{"title":"TD-RECS Chaotic System Based Digital Image Encryption Algorithm Protecting from Shearing Attack","authors":"Qi-nan Liao","doi":"10.1109/NCIS.2011.88","DOIUrl":null,"url":null,"abstract":"In order to protect digital image's information and renew the image that is attacked by shearing, this paper presents a novel image encryption algorithm based on Tangent-Delay Ellipse Reflecting Cavity map System (TD-ERCS) chaos sequences. One of the TD-ERCS is used to shift the image's pixel position, another is used to alter the pixel value, so that the image will be scrambled and encrypted. While doing the decryption, a method, which is based on the neighboring pixels characteristic, is provided to recover the sheared image. Theoretical analysis and experimental results show that the algorithm has a large space of keys, a good encryption and decryption effects, a better security performance to statistical analysis and a strong ability against shearing.","PeriodicalId":215517,"journal":{"name":"2011 International Conference on Network Computing and Information Security","volume":"80 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 International Conference on Network Computing and Information Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NCIS.2011.88","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
In order to protect digital image's information and renew the image that is attacked by shearing, this paper presents a novel image encryption algorithm based on Tangent-Delay Ellipse Reflecting Cavity map System (TD-ERCS) chaos sequences. One of the TD-ERCS is used to shift the image's pixel position, another is used to alter the pixel value, so that the image will be scrambled and encrypted. While doing the decryption, a method, which is based on the neighboring pixels characteristic, is provided to recover the sheared image. Theoretical analysis and experimental results show that the algorithm has a large space of keys, a good encryption and decryption effects, a better security performance to statistical analysis and a strong ability against shearing.