• KSII Transactions on Internet and Information Systems
    Monthly Online Journal (eISSN: 1976-7277)

An Efficient Chaotic Image Encryption Algorithm Based on Self-adaptive Model and Feedback Mechanism

Vol. 11, No. 3, March 30, 2017
10.3837/tiis.2017.03.029, Download Paper (Free):

Abstract

In recent years, image encryption algorithms have been developed rapidly in order to ensure the security of image transmission. With the assistance of our previous work, this paper proposes a novel chaotic image encryption algorithm based on self-adaptive model and feedback mechanism to enhance the security and improve the efficiency. Different from other existing methods where the permutation is performed by the self-adaptive model, the initial values of iteration are generated in a novel way to make the distribution of initial values more uniform. Unlike the other schemes which is on the strength of the feedback mechanism in the stage of diffusion, the piecewise linear chaotic map is first introduced to produce the intermediate values for the sake of resisting the differential attack. The security and efficiency analysis has been performed. We measure our scheme through comprehensive simulations, considering key sensitivity, key space, encryption speed, and resistance to common attacks, especially differential attack.


Statistics

Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2015)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article

[IEEE Style]
X. Zhang, C. Wang and Z. Zheng, "An Efficient Chaotic Image Encryption Algorithm Based on Self-adaptive Model and Feedback Mechanism," KSII Transactions on Internet and Information Systems, vol. 11, no. 3, pp. 1785-1801, 2017. DOI: 10.3837/tiis.2017.03.029.

[ACM Style]
Xiao Zhang, Chengqi Wang, and Zhiming Zheng. 2017. An Efficient Chaotic Image Encryption Algorithm Based on Self-adaptive Model and Feedback Mechanism. KSII Transactions on Internet and Information Systems, 11, 3, (2017), 1785-1801. DOI: 10.3837/tiis.2017.03.029.