Skip to main content
Log in

Improvement of an image encryption algorithm based on hyper-chaos

  • Published:
Telecommunication Systems Aims and scope Submit manuscript

Abstract

In this paper, we propose to enhance a recently proposed image cryptosystem based on hyper-chaos. The updated version has been builded to resist against attacks made to break the original one and to make it faster. The modification concerns the two Boxes, P-Box and S-Box, which composed the original cryptosystem. Compared with classical encryption schemes, AES and Triple-DES, the new version of the cipher shows a better performances in rapidity, in confusion and in the key sensitivity.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Alvarez, G., & Li, S. (2006). Some basic cryptographic requirements for chaos-based cryptosystems. International Journal of Bifurcation and Chaos, 16(8), 2129–2151.

    Article  Google Scholar 

  2. Chen, G., Mao, Y., & Chui, C. K. (2004). A symmetric image encryption based on 3D chaotic maps. Chaos, Solitons and Fractals, 21, 749–761.

    Article  Google Scholar 

  3. Ehrsam, W. F., Meyer, C. H. W., Smith, J. L., & Tuchman, W. L. (1976). Message verification and transmission error detection by block chaining. U.S. Patent 4,074,066.

  4. Fridirich, J. (1998). Symmetric ciphers based on two-dimensional chaotic maps. International Journal of Bifurcation and Chaos, 8(6), 1259–1284.

    Article  Google Scholar 

  5. Gao, T., & Chen, Z. (2008). A new image encryption algorithm based on hyper-chaos. Physics Letters A, 372(4), 394–400.

    Article  Google Scholar 

  6. Ge, X., Liu, F., Lu, B., & Yang, C. (2010). Improvement of Rhouma’s attacks on gao algorithm. Physics Letters A, 374(11–12), 1362–1367.

    Article  Google Scholar 

  7. Guan, Z. H., Huang, F., & Guan, W. (2005). Chaos-based image encryption algorithm. Physics Letters A, 346(1–3), 153–157.

    Article  Google Scholar 

  8. Li, S., Chen, G., & Mou, X. (2005). On the dynamical degradation of digital piecewise linear chaotic maps. International Journal of Bifurcation and Chaos, 15(10), 3119–3151.

    Article  Google Scholar 

  9. Mahmodi, H., Behnia, S., Akhshani, A., & Akhavan, A. (2008). A novel algorithm for image encryption based on mixture of chaotic maps. Chaos, Solitons and Fractals, 35, 408–419.

    Article  Google Scholar 

  10. Menezes, A., van Oorschot, P., & Vanstone, S. (1997). Handbook of applied cryptography. Boca Raton: CRC Press.

    Google Scholar 

  11. Mou, X., Li, S., Zheng, X., & Cai, Y. (2002). Chaotic encryption scheme for real time digital video. In SPIE on electronic imaging, San Jose, CA, USA.

    Google Scholar 

  12. Rhouma, R., & Belghith, S. (2008). Cryptanalysis of a new image encryption algorithm based on hyper-chaos. Physics Letters A, 372(38), 5973–5978.

    Article  Google Scholar 

  13. Shanon, C. E. (1949). Communication theory of secrecy systems. The Bell System Technical Journal, 28(4), 656–715.

    Google Scholar 

  14. Wikipedia (2010). Block cipher modes of operation. Wikipedia.

  15. Yano, K., & Tanaka, K. (2002). Image encryption scheme based on truncated Baker transformation. IIEICE Transactions on Fundamentals E85-A(9), 2025–2035.

    Google Scholar 

  16. Yen, J. C., Guo, J., & Pan, H. F. (2002). New voice over internet protocol technique with hierarchical data security protection. IEE Vis Image Signal Process 149, 4.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Houcemeddine Hermassi.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Hermassi, H., Rhouma, R. & Belghith, S. Improvement of an image encryption algorithm based on hyper-chaos. Telecommun Syst 52, 539–549 (2013). https://doi.org/10.1007/s11235-011-9459-7

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11235-011-9459-7

Keywords

Navigation