New chaotic cryptosystem for the image encryption

被引:0
作者
Merzoug A. [1 ]
Ali-Pacha A. [2 ]
Hadj-Said N. [2 ]
机构
[1] Laboratory of Coding and Security of Information, University Batna 2, 05 avenue Chahid Boukhlouf, Batna
[2] Laboratory of Coding and Security of Information, University of Oran of Sciences and Technology, P.O. Box 1505, Oran M'Naouer
关键词
Chaos; Cryptography; Hénon map; logistic map; Secret key;
D O I
10.1504/IJICS.2020.107452
中图分类号
学科分类号
摘要
Recent researches of image encryption algorithms have been increasingly based on chaotic systems. This paper, a new image encryption scheme which employs. The idea is to associate the Hénon attractor and the logistics map, for the construction of a new secret key cryptosystem. We generate values through of the logistics map that will be added to the pixels of the plaintext image. This result modulo 256 will be permuted to another position of the encrypted image. The calculation of this permutation is deducted from the Hénon attractor, which is 2-dimensional, in order to have a significantly increasing the resistance to attacks. The proposed system has the advantage of bigger key space (about 180 bits); high security analysis such as key space analysis, statistical analysis and sensitivity analysis were carried out. The results demonstrate that the proposed system is highly efficient and a robust system. © 2020 Inderscience Enterprises Ltd.
引用
收藏
页码:450 / 463
页数:13
相关论文
共 22 条
[11]  
Kumar R.R., Kumar M.B., A new chaotic image encryption using parametric switching based permutation and diffusion, ICTACT Journal on Image and Video Processing, 4, 4, pp. 795-804, (2014)
[12]  
Liu S., Sun J., Xu Z., An improved image encryption algorithm based on chaotic system, Journal of Computers, 4, 11, pp. 1091-1100, (2009)
[13]  
Noura H., El Assad S., Vladeanu C., Design of a fast and robust chaos-based crypto-system for image encryption, 8th International Conference on Communications (COMM, pp. 423-426, (2010)
[14]  
Philip M., An enhanced chaotic image encryption, International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), December, 1, 5, pp. 77-83, (2011)
[15]  
Philip M., Das A., Survey: Image encryption using chaotic cryptography schemes, IJCA Special Issue on Computational Science-New Dimensions & Perspectives NCCSE, 1, pp. 1-4, (2011)
[16]  
Rao O.S., Performance analysis of CRT for image encryption, International Journal on Cybernetics & Informatics (IJCI), August, 5, 4, pp. 183-190, (2016)
[17]  
Sakthidasan-Sankaran K., Santhosh-Krishna B.V., A new chaotic algorithm for image encryption and decryption of digital color images, International Journal of Information and Education Technology, June, 1, 2, pp. 137-141, (2011)
[18]  
Sathishkumar G.A., Bagan K.B., Sriraam N., Image encryption based on diffusion and multiple chaotic maps, International Journal of Network Security & Its Applications (IJNSA), March, 3, 2, (2011)
[19]  
Schneier B., Applied Cryptography-Protocols, Algorithms and Source Code in C, (1996)
[20]  
Strogatz S.H., Nonlinear Systems and Chaos, (1994)