You are not logged in.

A self-cited pixel summation based image encryption algorithm

Ye, Guo-Dong, Huang, Xiao-Ling, Zhang, Leo Yu and Wang, Zheng-Xia 2017, A self-cited pixel summation based image encryption algorithm, Chinese physics B, vol. 26, no. 1, pp. 1-8, doi: 10.1088/1674-1056/26/1/010501.

Attached Files
Name Description MIMEType Size Downloads

Title A self-cited pixel summation based image encryption algorithm
Author(s) Ye, Guo-Dong
Huang, Xiao-Ling
Zhang, Leo Yu
Wang, Zheng-Xia
Journal name Chinese physics B
Volume number 26
Issue number 1
Article ID 010501
Start page 1
End page 8
Total pages 8
Publisher IOP Publishing
Place of publication Bristol, Eng.
Publication date 2017-01
ISSN 1674-1056
1741-4199
Keyword(s) pixel summation
image encryption algorithm
intertwining logistic map
gravity
security
science & technology
physical sciences
physics, multidisciplinary
physics
Summary In this paper, a novel image encryption algorithm is presented based on self-cited pixel summation. With the classical mechanism of permutation plus diffusion, a pixel summation of the plain image is employed to make a gravity influence on the pixel positions in the permutation stage. Then, for each pixel in every step of the diffusion stage, the pixel summation calculated from the permuted image is updated. The values from a chaotic sequence generated by an intertwining logistic map are selected by this summation. Consequently, the keystreams generated in both stages are dependent on both the plain image and the permuted image. Because of the sensitivity of the chaotic map to its initial conditions and the plain-image-dependent keystreams, any tiny change in the secret key or the plain image would lead to a significantly different cipher image. As a result, the proposed encryption algorithm is immune to the known plaintext attack (KPA) and the chosen plaintext attack (CPA). Moreover, experimental simulations and security analyses show that the proposed permutation-diffusion encryption scheme can achieve a satisfactory level of security.
Language eng
DOI 10.1088/1674-1056/26/1/010501
HERDC Research category C1.1 Refereed article in a scholarly journal
ERA Research output type C Journal article
Copyright notice ©2017, Chinese Physical Society and IOP Publishing Ltd
Persistent URL http://hdl.handle.net/10536/DRO/DU:30107050

Document type: Journal Article
Collection: School of Information Technology
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Versions
Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 1 times in TR Web of Science
Scopus Citation Count Cited 0 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 8 Abstract Views, 1 File Downloads  -  Detailed Statistics
Created: Wed, 28 Mar 2018, 10:24:44 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.