Image Encryption Based on a Coined Chaotic System and High-Intensity Encryption Primitives

被引:0
作者
Cao, Guanghui [1 ,2 ]
Tao, Yuan [3 ]
Liu, Xiang [1 ]
Zhang, Tianxu [1 ]
机构
[1] Liaoning Univ Technol, Sch Elect & Informat Engn, Jinzhou 121001, Liaoning, Peoples R China
[2] Key Lab Secur Network & Data Ind Internet Liaoning, Jinzhou 121001, Liaoning, Peoples R China
[3] Jilin Normal Univ, Coll Math & Comp, Siping 136000, Jilin, Peoples R China
来源
IEEE ACCESS | 2024年 / 12卷
关键词
Encryption; Dynamical systems; Chaos; Trajectory; Logistics; Heuristic algorithms; Bifurcation; Image processing; Chaotic system; encryption primitive; image encryption; linear congruence transformation; orthogonal Latin squares; ATTRACTOR;
D O I
10.1109/ACCESS.2024.3423691
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security and efficiency are two major themes of image encryption algorithm. To enhance the security together with improving the operational efficiency, this paper proposes an image encryption algorithm based on a novel chaos and high-strength encryption primitives. Under the framework of confusion-diffusion, three core elements affecting security, namely, random number generator, confusion primitive, and diffusion primitive are thoroughly investigated. Regarding random number generator, a new chaos, 2D-SCM, is constructed with the result of the 0-1 test is 0.9981. The confusion primitive adopts naturally uniformly distributed orthogonal Latin squares to achieve maximum uniform distribution of scrambled image. The diffusion primitive employs linear congruence transformation based on 65537 to elevate pixel transformation from modular addition to modular multiplication, effectively avoiding differential attack and equivalent key attack. In the pursuit of improving efficiency, a two-stage orthogonal Latin squares generation algorithm is introduced, specifically targeting the low efficiency associated with generating orthogonal Latin squares from finite fields. Security testing on the cipher image shows that NPCR and UACI closely align with expected values of 99.6094% and 33.4635%, respectively, and local information entropy stays within the expected range of (7.901515698,7.903422936), confirming the algorithm's robust defense against unauthorized attacks. Efficiency testing also reveals that the proposed algorithm matches the encryption efficiency of current excellent methods.
引用
收藏
页码:92043 / 92061
页数:19
相关论文
共 49 条
[3]  
[Anonymous], 1960, Canadian Journal of Mathematics
[4]   A novel bit-level image encryption algorithm based on 2D-LICM hyperchaotic map [J].
Cao, Chun ;
Sun, Kehui ;
Liu, Wenhao .
SIGNAL PROCESSING, 2018, 143 :122-133
[5]   Image encryption based on the combination of roulette wheel selection with linear congruence pixel transformation [J].
Cao, Guanghui ;
Wang, Xingyuan .
MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (08) :10625-10647
[6]   Designing a 2D infinite collapse map for image encryption [J].
Cao, Weijia ;
Mao, Yujun ;
Zhou, Yicong .
SIGNAL PROCESSING, 2020, 171
[7]   A novel chaos-based image encryption algorithm using DNA sequence operations [J].
Chai, Xiuli ;
Chen, Yiran ;
Broyde, Lucie .
OPTICS AND LASERS IN ENGINEERING, 2017, 88 :197-213
[8]   Yet another chaotic attractor [J].
Chen, GR ;
Ueta, T .
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 1999, 9 (07) :1465-1466
[9]  
Colbourn CJ, 2001, J STAT PLAN INFER, V95, P9
[10]   Memristor synapse-coupled piecewise-linear simplified Hopfield neural network: Dynamics analysis and circuit implementation [J].
Ding, Shoukui ;
Wang, Ning ;
Bao, Han ;
Chen, Bei ;
Wu, Huagan ;
Xu, Quan .
CHAOS SOLITONS & FRACTALS, 2023, 166