An image encryption method based on multi-space confusion using hyperchaotic 2D Vincent map derived from optimization benchmark function

被引:31
作者
Erkan, Ugur [1 ]
Toktas, Abdurrahim [2 ]
Memis, Samet [3 ,4 ]
Lai, Qiang [5 ]
Hu, Genwen [5 ]
机构
[1] Karamanoglu Mehmetbey Univ, Fac Engn, Dept Comp Engn, TR-70200 Karaman, Turkiye
[2] Ankara Univ, Fac Engn, Dept Artificial Intelligence & Data Engn, TR-06830 Ankara, Turkiye
[3] Istanbul Rumeli Univ, Dept Comp Engn, Fac Engn & Nat Sci, TR-34570 Istanbul, Turkiye
[4] Bandirma Onyedi Eylul Univ, Fac Maritime, Dept Marine Engn, TR-10200 Balikesir, Turkiye
[5] East China Jiaotong Univ, Sch Elect & Automat Engn, Nanchang 330013, Jiangxi, Peoples R China
关键词
Image encryption; Chaos; Two-dimensional chaotic map; Vincent map; Hyperchaotic map; Chaotic system; SEMI-TENSOR PRODUCT; CHAOTIC MAP; ALGORITHM; ENTROPY; MATRIX; CRYPTANALYSIS; COMBINATION;
D O I
10.1007/s11071-023-08859-z
中图分类号
TH [机械、仪表工业];
学科分类号
0802 ;
摘要
A novel multi-space confusion image encryption (MSC-IE) method based on 2D Vincent map is presented in this study. In order to provide a more secure method, the MSC-IE consists of two-stage column and row permutation processing. The 2D Vincent map is derived from the Vincent function, which is an optimization benchmark function. The chaotic performance of the 2D Vincent map is examined through rigorous evaluations such as bifurcation and phase space trajectory diagrams, and Lyapunov exponent, sample entropy, correlation dimension and Kolmogorov entropy which are compared with the state of the art, as well. In the two-stage permutation, the column of the image is scrambled and the rows of the decomposed columns are shuffled, and then the row of the image is scrambled and the columns of the decomposed rows are shuffled. In the diffusion stage, a sequence matrix is converted into an image matrix and diagonally reordered. This reordered image is summed with the permutated image. The result is a completely unrecognizable ciphertext image. The MSC-IE is subjected to reliable cryptanalysis and cyber-attacks, and some results are compared with available reported results. The MSC-IE provides the most secure images due to the superior hyperchaotic performance of the 2D Vincent map.
引用
收藏
页码:20377 / 20405
页数:29
相关论文
共 58 条
[1]   Some basic cryptographic requirements for chaos-based cryptosystems [J].
Alvarez, Gonzalo ;
Li, Shujun .
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2006, 16 (08) :2129-2151
[2]  
Asuni N., 2014, STAG: Smart Tools Apps for Graphics
[3]   A substitution box generator, its analysis, and applications in image encryption [J].
Azam, Naveed Ahmed ;
Hayat, Umar ;
Ayub, Maria .
SIGNAL PROCESSING, 2021, 187
[4]  
Bachmann P., 1894, ANAL ZAHLENTHEORIE, V2
[5]   A novel bit-level image encryption algorithm based on 2D-LICM hyperchaotic map [J].
Cao, Chun ;
Sun, Kehui ;
Liu, Wenhao .
SIGNAL PROCESSING, 2018, 143 :122-133
[6]   Designing a 2D infinite collapse map for image encryption [J].
Cao, Weijia ;
Mao, Yujun ;
Zhou, Yicong .
SIGNAL PROCESSING, 2020, 171
[7]   The strict avalanche criterion randomness test [J].
Castro, JCH ;
Sierra, JM ;
Seznec, A ;
Izquierdo, A ;
Ribagorda, A .
MATHEMATICS AND COMPUTERS IN SIMULATION, 2005, 68 (01) :1-7
[8]   Cryptanalysis and improvement in an image encryption scheme using combination of the 1D chaotic map [J].
Chen, Junxin ;
Han, Fangfang ;
Qian, Wei ;
Yao, Yu-Dong ;
Zhu, Zhi-liang .
NONLINEAR DYNAMICS, 2018, 93 (04) :2399-2413
[9]   A novel image encryption scheme based on pseudo-random coupled map lattices with hybrid elementary cellular automata [J].
Dong, Youheng ;
Zhao, Geng ;
Ma, Yingjie ;
Pan, Zhou ;
Wu, Rui .
INFORMATION SCIENCES, 2022, 593 :121-154
[10]   Improved grasshopper optimization algorithm using opposition-based learning [J].
Ewees, Ahmed A. ;
Abd Elaziz, Mohamed ;
Houssein, Essam H. .
EXPERT SYSTEMS WITH APPLICATIONS, 2018, 112 :156-172