A new color image cryptosystem based on a piecewise linear chaotic map

@article{Rhouma2009ANC,
  title={A new color image cryptosystem based on a piecewise linear chaotic map},
  author={Rhouma Rhouma and David Arroyo and Safya Belghith},
  journal={2009 6th International Multi-Conference on Systems, Signals and Devices},
  year={2009},
  pages={1-6}
}
In this paper a piecewise linear chaotic map (PWLCM) is used to build a new digital chaotic cryptosystem. The characteristics of PWLCM are very suitable for the design of encryption schemes. The implicit digital degradation problem of PWLCM has been eluded through the discretization of the phase space. The accuracy, efficiency and security of the proposed encryption scheme is thoroughly analyzed and its adequacy for image encryption is proved. 

Figures and Tables from this paper

An image encryption scheme based on precision limited chaotic system
TLDR
Security analysis indicates that the proposed 32-bit precision limited piecewise linear & logistic chaotic map called PL_PWL&LCM is robust against statistical attacks, differential attacks and brute force attacks, and performance analysis shows that the IES is a fast encryption algorithm with good performance in resisting noise disturbances. Expand
Security analysis of image cryptosystems only or partially based on a chaotic permutation
TLDR
It is demonstrated that a hacker can determine the permutation vectors (matrixes) used to permute the pixels bits or the pixels themselves and exploit them to reveal the plain image. Expand
A Novel Dynamic Secret Key Generation for an Efficient Image Encryption Algorithm
Today, the security of digital images is considered more and more essential and a strong secret key plays a major role in the image encryption. In this paper, a novel method for generating dynamicExpand
Joint compression and encryption using chaotically mutated Huffman trees
TLDR
A new scheme for joint compression and encryption using the Huffman codec where a basic tree is first generated for a given message and then based on a keystream generated from a chaotic map and depending from the input message, thebasic tree is mutated without changing the statistical model. Expand
A review of color image encryption techniques
TLDR
This paper presents a review on image encryption techniques of both full encryption and partial encryption schemes in spatial, frequency and hybrid domains for real–time image encryption. Expand
E-commerce Application Based on Visual Cryptography and Chen’s Hyperchaotic
TLDR
The proposed authentication system between business partners on e-commerce application is able to overcome on cheating attacks, exhaustive attack, and resistant the statistical attack. Expand
A Literature Review on Image Encryption Techniques
TLDR
This paper exhibits an audit on image encryption in spatial, frequency and hybrid domains with both full encryption and selective encryption strategy. Expand
Encryption Algorithms for Color Images: A Brief Review of Recent Trends
TLDR
This paper reviews the different image encryption algorithms developed during the period 2007-2015, highlighting their contrasting features and a broad classification of the said algorithms into full encryption algorithm and partial encryption algorithm. Expand
Classification of novel selected region of interest for color image encryption
TLDR
Encrypted area, entropy and correlation coefficients performances reveal that the proposed scheme achieves good alternative in the confined region of interest, fulfills the desired confidentiality and protects image privacy. Expand
A Contemplator on Topical Image Encryption Measures
TLDR
This work illustrates a survey on image encryption in different domains providing concise exordium to cryptography, moreover, furnishing the review of sundry image encryption techniques. Expand
...
1
2
...

References

SHOWING 1-8 OF 8 REFERENCES
A fast image encryption system based on chaotic maps with finite precision representation
In this paper, a fast chaos-based image encryption system with stream cipher structure is proposed. In order to achieve a fast throughput and facilitate hardware realization, 32-bit precisionExpand
Chaos-based image encryption algorithm ✩
In this Letter, a new image encryption scheme is presented, in which shuffling the positions and changing the grey values of image pixels are combined to confuse the relationship between theExpand
A symmetric image encryption scheme based on 3D chaotic cat maps
Abstract Encryption of images is different from that of texts due to some intrinsic features of images such as bulk data capacity and high redundancy, which are generally difficult to handle byExpand
Encryption and decryption of images with chaotic map lattices.
TLDR
A secure algorithm for direct encryption and decryption of digital images with chaotic map lattices that converts, pixel by pixel, the image color to chaotic logistic maps one-way coupled by initial conditions. Expand
On the Dynamical Degradation of Digital Piecewise Linear Chaotic Maps
TLDR
Some findings are reported on a new series of dynamical indicators, which can quantitatively reflect the degradation effects on a digital PWLCM realized with a fixed-point finite precision, which are applied to the performance comparison of different remedies for improving dynamical degradation. Expand
Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems
TLDR
The suggested guidelines address three main issues: implementation, key management and security analysis, aiming at assisting designers of new cryptosystems to present their work in a more systematic and rigorous way to fulfill some basic cryptographic requirements. Expand
NIST Special Publication 800-53
A symmetric image encryption based on 3D chaotic maps
  • Chaos Soliton Fractals
  • 2004