A one-time-pad-like chaotic image encryption scheme using data steganography

被引:4
|
作者
Sheng, Qingxin [1 ]
Fu, Chong [1 ,2 ]
Lin, Zhaonan [1 ]
Tie, Ming [3 ]
Chen, Junxin [4 ]
Sham, Chiu-Wing [5 ]
机构
[1] Northeastern Univ, Sch Comp Sci & Engn, Shenyang 110819, Peoples R China
[2] Minist Educ, Engn Res Ctr Secur Technol Complex Network Syst, Beijing, Peoples R China
[3] Sci & Technol Space Phys Lab, Beijing 100076, Peoples R China
[4] Dalian Univ Technol, Sch Software, Dalian 116621, Peoples R China
[5] Univ Auckland, Sch Comp Sci, Auckland, New Zealand
基金
国家重点研发计划;
关键词
Image encryption; One-time-pad; Steganography; Chaos; Non-sequential diffusion; ALGORITHM; EFFICIENT; PERMUTATION; CRYPTOSYSTEM; DESIGN; SECURE; MAP;
D O I
10.1016/j.jisa.2023.103592
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
One-time-pad-like image ciphers using chaos and hash functions have achieved outstanding performance in terms of security strength and efficiency, but they fail to consider the problem of hash value distribution, limiting their practical application significantly. Moreover, most existing algorithms are designed based on independent permutation and sequential diffusion operations, which may lead them to end up being broken by chosen-plaintext attacks. In this paper, we propose a one-time-pad-like chaotic image cipher using data steganography. The whole scheme consists of an encryption process for the plain-image and an embedding process for the encrypted image. Different from the permutation-diffusion type image ciphers, we remove the permutation stage and use only a plaintext-dependent non-sequential diffusion operation. The encryption algorithm exploits the security potential of the encryption order and can achieve a satisfactory level of security with only once scanning of the entire image. During the embedding process, a reversible data-hiding technique is adopted to embed the hash value of the plain-image into the cipher-image so that it can be transmitted together to the receiver, overcoming the practical limitation encountered by the existing one-time-pad-like ciphers. Experimental results indicate that the proposed algorithm is secure against all common attacks and outperforms state-of-the-art approaches in terms of both security and efficiency.
引用
收藏
页数:12
相关论文
共 50 条
  • [21] Quantum Chaotic Image Encryption with One Time Running Key
    Cao Guanghui
    Zhou Jun
    Zhang Yizhi
    Jiang Yueling
    Zhang Xing
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (04): : 77 - 88
  • [22] Chaotic color multi-image compression-encryption/ LSB data type steganography scheme for NFT transaction security
    Zhang, Zheyi
    Cao, Yinghong
    Jahanshahi, Hadi
    Mou, Jun
    JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2023, 35 (10)
  • [23] A selective bitplane image encryption scheme using chaotic maps
    Sukalyan Som
    Abhijit Mitra
    Sarbani Palit
    B. B. Chaudhuri
    Multimedia Tools and Applications, 2019, 78 : 10373 - 10400
  • [24] A selective bitplane image encryption scheme using chaotic maps
    Som, Sukalyan
    Mitra, Abhijit
    Palit, Sarbani
    Chaudhuri, B. B.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (08) : 10373 - 10400
  • [25] A composite image encryption scheme using AES and chaotic series
    Xiao Huijuan
    Qiu Shuisheng
    Deng Chengliang
    PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 277 - +
  • [26] Medical Image Encryption Scheme Using Multiple Chaotic Maps
    Jain, Kurunandan
    Aji, Aravind
    Krishnan, Prabhakar
    PATTERN RECOGNITION LETTERS, 2021, 152 : 356 - 364
  • [27] Multi image encryption and steganography based on synchronization of chaotic lasers
    Mukhopadhyay, Sumona
    Leung, Henry
    2013 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC 2013), 2013, : 4403 - 4408
  • [28] Color image encryption using one-time keys and coupled chaotic systems
    Dong, Chang'e
    SIGNAL PROCESSING-IMAGE COMMUNICATION, 2014, 29 (05) : 628 - 640
  • [29] A novel chaotic algorithm for image encryption utilizing one-time pad based on pixel level and DNA level
    Wang, Xingyuan
    Wang, Yu
    Zhu, Xiaoqiang
    Luo, Chao
    OPTICS AND LASERS IN ENGINEERING, 2020, 125
  • [30] Secured Image Transmission Through Region-Based Steganography Using Chaotic Encryption
    Dash, Shreela
    Das, M. N.
    Das, Mamatarani
    COMPUTATIONAL INTELLIGENCE IN DATA MINING, 2019, 711 : 535 - 544