A one-time-pad-like chaotic image encryption scheme using data steganography

被引:4
|
作者
Sheng, Qingxin [1 ]
Fu, Chong [1 ,2 ]
Lin, Zhaonan [1 ]
Tie, Ming [3 ]
Chen, Junxin [4 ]
Sham, Chiu-Wing [5 ]
机构
[1] Northeastern Univ, Sch Comp Sci & Engn, Shenyang 110819, Peoples R China
[2] Minist Educ, Engn Res Ctr Secur Technol Complex Network Syst, Beijing, Peoples R China
[3] Sci & Technol Space Phys Lab, Beijing 100076, Peoples R China
[4] Dalian Univ Technol, Sch Software, Dalian 116621, Peoples R China
[5] Univ Auckland, Sch Comp Sci, Auckland, New Zealand
基金
国家重点研发计划;
关键词
Image encryption; One-time-pad; Steganography; Chaos; Non-sequential diffusion; ALGORITHM; EFFICIENT; PERMUTATION; CRYPTOSYSTEM; DESIGN; SECURE; MAP;
D O I
10.1016/j.jisa.2023.103592
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
One-time-pad-like image ciphers using chaos and hash functions have achieved outstanding performance in terms of security strength and efficiency, but they fail to consider the problem of hash value distribution, limiting their practical application significantly. Moreover, most existing algorithms are designed based on independent permutation and sequential diffusion operations, which may lead them to end up being broken by chosen-plaintext attacks. In this paper, we propose a one-time-pad-like chaotic image cipher using data steganography. The whole scheme consists of an encryption process for the plain-image and an embedding process for the encrypted image. Different from the permutation-diffusion type image ciphers, we remove the permutation stage and use only a plaintext-dependent non-sequential diffusion operation. The encryption algorithm exploits the security potential of the encryption order and can achieve a satisfactory level of security with only once scanning of the entire image. During the embedding process, a reversible data-hiding technique is adopted to embed the hash value of the plain-image into the cipher-image so that it can be transmitted together to the receiver, overcoming the practical limitation encountered by the existing one-time-pad-like ciphers. Experimental results indicate that the proposed algorithm is secure against all common attacks and outperforms state-of-the-art approaches in terms of both security and efficiency.
引用
收藏
页数:12
相关论文
共 50 条
  • [31] A robust audio steganography technique based on image encryption using different chaotic maps
    Nasr, Marwa A.
    El-Shafai, Walid
    El-Rabaie, El-Sayed M.
    El-Fishawy, Adel S.
    El-Hoseny, Heba M.
    Abd El-Samie, Fathi E.
    Abdel-Salam, Nariman
    SCIENTIFIC REPORTS, 2024, 14 (01):
  • [32] Combined image encryption and steganography technique for enhanced security using multiple chaotic maps*
    Aparna, H.
    Madhumitha, J.
    COMPUTERS & ELECTRICAL ENGINEERING, 2023, 110
  • [33] FPGA image encryption-steganography using a novel chaotic system with line equilibria
    Sun, Jing-yu
    Cai, Hong
    Wang, Gang
    Gao, Zi-bo
    Zhang, Hao
    DIGITAL SIGNAL PROCESSING, 2023, 134
  • [34] On the security of an image encryption scheme based on one-way chaotic function
    Xie, Bangyong
    Wang, Deshi
    Liu, Shihua
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2009, 37 (06): : 52 - 55
  • [35] Using the Chaotic Map in Image Steganography
    Enayatifar, Rasul
    Mahmoudi, Fariborz
    Mirzaei, Khadije
    2009 INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT AND ENGINEERING, PROCEEDINGS, 2009, : 491 - +
  • [36] Using the Chaotic Map in Image Steganography
    Enayatifar, Rasul
    Faridnia, Saed
    Sadeghi, Hossein
    PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING SYSTEMS, 2009, : 754 - +
  • [37] An image encryption scheme base on chaotic maps
    Zhang, Wei
    Zhu, Zhi-liang
    Yu, Hai
    2009 INTERNATIONAL WORKSHOP ON CHAOS-FRACTALS THEORIES AND APPLICATIONS (IWCFTA 2009), 2009, : 195 - 199
  • [38] An Image Encryption Scheme Based on Chaotic Map
    Peng, Jun
    Jin, Shangzhu
    Chen, Guorong
    Yang, Zhiming
    Liao, Xiaofeng
    ICNC 2008: FOURTH INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION, VOL 4, PROCEEDINGS, 2008, : 595 - +
  • [39] An image encryption scheme based on chaotic systems
    Xiao, Huang-Pei
    Zhang, Guo-Ji
    PROCEEDINGS OF 2006 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2006, : 2707 - +
  • [40] A novel hybrid scheme for chaotic image encryption
    Li, Ying
    Wang, Qianxue
    Yu, Simin
    PHYSICA SCRIPTA, 2024, 99 (04)