Novel image cryptosystem based on new 2D hyperchaotic map and dynamical chaotic S-box

被引:73
作者
Zhou, Shuang [1 ]
Qiu, Yuyu [1 ]
Wang, Xingyuan [2 ]
Zhang, Yingqian [3 ]
机构
[1] Chongqing Normal Univ, Sch Math Sci, Chongqing 401331, Peoples R China
[2] Dalian Maritime Univ, Sch Informat Sci & Technol, Dalian 116026, Peoples R China
[3] Xiamen Univ Malaysia, Sch Elect Engn & Artificial Intelligence, Sepang 43900, Malaysia
基金
中国国家自然科学基金;
关键词
S-box; Hyperchaotic system; Image encryption; Chaos; ALGORITHM; DESIGN; SYSTEM;
D O I
10.1007/s11071-023-08312-1
中图分类号
TH [机械、仪表工业];
学科分类号
0802 ;
摘要
Chaotic systems are widely used in image encryption due to their sensitivity to initial values, ergodicity, and other properties; many image encryption algorithms based on chaotic systems have been studied in the past few years. To obtain a more secure encryption algorithm, this work firstly proposes a new two-dimensional discrete hyperchaotic map, which has a wider continuous chaotic interval, larger Lyapunov exponents and passed all NIST and part of TestU01 tests. Then, we apply the proposed map to generate S-boxes and combine them in pairs; finally, twelve S-boxes are obtained, and the elements of the plaintext image are grouped, each group of pixels is summed, and modular operations are used to specify specific S-boxes. Next, each set of elements is bitwise XOR with the corresponding S-box. Finally, the cipher image is obtained by scrambling using chaotic signal. Experiments show that compared with some other encryption algorithms, the proposed S-box-based encryption method has higher security, and it resists to common attacks.
引用
收藏
页码:9571 / 9589
页数:19
相关论文
共 53 条
[1]  
ADAMS C, 1990, LECT NOTES COMPUT SC, V435, P612
[2]  
Adams C., 1990, Journal of Cryptology, V3, P27, DOI 10.1007/BF00203967
[3]   Improved 2D Discrete Hyperchaos Mapping with Complex Behaviour and Algebraic Structure for Strong S-Boxes Generation [J].
Ahmad, Musheer ;
Al-Solami, Eesa .
COMPLEXITY, 2020, 2020
[4]   An image encryption method based on chaos system and AES algorithm [J].
Arab, Alireza ;
Rostami, Mohammad Javad ;
Ghavami, Behnam .
JOURNAL OF SUPERCOMPUTING, 2019, 75 (10) :6663-6682
[5]   S-box design based on optimize LFT parameter selection: a practical approach in recommendation system domain [J].
Beg, Saira ;
Ahmad, Naveed ;
Anjum, Adeel ;
Ahmed, Mansoor ;
Khan, Abid ;
Baig, Fasial ;
Khan, Ahmed .
MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (17-18) :11667-11684
[6]   A new design of cryptosystem based on S-box and chaotic permutation [J].
Ben Farah, M. A. ;
Guesmi, R. ;
Kachouri, A. ;
Samet, M. .
MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (27-28) :19129-19150
[7]  
Biham E., 1991, Journal of Cryptology, V4, P3, DOI 10.1007/BF00630563
[8]   An improved image encryption algorithm with finite computing precision [J].
Chen, Chen ;
Sun, Kehui ;
He, Shaobo .
SIGNAL PROCESSING, 2020, 168
[9]   A symmetric image encryption scheme based on 3D chaotic cat maps [J].
Chen, GR ;
Mao, YB ;
Chui, CK .
CHAOS SOLITONS & FRACTALS, 2004, 21 (03) :749-761
[10]  
Deng Y, 2015, THESIS HUAZHONG U SC