Feedback image encryption algorithm with compound chaotic stream cipher based on perturbation

被引:0
作者
TONG XiaoJun1 & CUI MingGen2 1School of Computer Science and Technology
2School of Science
机构
基金
中国国家自然科学基金;
关键词
compound chaos; stream cipher; feedback image encryption; 3D baker; perturbation;
D O I
暂无
中图分类号
TN918.1 [理论];
学科分类号
070104 ;
摘要
In this paper, two new one-dimensional chaotic functions are designed using Devaney chaotic definition. And a dynamically shifting compound chaotic function is constructed based on the two new one-dimensional chaotic functions. The properties of compound chaotic functions are also proved. A new feedback image encryption algorithm is designed using the new compound chaos and an image pixel permutation, 3D baker scheme is described in detail. In the scheme, a new dynamic block dividing the 3D baker is put forward using the compound chaotic map, and the key space expands. In order to produce avalanche effect and sensitivity of cipher to plaintext, the round times are designed to control the cycle. The entropy analysis, difference analysis, weak-key analysis, statistical analysis, cipher random analysis, and cipher sensibility analysis depending on key and plaintext are introduced to test the security of the new scheme of image encryption. The tests show that the image encryption method passes the random tests of NIST FIPS 140-2(2001) and SP 800-22 standards. This paper also solves the problem of short periods and low precision of one-dimensional chaotic function by perturbation.
引用
收藏
页码:191 / 202
页数:12
相关论文
共 50 条
  • [21] Colour image encryption using an improved version of stream cipher and chaos
    Deb, Subhrajyoti
    Bhuyan, Bubu
    Kar, Nirmalya
    Reddy, K. Sudheer
    INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2022, 41 (02) : 118 - 133
  • [22] Stream cipher for binary image encryption using Ant Colony Optimization based key generation
    Sreelaja, N. K.
    Pai, G. A. Vijayalakshmi
    APPLIED SOFT COMPUTING, 2012, 12 (09) : 2879 - 2895
  • [23] Stream Cipher Systems Based on the Chaotic Dynamical Systems
    Liu, Yang
    Hong, Yu
    Wang, Liyan
    INTERNATIONAL CONFERENCE ON COMPLEX SCIENCE MANAGEMENT AND EDUCATION SCIENCE (CSMES 2013), 2013, : 535 - 541
  • [24] Application of Compound Chaotic Mapping in Voice Encryption Algorithm
    Du, Ruishan
    Li, Yang
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2014, 14 (08): : 44 - 46
  • [25] Image encryption scheme based on a novel fractional order compound chaotic attractor
    Zhao J.-F.
    Wang S.-Y.
    Zhang L.-T.
    Li X.-F.
    International Journal of Information and Computer Security, 2020, 13 (02): : 166 - 186
  • [26] Universal Algorithm of Full Diffusion of Stream Cipher Based on Nonlinear Feedback Shift Register
    Li J.-Z.
    Guan J.
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2018, 46 (09): : 2075 - 2080
  • [27] Image Encryption using Gingerbreadman Map And RC4A Stream Cipher
    Gaffar, Abdul
    Joshi, A. B.
    Kumar, Dhanesh
    APPLICATIONS AND APPLIED MATHEMATICS-AN INTERNATIONAL JOURNAL, 2020, 15 (02): : 1230 - 1244
  • [28] An improved algorithm of stream cipher based on LFSR
    Feng, Lifeng
    Wang, Xiaofeng
    Fang, Yingjue
    2012 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2012,
  • [29] Application of a MEMS-Based TRNG in a Chaotic Stream Cipher
    Garcia-Bosque, Miguel
    Perez, Adrian
    Sanchez-Azqueta, Carlos
    Celma, Santiago
    SENSORS, 2017, 17 (03)
  • [30] CLOAK: A Stream Cipher Based Encryption Protocol for Mobile Cloud Computing
    Banerjee, Amit
    Hasan, Mahamudul
    Rahman, Md. Auhidur
    Chapagain, Rajesh
    IEEE ACCESS, 2017, 5 : 17678 - 17691