• KSII Transactions on Internet and Information Systems
    Monthly Online Journal (eISSN: 1976-7277)

An Image Encryption Scheme Based on Concatenated Torus Automorphisms

Vol. 7, No. 6, June 25, 2013
10.3837/tiis.2013.06.009, Download Paper (Free):

Abstract

A novel, chaotic map that is based on concatenated torus automorphisms is proposed in this paper. As we know, cat map, which is based on torus automorphism, is highly chaotic and is often used to encrypt information. But cat map is periodic, which decreases the security of the cryptosystem. In this paper, we propose a novel chaotic map that concatenates several torus automorphisms. The concatenated mechanism provides stronger chaos and larger key space for the cryptosystem. It is proven that the period of the concatenated torus automorphisms is the total sum of each ones period. By this means, the period of the novel automorphism is increased extremely. Based on the novel, concatenated torus automorphisms, two application schemes in image encryption are proposed, i.e., 2D and 3D concatenated chaotic maps. In these schemes, both the scrambling matrices and the iteration numbers act as secret keys. Security analysis shows that the proposed, concatenated, chaotic maps have strong chaos and they are very sensitive to the secret keys. By means of concatenating several torus automorphisms, the key space of the proposed cryptosystem can be expanded to 2135. The diffusion function in the proposed scheme changes the gray values of the transferred pixels, which makes the periodicity of the concatenated torus automorphisms disappeared. Therefore, the proposed cryptosystem has high security and they can resist the brute-force attacks and the differential attacks efficiently. The diffusing speed of the proposed scheme is higher, and the computational complexity is lower, compared with the existing methods.


Statistics

Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2015)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article

[IEEE Style]
Q. Mao, C. Chang, H. Wu, "An Image Encryption Scheme Based on Concatenated Torus Automorphisms," KSII Transactions on Internet and Information Systems, vol. 7, no. 6, pp. 1492-1511, 2013. DOI: 10.3837/tiis.2013.06.009.

[ACM Style]
Qian Mao, Chin-Chen Chang, and Hsiao-Ling Wu. 2013. An Image Encryption Scheme Based on Concatenated Torus Automorphisms. KSII Transactions on Internet and Information Systems, 7, 6, (2013), 1492-1511. DOI: 10.3837/tiis.2013.06.009.

[BibTeX Style]
@article{tiis:20325, title="An Image Encryption Scheme Based on Concatenated Torus Automorphisms", author="Qian Mao and Chin-Chen Chang and Hsiao-Ling Wu and ", journal="KSII Transactions on Internet and Information Systems", DOI={10.3837/tiis.2013.06.009}, volume={7}, number={6}, year="2013", month={June}, pages={1492-1511}}