Conference Paper

An Improved Image Encryption Scheme Based on Line Maps.

Dept. of Electr. Eng., Harbin Inst. of Technol., Harbin, China
DOI: 10.1109/IAS.2009.67 Conference: Proceedings of the Fifth International Conference on Information Assurance and Security, IAS 2009, Xi'An, China, 18-20 August 2009
Source: DBLP


In order to avoid the flaw while keeping all the merits of image encryption scheme based on line maps, an improved image encryption scheme is proposed, which extended the original 2D scheme to 3D. An image with size NtimesM is firstly depicted by a 3D bit matrix, and then it is supposed as composed of 8timesM vectors with size N. Line maps are used to stretch the vectors to an array, while the fold map is used to transform the array to a same sized 3D matrix. Simulation results show that the improved image encryption scheme complete pixel permutation and confusion simultaneously, it enhance the security of the original cipher.

11 Reads
  • [Show abstract] [Hide abstract]
    ABSTRACT: On the basis of compound chaos and affine transformation in finite integer domain, a novel encryption algorithm is proposed, which is embedded in the compression process of color images. Firstly, it scrambles the blocks of 8×8 pixels of red, green and blue components globally in space domain to disarrange the combination relationship among three components, and then proceeds with normal compression. Secondly, it scrambles, self-adaptively replaces and diffuses the frequency domain's all direct current coefficients universally after quantization. Lastly, it scrambles alternating current coefficients' value and changes alternating current coefficients' signs self-adaptively. The scrambling function in it mixes coefficients' value according to corresponding coordination when changing coefficients' position, and the self-adaptive function is implemented by introducing image data in the process to disturb the chaos system. The algorithm has huge key space, strong sensitivity and high security. The constructed compoundchaos system, which has a brief form, can be realized parallel conveniently. The ciphertext has almost the same size as original image after direct compression.
    Xi Tong Gong Cheng Yu Dian Zi Ji Shu/Systems Engineering and Electronics 06/2012; 34(6):1283-1287. DOI:10.3969/j.issn.1001-506X.2012.06.36


11 Reads
Available from