Professional Documents
Culture Documents
Chaotic System
Chen Wei-bin#1, Zhang Xin*2
#
College of Computer Science and Engineering, Wenzhou University
Wenzhou, Zhejiang, China
1
sun@wzu.edu.cn
*
School of Information and Engineering, Wenzhou Medical College
Wenzhou, Zhejiang, China
2
zhangxin@wzmc.net
(b) (b)
Fig. 2. Encryption by using Arnold cat map: (a) shuffled image; (b) histogram
of the shuffled-image.
(c)
(a)
(d)
(b)
Fig.4. decrypted image and histogram of the decrypted image (a) decrypted
Fig. 3. Encryption by Henon’s chaotic system: (a) cipher-image; (b) shuffled-image (b) histogram of the decrypted shuffled-image (c) decrypted
histogram of the cipher-image. original-image (d) histogram of the decrypted original-image
IV. SECURITY ANALYSIS
A good encryption scheme should be sensitive to the secret
V. CONCLUSIONS
keys, and the key space should be large enough to make
brute-force attacks infeasible. In our encryption algorithm, the In this paper, a new image encryption scheme is presented.
key-image and the initial values of Henon chaotic map are Both theoretical analysis and experimental results show that
used as secret keys. The key space is large enough to resist all the proposed cryptosystem has high security. It is found that
kinds of brute-force attacks. The experimental results also such a design can enhance the randomness. The proposed
demonstrate that our scheme is very sensitive to the secret key algorithm has four merits: 1) the algorithm has a large enough
mismatch. Fig. 5 illustrates the sensitivity of our scheme with key space to resist all kinds of brute force attacks. 2) The new
the secret key x0 and x1 .The cipher-image is shown in Fig. encrypted arithmetic not only shuffle the pixel positions of the
original-image, but also change the grey values of the
3(a), which is decrypted using x0 = 0.01 , x1 = 0.02 ,and original-image. 3) The encryption algorithm is very sensitive
to the secret keys. 4) The operation time of the encryption
c = d = 2 , M = 10 .As can be seen that, even the secret key
algorithm is shorter than the 3D Arnold cat map. As
x0 is changed a little ( x0 = 0.0100001 ), the decrypted demonstrated in our simulation, this approach is suitable in
shuffled-image is absolutely different from the original security.
shuffled-image. So it is difficult to obtain the original-image.
REFERENCES
Similar results for other secret keys x1 all can be obtained. As
[1] G. Chen,Y. Mao, K. Charles, “A symmetric image encryption scheme
we can see, the decrypted image with wrong keys has a based on 3D chaotic cat maps,” Chaos, Solutions & Fractals, pp.
histogram with random behavior. The sensitivity to initial 749-761, Dec. 2004.
conditions which is the main characterization of chaos [2] K. Wang, W. Pei, “On the security of 3D Cat map based symmetric
image encryption scheme,” Physics Letters A., pp. 432-439, May. 2005.
guarantees the security of our scheme. Furthermore, the step [3] S.-M. Chang, M.-C. Li, W.-W. Lin, “Asymptotic synchronization of
of image shuffle is double protection of secret key. modified logistic hyper-chaotic systems and its applications,”
Undoubtedly, the secret keys are secure enough. Nonlinear Analysis, pp. 869–880, Jan. 2009.
[4] H. Lian-xi, L. Chuan-mu, L. Ming-xi, “Combined image encryption
algorithm based on diffusion mapped disorder and hyperchaotic
systems,” Computer Applications, pp. 1892-1895, Aug. 2007.
[5] Z.-H. Guan, F. Huang, W. Guan, “Chaos-based image encryption
algorithm,” Physics Letters A., pp. 153–157, Aug. 2005.
[6] Y. Heng-fu, W. Yan-peng, T. Zu-wei, “An image encryption algorithm
based on logistic chaotic maps and Arnold transform,” Journal of
Hengshui University, pp. 40-43, Dec. 2008.
[7] Z. Qiong, S. Minfen, Z. Yikui, “3D Chaotic Cat Map Based Digital
Image Encryption Method,” Journal of Data Acquisition &Processing,
pp. 292-298, Sep. 2007.
[8] S. Qiu-dong, M. Wen-xin, Y. Wen-ying, D. Hong. “A Random
Scrambling Method for Digital Image Encryption and Comparison with
(a) (b) the Technique Based on Arnold Transform,” Journal of shanghai
second polytechnic university, pp. 159-163, Sep. 2008.
[9] E. Petrisor, “Entry and exit sets in the dynamics of area preserving
Henon map,” Chaos,Solitons and Fractals, pp. 651–658, Oct. 2003.
Fig.5. The sensitivity to the secret key x0 (a) decrypted shuffled-image
[10] L. Guo-hui, Z. Shi-ping, X. De-ming, L. Jian-wen, “An Intermittent
( x0 = 0.100001 ) ; (b) histogram of the decrypted image. Linear Feedback Method for Controlling Henon-like Attractor,”
Journal of Applied Sciences, pp. 288–290, Dec.2001.