandom sequences are designed and used in the processes of permutation and diffusion. The order of processing pixels is not in accordance with the index of pixels, but it is from beginning or end alternately. The cipher feedback was introduced in diffusion process. Test results and security analysis show that not only the scheme can achieve good encryption results but also its key space is large enough to resist against brute attack.

Highlights

  • With the rapid development of network communication technology, multimedia information such as digital images are more commonly and frequently transmitted in public communication network

  • We firstly proposed a improved piecewise linear chaotic map (MPWLCM) model

  • Based on the PWLCM, we propose an improved piecewise linear chaotic map (MPWLCM) model, which can be denoted by (2): xn+1

Read more

Summary

Introduction

With the rapid development of network communication technology, multimedia information such as digital images are more commonly and frequently transmitted in public communication network. The confusion and diffusion processes in cryptography proposed by Shannon [12] are applied in image encryption successfully These processes include a permutation-diffusion structure, while many proposed chaotic image encryption systems [8,9,10,11] adopted Arnold cat map to shuffle the positions of the pixels by confuse phase, and the permutation process was separated from diffusion process. In [14], Wang and Jin proposed an image encryption algorithm They confuse the plain image by using logistic map and Game of Life instead of Arnold cat map firstly. They use piecewise linear chaotic map (PWLCM) to diffuse each pixel of the image. 3q 1 xn Figure 1: The MPWLCM proposed by this paper

The MPWLCM Map
The Proposed Cryptosystem
Experimental Results and Security Analysis
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call