Image encryption using chaotic maps

Kwok-Wo Wong

Research output: Chapters, Conference Papers, Creative and Literary WorksRGC 12 - Chapter in an edited book (Author)peer-review

41 Citations (Scopus)

Abstract

In recent years, a variety of chaos-based image cryptosystems have been proposed. An architecture of such kind of cryptosystems is composed of multiple rounds of substitution and diffusion. In the substitution stage, a two- or higher-dimensional chaotic map is employed to shuffle the image pixels for confusion purpose. In the diffusion process, the pixel values are altered sequentially so that the change made to a particular pixel depends on the accumulated effect of all the previous pixels. The design of this class of chaos-based image cryptosystems, together with the security evaluations, will be discussed in this chapter. In substitution-diffusion type chaos-based image cryptosystems, the confusion and diffusion effects are solely contributed by the substitution and the diffusion stages, respectively. This design leads to the weakness that the two stages are attacked separately. Moreover, the required overall rounds of operations in achieving a certain security level is found more than necessary. A modified architecture is then suggested so that certain diffusion effect is introduced in the substitution stage by simple sequential add-and-shift operations. The resistance to attacks is enhanced. The encryption efficiency is also improved as fewer operation rounds are required. © 2009 Springer-Verlag Berlin Heidelberg.
Original languageEnglish
Title of host publicationIntelligent Computing Based on Chaos
PublisherSpringer 
Pages333-354
ISBN (Print)9783540959717
DOIs
Publication statusPublished - 2009

Publication series

NameStudies in Computational Intelligence
Volume184
ISSN (Print)1860-949X

Fingerprint

Dive into the research topics of 'Image encryption using chaotic maps'. Together they form a unique fingerprint.

Cite this