A one-time-pad-like chaotic image encryption scheme using data steganography

被引:4
|
作者
Sheng, Qingxin [1 ]
Fu, Chong [1 ,2 ]
Lin, Zhaonan [1 ]
Tie, Ming [3 ]
Chen, Junxin [4 ]
Sham, Chiu-Wing [5 ]
机构
[1] Northeastern Univ, Sch Comp Sci & Engn, Shenyang 110819, Peoples R China
[2] Minist Educ, Engn Res Ctr Secur Technol Complex Network Syst, Beijing, Peoples R China
[3] Sci & Technol Space Phys Lab, Beijing 100076, Peoples R China
[4] Dalian Univ Technol, Sch Software, Dalian 116621, Peoples R China
[5] Univ Auckland, Sch Comp Sci, Auckland, New Zealand
基金
国家重点研发计划;
关键词
Image encryption; One-time-pad; Steganography; Chaos; Non-sequential diffusion; ALGORITHM; EFFICIENT; PERMUTATION; CRYPTOSYSTEM; DESIGN; SECURE; MAP;
D O I
10.1016/j.jisa.2023.103592
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
One-time-pad-like image ciphers using chaos and hash functions have achieved outstanding performance in terms of security strength and efficiency, but they fail to consider the problem of hash value distribution, limiting their practical application significantly. Moreover, most existing algorithms are designed based on independent permutation and sequential diffusion operations, which may lead them to end up being broken by chosen-plaintext attacks. In this paper, we propose a one-time-pad-like chaotic image cipher using data steganography. The whole scheme consists of an encryption process for the plain-image and an embedding process for the encrypted image. Different from the permutation-diffusion type image ciphers, we remove the permutation stage and use only a plaintext-dependent non-sequential diffusion operation. The encryption algorithm exploits the security potential of the encryption order and can achieve a satisfactory level of security with only once scanning of the entire image. During the embedding process, a reversible data-hiding technique is adopted to embed the hash value of the plain-image into the cipher-image so that it can be transmitted together to the receiver, overcoming the practical limitation encountered by the existing one-time-pad-like ciphers. Experimental results indicate that the proposed algorithm is secure against all common attacks and outperforms state-of-the-art approaches in terms of both security and efficiency.
引用
收藏
页数:12
相关论文
共 50 条
  • [1] Pixel Value Difference Based Image Steganography with One Time Pad Encryption
    Maji, Giridhar
    Mandal, Sharmistha
    Debnath, Narayan C.
    Sen, Soumya
    2019 IEEE 17TH INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS (INDIN), 2019, : 1358 - 1363
  • [2] Data Encryption and Decryption Using image Steganography
    EC Department, SRMCEM, India
    Research Square, 1600,
  • [3] A New Image Encryption and Steganography Scheme
    Tang, Hongmei
    Jin, Gaochan
    Wu, Cuixia
    Song, Peijiao
    PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2009, : 60 - 63
  • [4] A One-time Pad Encryption Scheme Based on PKI
    Hu, Chaoju
    Zhang, Lei
    INTERNATIONAL CONFERENCE ON COMPUTATIONAL AND INFORMATION SCIENCES (ICCIS 2014), 2014, : 600 - 605
  • [5] One-time pad image encryption based on physical random numbers from chaotic laser
    Jianzhong Zhang
    Changkun Feng
    Mingjiang Zhang
    Yi Liu
    Optical Review, 2018, 25 : 540 - 548
  • [6] One-time pad image encryption based on physical random numbers from chaotic laser
    Zhang, Jianzhong
    Feng, Changkun
    Zhang, Mingjiang
    Liu, Yi
    OPTICAL REVIEW, 2018, 25 (05) : 540 - 548
  • [7] Improved Chaotic Image Encryption Scheme for Highly Autocorrelated Data Using NCA
    Yasin, Zeeshan
    Nadeem, Shifa
    Saleem, Abdullah
    Ahmed, Waqas
    2017 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES (ICICT), 2017, : 11 - 15
  • [8] New Image Encryption Scheme Using Chaotic Maps
    Khan, Manzar Ali
    ICVISP 2019: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON VISION, IMAGE AND SIGNAL PROCESSING, 2019,
  • [9] Chaotic coyote optimization algorithm for image encryption and steganography
    Tong, Huawei
    Li, Tianyou
    Xu, Youyun
    Su, Xinzhong
    Qiao, Guopeng
    MULTIMEDIA TOOLS AND APPLICATIONS, 2024, 83 (07) : 20861 - 20887
  • [10] Chaotic coyote optimization algorithm for image encryption and steganography
    Huawei Tong
    Tianyou Li
    Youyun Xu
    Xinzhong Su
    Guopeng Qiao
    Multimedia Tools and Applications, 2024, 83 : 20861 - 20887