scispace - formally typeset
Search or ask a question
Author

Hong-feng Ma

Bio: Hong-feng Ma is an academic researcher. The author has contributed to research in topics: Encryption & Keystream. The author has an hindex of 6, co-authored 9 publications receiving 220 citations.

Papers
More filters
Journal ArticleDOI
TL;DR: The proposed scheme introduces a substitution mechanism in the permutation process through a bit-level shuffling algorithm to address the efficiency problem encountered by many existing permutation-substitution type image ciphers.

154 citations

Journal ArticleDOI
26 Dec 2014-PLOS ONE
TL;DR: The proposed scheme provides an effective and efficient way for real-time secure medical image transmission over public networks and enhances the security against known/chosen-plaintext attack.
Abstract: Recently, great concerns have been raised regarding the issue of medical image protection due to the increasing demand for telemedicine services, especially the teleradiology service. To meet this challenge, a novel chaos-based approach is suggested in this paper. To address the security and efficiency problems encountered by many existing permutation-diffusion type image ciphers, the new scheme utilizes a single 3D chaotic system, Chen's chaotic system, for both permutation and diffusion. In the permutation stage, we introduce a novel shuffling mechanism, which shuffles each pixel in the plain image by swapping it with another pixel chosen by two of the three state variables of Chen's chaotic system. The remaining variable is used for quantification of pseudorandom keystream for diffusion. Moreover, the selection of state variables is controlled by plain pixel, which enhances the security against known/chosen-plaintext attack. Thorough experimental tests are carried out and the results indicate that the proposed scheme provides an effective and efficient way for real-time secure medical image transmission over public networks.

40 citations

Patent
22 Feb 2012
TL;DR: In this article, a digital image encryption method based on chaotic orbit perturbation and related to the field of encryption systems was proposed, which comprises the following steps of: scrambling a plaintext image by adopting a generalized discrete Baker mapping-based method, diffusing the scrambled image by using a Logistic mapping based method, and changing the pixel value of each point in the image; and performing multiple encryption according to the requirement on encryption strength.
Abstract: The invention relates to a digital image encryption method based on chaotic orbit perturbation and relates to the field of encryption systems. The method comprises the following steps of: scrambling a plaintext image by adopting a generalized discrete Baker mapping-based method; diffusing the scrambled image by adopting a Logistic mapping-based method, and changing the pixel value of each point in the image; and performing multiple encryption according to the requirement on encryption strength. According to the method, a key flow is related to a key and a plaintext by introducing a chaotic orbit perturbation mechanism related to the plaintext, so that the diffusing effects of an encryption system are effectively improved, and the known plaintext resistance is obviously improved. Certain pixel value is changed in the diffusion process depending on the cumulative effect of all the encrypted pixel values before the pixel, so that the tiny change of one pixel value can be effectively diffused to all the subsequent pixels in the image. The method has short encryption time.

21 citations

Journal ArticleDOI
TL;DR: Wang et al. as discussed by the authors proposed a fast and more secure algorithm for protecting batch images by employing chaotic intrinsic properties, reversible steganography, and parallel computing, which can achieve superior results with high efficiency.
Abstract: In real-world applications, the ability to encrypt a large quantity of images is highly desirable. A branch of works resort chaotic encryption to encrypt images but mostly aim at one image for one-time encryption. Besides, encryption algorithms that can support processing batch images are strongly needed for acceleration in the scenario of massive data. To this end, we propose a fast and more secure algorithm for protecting batch images by employing chaotic intrinsic properties, reversible steganography, and parallel computing. First, our algorithm assigns batch images evenly to each thread, in which Cipher Block Chaining (CBC) mode is applied among neighboring images for encryption. Later, the identifier number of each thread and its CBC indexes are encrypted and embedded into the corresponding cipher-images using reversible steganography, which enhances the security of existing chaotic encryption. Besides, keystreams are associated with the plaintext for the goal of resisting chosen-plaintext attack. The experimental results and security analyses show that our algorithm can achieve superior results with high efficiency.

13 citations

Proceedings ArticleDOI
01 Oct 2013
TL;DR: Intensive cryptanalysis is carried out and the experimental results demonstrate that the cryptosystem can withstand all kinds of known attacks, including brute-force attack, differential attack, known/chosen plain-text attack as well as various statistical attacks.
Abstract: Chaos-based image cipher has been extensively investigated over the last two decades or so to meet the increasing demand for secure image transmission over open networks. In this paper, a chaotic symmetric image cipher with permutation-diffusion architecture is presented. In the permutation stage, we introduce a novel shuffling method, which swaps each pixel in plain image with another pixel at a location chosen by chaotic Henon map. Compared with conventional permutation schemes based on area-preserving chaotic maps, such as baker map, Arnold cat map, and standard map, the new scheme is superior in both effectiveness and efficiency. In the diffusion stage, each shuffled pixel is masked according to both key stream element and previous ciphered pixel so as to make the cryptosystem secure against differential attack. Intensive cryptanalysis is carried out and the experimental results demonstrate that the cryptosystem can withstand all kinds of known attacks, including brute-force attack, differential attack, known/chosen plain-text attack as well as various statistical attacks.

11 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: The experimental results prove the proposed DICOM cryptosystem has achieved a desirable amount of protection for real time medical image security applications.

161 citations

Journal ArticleDOI
Xiuli Chai1
TL;DR: Simulation results and security analysis show that the new image encryption algorithm based on Brownian motion and new 1D chaotic system has properties of large key space, high sensitivity to key, strong resisting statistical and differential attack and has high security and important practical application in image transmission and image encryption.
Abstract: In this paper, a new image encryption algorithm based on Brownian motion and new 1D chaotic system is introduced. Firstly, SHA 256 hash value of the plain image is used to generate the initial values and system parameters of chaotic systems for confusion and diffusion process. Then, 8 bitplanes of the plain image are scrambled based on Brownian motion, respectively, and the position and value of all pixels are changed simultaneously. After the confusion process, a two directional diffusion process is carried out, and it is made up of row diffusion (RD) and column diffusion (CD). The whole process can be repeated many rounds in order to get better encryption effect. Simulation results and security analysis show that our scheme has properties of large key space, high sensitivity to key, strong resisting statistical and differential attack. So, it has high security and important practical application in image transmission and image encryption.

143 citations

Journal ArticleDOI
TL;DR: A hybrid encryption scheme based on deoxyribo nucleic acid and chaotic maps, which can be adaptable for both selective and full medical image encryption is proposed, which uses multiple chaotic maps in single process to generate the highly random keys for encrypting the color digital imaging and communications in medicine image.
Abstract: In this technological era, it is highly essential to protect the digital medical data from the fraud and forgery as they are transmitted over the public channel. Also with the increased data traffic, it is hard to transmit the entire bulky medical data. New methods have come into the scene to reduce the traffic while maintaining the sufficient level of security. Partial encryption is one of the methods which selectively encrypt the bulky medical image. Meanwhile, if the same medical image is needed to be reused for another diagnosis, then it is recommended to protect the entire medical image. This paper proposes a hybrid encryption scheme based on deoxyribo nucleic acid and chaotic maps, which can be adaptable for both selective and full medical image encryption. The proposed algorithm uses multiple chaotic maps in single process to generate the highly random keys for encrypting the color digital imaging and communications in medicine image. The algorithm comprises three phases, namely, permutation, encoding, and diffusion. In all the phases, the selection of specific rule set depends on the key sequences produced from the combined chaotic system. Experimental results are carried out to validate the resistance of the developed algorithm toward statistical, differential, and brute force attacks.

136 citations

Journal ArticleDOI
TL;DR: The proposed concept of generalizing DNA encryption as s-box substitution is expected to be beneficial for security evaluation and theoretical design of DNA-based image encryption schemes in the future.

103 citations

Journal ArticleDOI
TL;DR: Simulations prove the advantages of the proposed cryptosystem, which render it a good candidate for real-time secure image applications, and its satisfactory resistance to noise perturbation and loss of cipher data.
Abstract: This paper presents a solution to satisfy the increasing requirement of real-time secure image transmission over public networks. The main advantage of the proposed cryptosystem is high efficiency. The confusion and diffusion operations are both performed based on a lookup table. Therefore, the time-consuming floating point arithmetic in chaotic map iteration and quantization procedures of traditional chaos-based image cipher can be avoided. Besides, this cryptosystem possesses satisfactory resistance to noise perturbation and loss of cipher data, which are inevitable and unpredictable in real-world channels. The channel disturbance and the deliberate damage from the opponents are both tolerated. The recovered image from the damaged cipher data has satisfactory visual perception. Simulations prove the advantages of the proposed scheme, which render it a good candidate for real-time secure image applications.

103 citations