{"title":"An Image Encryption Scheme Based on Chaotic Maps","authors":"Wei Zhang, Zhi-liang Zhu, Hai Yu","doi":"10.1109/IWCFTA.2009.48","DOIUrl":null,"url":null,"abstract":"In recent years, the classic encryption architecture based on chaotic map—“confusion diffusion” has been investigated. Among them, a two dimension Cat map is usually employed in confusion phase as an image can be seen as a two dimension array, meanwhile the flew of Cat map is obvious, that is the key space of it is not large enough. In the proposed encryption scheme, the Cat map is not with the fixed control parameters but a variable one during the confusion phase to enlarge the key space of the encryption scheme. Simulations are carried out with detail analyses, demonstrating the high security and efficient operation of our cryptosystem.","PeriodicalId":279256,"journal":{"name":"2009 International Workshop on Chaos-Fractals Theories and Applications","volume":"58 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 International Workshop on Chaos-Fractals Theories and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IWCFTA.2009.48","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 10
Abstract
In recent years, the classic encryption architecture based on chaotic map—“confusion diffusion” has been investigated. Among them, a two dimension Cat map is usually employed in confusion phase as an image can be seen as a two dimension array, meanwhile the flew of Cat map is obvious, that is the key space of it is not large enough. In the proposed encryption scheme, the Cat map is not with the fixed control parameters but a variable one during the confusion phase to enlarge the key space of the encryption scheme. Simulations are carried out with detail analyses, demonstrating the high security and efficient operation of our cryptosystem.