Abstract
The chaotic image encryption has been a hot research topic for years due to its remarkable functions. However, traditional chaotic systems exist some latent problems such as insecure key source, low key space, vulnerable to known-plaintext attacks and chosen-plaintext attacks. A novel encryption algorithm based on multi-scrolls chaotic system and Logistic map is proposed in the paper. The proposed algorithm uses multi-scrolls chaotic system and Logistic map to generate key sequences, and the cipher image is obtained by performing bit shuffling to the plain image according to key sequences, then double direction diffusion operations are applied to enhance the encryption performance. Multi-scrolls chaotic system has more complex dynamic characteristics and larger key space than single-scroll and traditional chaotic systems, which can obtain better encryption performance in image encryption. The experimental results show that our method has better encryption performance and higher security, which can be applied in other secure communication domain.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Lorenz, N.: Deterministic nonperiodic flow. J. Atmos. Sci. 20, 130–141 (1962)
Matthews, R.: On the derivation of a chaotic encryption algorithm. Cryptologia 13, 29–42 (1989)
Mandal, M.K., Banik, G.D., Chattopadhyay, D.: An image encryption process based on chaotic logistic map. IEEE Tech. Rev. 29(5), 395–404 (2014)
Krishnamoorthi, R., Murali, P.: Chaos based image encryption with orthogonal polynomials model and bit shuffling. In: IEEE International Conference on Signal Processing and Integrated Networks (2014)
Liu, L., Miao, S.: A new image encryption algorithm based on logistic chaotic map with varying parameter. Springer Plus 5, 289 (2016)
Huang, M.Y., Huang, Y.M., Wang, M.S.: Image encryption algorithm based on chaotic maps. In: IEEE Computer Symposium, pp. 154–158 (2010)
Zhou, Y., Bao, L., Chen, C.L.P.: Image encryption using a new parametric switching chaotic system. Signal Process. 93(11), 3039–3052 (2013)
Rohith, S., Sujatha, B.K.: Image encryption and decryption using combined key sequence of Logistic map and Lozi map. IEEE Int. Conf. Commun. Signal Process. 1053–1058, 2–4 (2015)
Ye, G., Wong, K.W.: An image encryption scheme based on time-delay and hyperchaotic system. Nonlinear Dyn. 71(1–2), 259–267 (2012)
Zhang, J.: An image encryption scheme based on cat map and hyperchaotic lorenz system. In: IEEE International Conference on Computational Intelligence & Communication Technology, pp. 78–82 (2015)
Hassan, A.A.: Proposed hyperchaotic system for image encryption. Int. J. Adv. Comput. Sci. Appl. 7(1), 37–40 (2016)
Liu, M.H., Yu, S.M.: Multi-scroll high-order general Jerk circuits. Acta Phys. Sin. 55(11), 5707–5713 (2006)
Matsumoto, T., Chua, L.O., Komuro, M.: The double scroll. IEEE Trans. Circuits Syst. 32(8), 797–818 (1985)
Yu, S., Tang, W.K.S.: Generation of n × m-scroll attractors in a two-port RCL network with hysteresis circuits. Chaos, Solitons Fractals 39(2), 821–830 (2009)
Wang, C.H., Xu, H., Yu, F.: A novel approach for constructing high-order Chua’s circuit with multi-directional multi-scroll chaotic attractors. Int. J. Bifurcat. Chaos Appl. Sci. Eng. 23(2), 1350022_1–1350022_10 (2013)
Ye, R.: A novel chaos-based image encryption scheme with an efficient permutation-diffusion mechanism. Opt. Commun. 284(22), 5290–5298 (2011)
Acknowledgments
This work is partially supported by the Natural Science Foundation of Hunan Province (Grant No. 2017JJ2047), the Hunan province science and technology plan projects (Grant No. 2016GK2011), and young teachers program in Hunan University.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Xiao, Y., Wang, Z., Cao, J., Yuan, J. (2017). Image Encryption Based on Multi-scrolls Chaotic System and Logistic Map. In: Wang, G., Atiquzzaman, M., Yan, Z., Choo, KK. (eds) Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2017. Lecture Notes in Computer Science(), vol 10658. Springer, Cham. https://doi.org/10.1007/978-3-319-72395-2_16
Download citation
DOI: https://doi.org/10.1007/978-3-319-72395-2_16
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-72394-5
Online ISBN: 978-3-319-72395-2
eBook Packages: Computer ScienceComputer Science (R0)