Feedback image encryption algorithm with compound chaotic stream cipher based on perturbation

被引:0
作者
TONG XiaoJun1 & CUI MingGen2 1School of Computer Science and Technology
2School of Science
机构
基金
中国国家自然科学基金;
关键词
compound chaos; stream cipher; feedback image encryption; 3D baker; perturbation;
D O I
暂无
中图分类号
TN918.1 [理论];
学科分类号
070104 ;
摘要
In this paper, two new one-dimensional chaotic functions are designed using Devaney chaotic definition. And a dynamically shifting compound chaotic function is constructed based on the two new one-dimensional chaotic functions. The properties of compound chaotic functions are also proved. A new feedback image encryption algorithm is designed using the new compound chaos and an image pixel permutation, 3D baker scheme is described in detail. In the scheme, a new dynamic block dividing the 3D baker is put forward using the compound chaotic map, and the key space expands. In order to produce avalanche effect and sensitivity of cipher to plaintext, the round times are designed to control the cycle. The entropy analysis, difference analysis, weak-key analysis, statistical analysis, cipher random analysis, and cipher sensibility analysis depending on key and plaintext are introduced to test the security of the new scheme of image encryption. The tests show that the image encryption method passes the random tests of NIST FIPS 140-2(2001) and SP 800-22 standards. This paper also solves the problem of short periods and low precision of one-dimensional chaotic function by perturbation.
引用
收藏
页码:191 / 202
页数:12
相关论文
共 50 条
  • [41] Reconfigurable Feedback Shift Register Based Stream Cipher for Wireless Sensor Networks
    Zeng, Guang
    Dong, Xiaodai
    Bornemann, Jens
    IEEE WIRELESS COMMUNICATIONS LETTERS, 2013, 2 (05) : 559 - 562
  • [42] A highly secure stream cipher based on analog-digital hybrid chaotic system
    Zheng, Jun
    Hu, Hanping
    INFORMATION SCIENCES, 2022, 587 : 226 - 246
  • [43] Security Analysis of Image Cryptosystem Using Stream Cipher Algorithm with Nonlinear Filtering Function
    Aissa, Belmeguenai
    Nadir, Derouiche
    Khaled, Mansouri
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2012, 3 (09) : 150 - 156
  • [44] Modified SNOW 3G: Stream Cipher Algorithm Using Piecewise Linear Chaotic Map
    Wasi, Muhammad Arif Ali
    Windarta, Susila
    PROCEEDINGS OF THE 7TH SEAMS UGM INTERNATIONAL CONFERENCE ON MATHEMATICS AND ITS APPLICATIONS 2015: ENHANCING THE ROLE OF MATHEMATICS IN INTERDISCIPLINARY RESEARCH, 2016, 1707
  • [45] Modified OTP Based Vernam Cipher Algorithm using Multilevel Encryption Method
    Brosas, Deborah G.
    Sison, Ariel M.
    Medina, Ruji P.
    PROCEEDINGS OF THE 2019 IEEE EURASIA CONFERENCE ON IOT, COMMUNICATION AND ENGINEERING (ECICE), 2019, : 201 - 204
  • [46] Design of Stream Cipher for Text Encryption using Particle Swarm Optimization based Key Generation
    Sreelaja, N. K.
    Pai, G. A. Vijayalakshmi
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2009, 4 (01): : 30 - 41
  • [47] Encryption method and security analysis of medical images based on stream cipher enhanced logical mapping
    Liu, Shuang
    Liu, Li
    Pang, Ming
    TECHNOLOGY AND HEALTH CARE, 2021, 29 : S185 - S193
  • [48] Speech Encryption using Finite Precision Chaotic Maps Based Stream Ciphers
    Dawood, Zahraa M.
    Aboud, Mouner
    Hasan, Fadhil S.
    INTERNATIONAL CONFERENCE OF INFORMATION AND COMMUNICATION TECHNOLOGY (ICICT 2019), 2019, : 127 - 133
  • [49] A Stream/Block Combination Image Encryption Algorithm Using Logistic Matrix to Scramble
    Wang, Xing-Yuan
    Li, Zhi-Ming
    INTERNATIONAL JOURNAL OF NONLINEAR SCIENCES AND NUMERICAL SIMULATION, 2019, 20 (02) : 167 - 177
  • [50] A novel approach for Digital Image Watermarking Using 5-DWT-SVD and Stream Cipher Encryption with Different Attacks
    Pandey, Smita
    Gupta, Rohit
    2016 INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION (ICCUBEA), 2016,