Home  /  Entropy  /  Vol: 20 Núm: 12 Par: Decembe (2018)  /  Article
ARTICLE
TITLE

An Image Encryption Algorithm Based on Time-Delay and Random Insertion

SUMMARY

An image encryption algorithm is presented in this paper based on a chaotic map. Different from traditional methods based on the permutation-diffusion structure, the keystream here depends on both secret keys and the pre-processed image. In particular, in the permutation stage, a middle parameter is designed to revise the outputs of the chaotic map, yielding a temporal delay phenomena. Then, diffusion operation is applied after a group of random numbers is inserted into the permuted image. Therefore, the gray distribution can be changed and is different from that of the plain-image. This insertion acts as a one-time pad. Moreover, the keystream for the diffusion operation is designed to be influenced by secret keys assigned in the permutation stage. As a result, the two stages are mixed together to strengthen entirety. Experimental tests also suggest that our algorithm, permutation– insertion–diffusion (PID), performs better when expecting secure communications for images.

 Articles related

Shuting Cai, Linqing Huang, Xuesong Chen and Xiaoming Xiong    

Recently, a variety of chaos-based image encryption algorithms adopting the traditional permutation-diffusion structure have been suggested. Most of these algorithms cannot resist the powerful chosen-plaintext attack and chosen-ciphertext attack efficien... see more

Revista: Entropy

O. K. Adejumobi, M. O. Ayeni, A. H. Adeyeye, O. A. Ogundeji    

Due to the rapid development and rapid popularization of the information technology, internet and digital media have become an important tool for military, commercial, individuals and many other organizations to obtain and transmit information. However, ... see more


N. Ahmed,Y. Saleem,H. A. Habib,S. M. Afzal,S. K. Khurshid    

Image is an important utility of daily life. Use of internet and transmission of digital media over insecure channel such as broadcasting and unicasting through satellite pose a threat to security. Therefore, a novel encryption scheme is proposed for col... see more

Revista: The Nucleus

S. Bukhari,A. Yousaf,S. Niazi,M. R. Anjum    

The increasing applications of image processing have shifted the focus to the security of images during their transmission. In this work, the main focus is on the security of gray scale images against cryptanalysis attacks. A new model for encryption alg... see more

Revista: The Nucleus

Chunlei Fan, Zhigang Xie and Qun Ding    

In this paper, a three-dimensional chaotic system with a hidden attractor is introduced. The complex dynamic behaviors of the system are analyzed with a Poincaré cross section, and the equilibria and initial value sensitivity are analyzed by the m... see more

Revista: Entropy