scispace - formally typeset
Journal ArticleDOI

A fast parallel batch image encryption algorithm using intrinsic properties of chaos

TLDR
Wang et al. as discussed by the authors proposed a fast and more secure algorithm for protecting batch images by employing chaotic intrinsic properties, reversible steganography, and parallel computing, which can achieve superior results with high efficiency.
Abstract
In real-world applications, the ability to encrypt a large quantity of images is highly desirable. A branch of works resort chaotic encryption to encrypt images but mostly aim at one image for one-time encryption. Besides, encryption algorithms that can support processing batch images are strongly needed for acceleration in the scenario of massive data. To this end, we propose a fast and more secure algorithm for protecting batch images by employing chaotic intrinsic properties, reversible steganography, and parallel computing. First, our algorithm assigns batch images evenly to each thread, in which Cipher Block Chaining (CBC) mode is applied among neighboring images for encryption. Later, the identifier number of each thread and its CBC indexes are encrypted and embedded into the corresponding cipher-images using reversible steganography, which enhances the security of existing chaotic encryption. Besides, keystreams are associated with the plaintext for the goal of resisting chosen-plaintext attack. The experimental results and security analyses show that our algorithm can achieve superior results with high efficiency.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

AEA-NCS: An audio encryption algorithm based on a nested chaotic system

TL;DR: In this article , a 2D-Logistic-nested-infinite collapse (2D-LNIC) is proposed by combining an infinite collapse map (1D-ICM) and a logistic map.
Journal ArticleDOI

A parallel image encryption algorithm using intra bitplane scrambling

TL;DR: Wang et al. as mentioned in this paper proposed a parallel image encryption algorithm using intra bitplane scrambling, where four threads are utilized to encrypt the images in bit-level during the permutation, where each thread scrambles two bitplanes.
Proceedings ArticleDOI

A Color Image Encryption Algorithm Based on Chaotic Map and Discrete Wavelet Transform

TL;DR: Wang et al. as discussed by the authors proposed a chaotic logistic map-based image encryption technique for multidimensional color images, where instead of encrypting the whole color picture after preprocessing, encrypt each component independently (R, G, and B) to add extra unpredictability to the cipher text image.
Journal ArticleDOI

The circuit realization of a fifth‐order multi‐wing chaotic system and its application in image encryption

TL;DR: In this article , a new fifth-order eight-wing chaotic system is proposed on the basis of a five-dimensional four-wing system, and the resulting new system is used as a basis for introducing a method that can control both the number of wings of the system and the direction of the change in the numbers of wings.
References
More filters
Journal ArticleDOI

Reversible data embedding using a difference expansion

TL;DR: The redundancy in digital images is explored to achieve very high embedding capacity, and keep the distortion low, in a novel reversible data-embedding method for digital images.
Journal ArticleDOI

Yet another chaotic attractor

TL;DR: In this paper, the authors reported the finding of a chaotic at tractor in a simple three-dimensional autonomous system, which resembles some familiar features from both the Lorenz and Rossler at tractors.
Journal ArticleDOI

Symmetric Ciphers Based on Two-Dimensional Chaotic Maps

TL;DR: Methods are shown how to adapt invertible two-dimensional chaotic maps on a torus or on a square to create new symmetric block encryption schemes to encrypt an N×N image.
Journal ArticleDOI

Some basic cryptographic requirements for chaos-based cryptosystems

TL;DR: The suggested guidelines address three main issues: implementation, key management and security analysis, aiming at assisting designers of new cryptosystems to present their work in a more systematic and rigorous way to fulfill some basic cryptographic requirements.
Journal ArticleDOI

On the derivation of a “Chaotic” encryption algorithm

Robert Matthews
- 01 Jan 1984 - 
TL;DR: This paper derives a “chaotic” function, and shows that it may be suitable for cryptographic use, in particular as a replacement for the one-time pad system.