Feedback image encryption algorithm with compound chaotic stream cipher based on perturbation

被引:0
作者
TONG XiaoJun1 & CUI MingGen2 1School of Computer Science and Technology
2School of Science
机构
基金
中国国家自然科学基金;
关键词
compound chaos; stream cipher; feedback image encryption; 3D baker; perturbation;
D O I
暂无
中图分类号
TN918.1 [理论];
学科分类号
070104 ;
摘要
In this paper, two new one-dimensional chaotic functions are designed using Devaney chaotic definition. And a dynamically shifting compound chaotic function is constructed based on the two new one-dimensional chaotic functions. The properties of compound chaotic functions are also proved. A new feedback image encryption algorithm is designed using the new compound chaos and an image pixel permutation, 3D baker scheme is described in detail. In the scheme, a new dynamic block dividing the 3D baker is put forward using the compound chaotic map, and the key space expands. In order to produce avalanche effect and sensitivity of cipher to plaintext, the round times are designed to control the cycle. The entropy analysis, difference analysis, weak-key analysis, statistical analysis, cipher random analysis, and cipher sensibility analysis depending on key and plaintext are introduced to test the security of the new scheme of image encryption. The tests show that the image encryption method passes the random tests of NIST FIPS 140-2(2001) and SP 800-22 standards. This paper also solves the problem of short periods and low precision of one-dimensional chaotic function by perturbation.
引用
收藏
页码:191 / 202
页数:12
相关论文
共 50 条
  • [31] An image encryption algorithm based on the perturbed high-dimensional chaotic map
    Tong, Xiao Jun
    Wang, Zhu
    Zhang, Miao
    Liu, Yang
    Xu, Hui
    Ma, Jing
    NONLINEAR DYNAMICS, 2015, 80 (03) : 1493 - 1508
  • [32] An image encryption algorithm based on the perturbed high-dimensional chaotic map
    Xiao Jun Tong
    Zhu Wang
    Miao Zhang
    Yang Liu
    Hui Xu
    Jing Ma
    Nonlinear Dynamics, 2015, 80 : 1493 - 1508
  • [33] A Novel Image Stream Cipher Based On Dynamic Substitution
    Elsharkawi, Abdelfattah
    El-Sagheer, Ragab M.
    Akah, Haitham
    Taha, Hatem
    ENGINEERING TECHNOLOGY & APPLIED SCIENCE RESEARCH, 2016, 6 (05) : 1195 - 1199
  • [34] MEMS-Based Seed Generator Applied to a Chaotic Stream Cipher
    Garcia-Bosque, M.
    Perez, A.
    Sanchez-Azqueta, C.
    Royo, G.
    Celma, S.
    SMART SENSORS, ACTUATORS, AND MEMS VIII, 2017, 10246
  • [35] A Stream Cipher Based on Fractional Pseudo Chaotic Random Number Generator
    Yang, Chunxiao
    Taralova, Ina
    Loiseau, Jean-Jacques
    El-Assad, Safwan
    INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST-2020), 2020, : 42 - 47
  • [36] K2: A stream cipher algorithm using dynamic feedback control
    Kiyomoto, Shinsaku
    Tanaka, Toshiaki
    Sakurai, Kouichi
    SECRYPT 2007: PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2007, : 204 - +
  • [37] Design of Stream Cipher for Text Encryption using Soft Computing based Techniques
    Santhanalakshmi, S.
    Sangeeta, K.
    Patra, G. K.
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2012, 12 (12): : 149 - 152
  • [38] Research of chaotic block cipher algorithm based on Logistic map
    Wang, Fengjian
    Zhang, Yongping
    Cao, Tianjie
    ICICTA: 2009 SECOND INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTATION TECHNOLOGY AND AUTOMATION, VOL I, PROCEEDINGS, 2009, : 678 - 681
  • [39] Fast and Secure Chaotic Stream Cipher with a MEMS-Based Seed Generator
    Garcia-Bosque, M.
    Sanchez-Azqueta, C.
    Perez, A.
    Martinez, A. D.
    Celma, S.
    2017 IEEE INTERNATIONAL INSTRUMENTATION AND MEASUREMENT TECHNOLOGY CONFERENCE (I2MTC), 2017, : 1310 - 1315
  • [40] A New Stream Cipher Using Natural Numbers Based on Conventional Encryption Techniques: MINNSC
    Hegadi, Rajendra
    SOFTWARE ENGINEERING AND COMPUTER SYSTEMS, PT 2, 2011, 180 : 427 - 436