Article ID Journal Published Year Pages File Type
459531 Journal of Systems and Software 2014 15 Pages PDF
Abstract

•A new cross chaotic map is proposed and proved based on Devaney's theory.•The encryption schemes are designed for specified image formats: JPEG, GIF, PNG and TIFF.•Diffusion and permutation based on the cross chaotic map are carried out.•Authentication is carried out using information hiding based on the cross chaotic map.

This paper proposes several image encryption schemes for popular image formats as Joint Photographic Experts Group (JPEG), Graphics Interchange Format (GIF), Portable Network Graphics (PNG), and Tagged Image File Format (TIFF). A cross chaotic map proposed based on Devaney's theory and dynamic block dividing of the 3D baker using the cross chaotic map are used for diffusion and permutation in encryption. Moreover, in order to verify user's identity, authentication is carried out using information hiding based on the cross chaotic function. In our methods, image files syntax and structure are not destructed, and the original image can be recovered lossless. For GIF, it keeps the property of animation successfully. The security test results indicate the proposed methods have high security, and the speed of our algorithm is faster than classical solutions. JPEG, GIF, TIFF and PNG image formats are popular contemporarily. Therefore this paper shows that the prospect of chaotic image encryption is promising.

Keywords
Related Topics
Physical Sciences and Engineering Computer Science Computer Networks and Communications
Authors
, ,