Implementation of gray image encryption with pixel shuffling and gray-level encryption by single chaotic system

Chuan-Kuei Huang, Chin-Wen Liao, S. L. Hsu, Y. C. Jeng

Research output: Contribution to journalArticle

42 Citations (Scopus)

Abstract

When the grays of images present a strong contrast, merely encrypting the gray-level of image pixels is unable to eliminate the image outlines. The adoption of pixel shuffling can eliminate the image outlines, but cannot disrupt the characteristics of gray-level spectrum. Since a chaotic system is highly sensitive to the initial values and the chaotic trajectory is unpredictable, the application of this method to communication encryption and decryption renders a high level of security. In this paper, the chaotic system is adopted as the fundamental base and combined with row, column shuffling, and gray-level encryption to not only eliminate image outlines, but also disrupt the distributional characteristics of gray level, and the resulting increases of key space. Various statistical methods, such as correlation coefficient, NPCR (Number of Pixels Change Rate), UACI (Unified Average Changing Intensity), and entropy, provide analysis of the efficacy of the encryption method proposed. Our example reveals that the proposed encryption method can obtain highly secure encrypted images.

Original languageEnglish
Pages (from-to)563-571
Number of pages9
JournalTelecommunication Systems
Volume52
Issue number2
DOIs
Publication statusPublished - 2013 Feb 1

Fingerprint

Chaotic systems
Cryptography
Pixels
Statistical methods
Entropy
Trajectories
Communication

All Science Journal Classification (ASJC) codes

  • Electrical and Electronic Engineering

Cite this

@article{0cc2cf49d2d74b6195e355180af79a65,
title = "Implementation of gray image encryption with pixel shuffling and gray-level encryption by single chaotic system",
abstract = "When the grays of images present a strong contrast, merely encrypting the gray-level of image pixels is unable to eliminate the image outlines. The adoption of pixel shuffling can eliminate the image outlines, but cannot disrupt the characteristics of gray-level spectrum. Since a chaotic system is highly sensitive to the initial values and the chaotic trajectory is unpredictable, the application of this method to communication encryption and decryption renders a high level of security. In this paper, the chaotic system is adopted as the fundamental base and combined with row, column shuffling, and gray-level encryption to not only eliminate image outlines, but also disrupt the distributional characteristics of gray level, and the resulting increases of key space. Various statistical methods, such as correlation coefficient, NPCR (Number of Pixels Change Rate), UACI (Unified Average Changing Intensity), and entropy, provide analysis of the efficacy of the encryption method proposed. Our example reveals that the proposed encryption method can obtain highly secure encrypted images.",
author = "Chuan-Kuei Huang and Chin-Wen Liao and Hsu, {S. L.} and Jeng, {Y. C.}",
year = "2013",
month = "2",
day = "1",
doi = "10.1007/s11235-011-9461-0",
language = "English",
volume = "52",
pages = "563--571",
journal = "Telecommunication Systems",
issn = "1018-4864",
publisher = "Springer Netherlands",
number = "2",

}

Implementation of gray image encryption with pixel shuffling and gray-level encryption by single chaotic system. / Huang, Chuan-Kuei; Liao, Chin-Wen; Hsu, S. L.; Jeng, Y. C.

In: Telecommunication Systems, Vol. 52, No. 2, 01.02.2013, p. 563-571.

Research output: Contribution to journalArticle

TY - JOUR

T1 - Implementation of gray image encryption with pixel shuffling and gray-level encryption by single chaotic system

AU - Huang, Chuan-Kuei

AU - Liao, Chin-Wen

AU - Hsu, S. L.

AU - Jeng, Y. C.

PY - 2013/2/1

Y1 - 2013/2/1

N2 - When the grays of images present a strong contrast, merely encrypting the gray-level of image pixels is unable to eliminate the image outlines. The adoption of pixel shuffling can eliminate the image outlines, but cannot disrupt the characteristics of gray-level spectrum. Since a chaotic system is highly sensitive to the initial values and the chaotic trajectory is unpredictable, the application of this method to communication encryption and decryption renders a high level of security. In this paper, the chaotic system is adopted as the fundamental base and combined with row, column shuffling, and gray-level encryption to not only eliminate image outlines, but also disrupt the distributional characteristics of gray level, and the resulting increases of key space. Various statistical methods, such as correlation coefficient, NPCR (Number of Pixels Change Rate), UACI (Unified Average Changing Intensity), and entropy, provide analysis of the efficacy of the encryption method proposed. Our example reveals that the proposed encryption method can obtain highly secure encrypted images.

AB - When the grays of images present a strong contrast, merely encrypting the gray-level of image pixels is unable to eliminate the image outlines. The adoption of pixel shuffling can eliminate the image outlines, but cannot disrupt the characteristics of gray-level spectrum. Since a chaotic system is highly sensitive to the initial values and the chaotic trajectory is unpredictable, the application of this method to communication encryption and decryption renders a high level of security. In this paper, the chaotic system is adopted as the fundamental base and combined with row, column shuffling, and gray-level encryption to not only eliminate image outlines, but also disrupt the distributional characteristics of gray level, and the resulting increases of key space. Various statistical methods, such as correlation coefficient, NPCR (Number of Pixels Change Rate), UACI (Unified Average Changing Intensity), and entropy, provide analysis of the efficacy of the encryption method proposed. Our example reveals that the proposed encryption method can obtain highly secure encrypted images.

UR - http://www.scopus.com/inward/record.url?scp=84879594907&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84879594907&partnerID=8YFLogxK

U2 - 10.1007/s11235-011-9461-0

DO - 10.1007/s11235-011-9461-0

M3 - Article

VL - 52

SP - 563

EP - 571

JO - Telecommunication Systems

JF - Telecommunication Systems

SN - 1018-4864

IS - 2

ER -