Title: A security improved image encryption scheme based on chaotic Baker map and hyperchaotic Lorenz system

Authors: Chong Fu; Zhan-kao Wen; Zhi-liang Zhu; Hai Yu

Addresses: School of Information Science and Engineering, Northeastern University, Shenyang 110004, China ' Computing and Network Centre, Northeastern University, Shenyang 110004, China ' Software College, Northeastern University, Shenyang 110004, China ' Software College, Northeastern University, Shenyang 110004, China

Abstract: In recent years, chaos-based image cipher has been widely studied and a growing number of schemes based on permutation-diffusion architecture have been proposed. However, most of the existing schemes are based on low-dimensional chaotic systems and have the drawbacks of small key space and weak security. In this paper, we present a security improved image cipher which utilises chaotic Baker map and hyperchaotic Lorenz system for permutation and diffusion. Compared with ordinary chaotic systems, hyperchaotic systems, with more complex dynamical behaviours and number of system variables, offer greater potential for secure cryptosystem construction. In diffusion stage, a plain-image related key stream generation scheme is introduced, which further improves the security against known/chosen plaintext attack. Extensive security analysis has been performed on the proposed scheme, including the most important ones like key space analysis, key sensitivity analysis, differential analysis and various statistical analyses, which has demonstrated the satisfactory security of the proposed scheme.

Keywords: image cipher; permutation; diffusion; chaotic Baker maps; hyperchaotic Lorenz systems; image security; image encryption; cryptography; chaos theory; key stream generation; plaintext attacks.

DOI: 10.1504/IJCSE.2016.076212

International Journal of Computational Science and Engineering, 2016 Vol.12 No.2/3, pp.113 - 123

Received: 29 Jan 2013
Accepted: 06 Apr 2013

Published online: 30 Apr 2016 *

Full-text access for editors Full-text access for subscribers Purchase this article Comment on this article