The unified image encryption algorithm based on composite chaotic system

被引:15
作者
Zheng, Jiming [1 ,2 ]
Zeng, Qingxia [1 ]
机构
[1] Chongqing Univ Posts & Telecommun, Coll Comp Sci & Technol, Chongqing 400065, Peoples R China
[2] Chongqing Univ Posts & Telecommun, Key Lab Intelligent Anal & Decis Complex Syst, Chongqing 400065, Peoples R China
基金
中国国家自然科学基金;
关键词
Chaos map; Unity encryption; SHA256; Permutation operation; Diffusion operation;
D O I
10.1007/s11042-022-13461-3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes a fast and unified encryption and decryption algorithm based on a composite chaotic system. By combining Logistic map and Sine map, the New-Logistic-Sine map (NLS map) is obtained. NLS map generated the diffusion key matrix needed in the algorithm process, which can enhance the anti-attack ability of the encryption algorithm. Different from most image cryptography systems, the algorithm adopted in this paper has the same encryption process and decryption process, which can save half of the resources in real applications. Firstly, the Secure Hash Algorithm 256 (SHA256) value of the original image was obtained, and the initial values and control parameters of NLS map and Logistic map were calculated; Secondly, the diffusion key matrix is obtained by iterative the NLS map, and is used to perform the first diffusion of the original image; Thirdly, the permutation key sequence is obtained by iterative the Logistic map, and using the sequence to perform the permutation operation on the image after the first diffusion; Finally, the same diffusion key matrix as the first diffusion operation is used to carry out the second diffusion operation on the displaced image to obtain the final encrypted image. The simulation experiment and security analysis show that the proposed image cryptosystem possessed identical encryption process and decryption process, and the algorithm speed is improved ensure the security of the algorithm.
引用
收藏
页码:22231 / 22250
页数:20
相关论文
共 32 条
[1]   An image encryption scheme based on hybridizing digital chaos and finite state machine [J].
Alawida, Moatsum ;
Teh, Je Sen ;
Samsudin, Azman ;
Alshoura, Wafa Hamdan .
SIGNAL PROCESSING, 2019, 164 :249-266
[2]   A new hybrid digital chaotic system with applications in image encryption [J].
Alawida, Moatsum ;
Samsudin, Azman ;
Sen Teh, Je ;
Alkhawaldeh, Rami S. .
SIGNAL PROCESSING, 2019, 160 :45-58
[3]   A novel image encryption scheme based on substitution-permutation network and chaos [J].
Belazi, Akram ;
Abd El-Latif, Ahmed A. ;
Belghith, Safya .
SIGNAL PROCESSING, 2016, 128 :155-170
[4]   An image encryption scheme based on a new hybrid chaotic map and optimized substitution box [J].
Ben Farah, M. A. ;
Farah, A. ;
Farah, T. .
NONLINEAR DYNAMICS, 2020, 99 (04) :3041-3064
[5]   A novel bit-level image encryption algorithm based on 2D-LICM hyperchaotic map [J].
Cao, Chun ;
Sun, Kehui ;
Liu, Wenhao .
SIGNAL PROCESSING, 2018, 143 :122-133
[6]   An image encryption algorithm based on chaotic system and compressive sensing [J].
Chai, Xiuli ;
Zheng, Xiaoyu ;
Gan, Zhihua ;
Han, Daojun ;
Chen, Yiran .
SIGNAL PROCESSING, 2018, 148 :124-144
[7]   A novel image encryption scheme based on DNA sequence operations and chaotic systems [J].
Chai, Xiuli ;
Gan, Zhihua ;
Yuan, Ke ;
Chen, Yiran ;
Liu, Xianxing .
NEURAL COMPUTING & APPLICATIONS, 2019, 31 (01) :219-237
[8]   An image encryption scheme using nonlinear inter-pixel computing and swapping based permutation approach [J].
Chen, Jun-xin ;
Zhu, Zhi-liang ;
Fu, Chong ;
Zhang, Li-bo ;
Zhang, Yushu .
COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2015, 23 (1-3) :294-310
[9]   An image cryptosystem based on pseudorandomly enhanced chaotic DNA and random permutation [J].
Dagadu, Joshua C. ;
Li, Jian-Ping ;
Addo, Prince C. .
MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (17) :24979-25000
[10]  
Dai Y, 2012, PROCEEDING OF THE IEEE INTERNATIONAL CONFERENCE ON INFORMATION AND AUTOMATION, P210, DOI 10.1109/ICInfA.2012.6246810