Exploiting robust quadratic polynomial hyperchaotic map and pixel fusion strategy for efficient image encryption

被引:100
作者
Feng, Wei [1 ]
Zhang, Jing [1 ]
Chen, Yao [1 ]
Qin, Zhentao [1 ]
Zhang, Yushu [2 ]
Ahmad, Musheer [3 ]
Wozniakd, Marcin [4 ]
机构
[1] Panzhihua Univ, Sch Math & Comp Sci, Panzhihua 617000, Peoples R China
[2] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing 211106, Peoples R China
[3] Jamia Millia Islamia, Dept Comp Engn, New Delhi 110025, India
[4] Silesian Tech Univ, Fac Appl Math, PL-44100 Gliwice, Poland
关键词
Hyperchaotic map; Chaotic performance evaluation; Image encryption; Pixel fusion; Image filtering;
D O I
10.1016/j.eswa.2024.123190
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Recently, to offer better protection for images, new image encryption (IE) algorithms have been continuously proposed. However, these algorithms still exhibit some problems, such as poor chaotic performance, flawed key design, and low efficiency. To solve these problems, we first constructed a robust hyperchaotic map called 2D-SQPM. Then, we further developed an efficient IE algorithm based on 2D-SQPM and a pixel fusion strategy (IEASP). The robustness and superiority of 2D-SQPM were verified through several chaotic indicators. These indicators include the Lyapunov exponent, sample entropy, Kolmogorov entropy, and permutation entropy, with average values of 11.5129, 2.8861, 2.4262, and 0.99989, respectively. Several targeted measures were devised in IEASP. Specifically, the common keystream avoids the need to constantly change secret keys. Pixel fusion reduces the computational cost of encryption operations. Two rounds of vector -level image filtering, chaotic pixel superposition, and intra-vector quick scrambling speed up encryption while strengthening security. The security and superiority of IEASP were confirmed through extensive experiments. IEASP achieved excellent scores for correlation coefficients (<0.005), information entropy (7.9998), NPCR (99.6096), and UACI (33.4643). Notably, IEASP also achieved an impressive average encryption rate of 56.3358 Mbps. Due to our targeted designs, IEASP outperforms many recently reported leading IE algorithms in several aspects, particularly in encryption efficiency.
引用
收藏
页数:18
相关论文
共 43 条
[1]   An image encryption algorithm based on new generalized fusion fractal structure [J].
Ahmad, Musheer ;
Agarwal, Shafali ;
Alkhayyat, Ahmed ;
Alhudhaif, Adi ;
Alenezi, Fayadh ;
Zahid, Amjad Hussain ;
Aljehane, Nojood O. .
INFORMATION SCIENCES, 2022, 592 :1-20
[2]   n-Dimensional Chaotic Map with application in secure communication [J].
Cao, Weijia ;
Cai, Hang ;
Hua, Zhongyun .
CHAOS SOLITONS & FRACTALS, 2022, 163
[3]   Security measurement of a medical communication scheme based on chaos and DNA coding [J].
Chen, Lei ;
Li, Chengqing ;
Li, Chao .
JOURNAL OF VISUAL COMMUNICATION AND IMAGE REPRESENTATION, 2022, 83
[4]   An efficient Intra-Inter pixel encryption scheme to secure healthcare images for an IoT environment [J].
Dash, Sachikanta ;
Padhy, Sasmita ;
Devi, S. Anjali ;
Sachi, Savya ;
Patro, K. Abhimanyu Kumar .
EXPERT SYSTEMS WITH APPLICATIONS, 2023, 231
[5]   Design of two dimensional hyperchaotic system through optimization benchmark function [J].
Erkan, Ugur ;
Toktas, Abdurrahim ;
Lai, Qiang .
CHAOS SOLITONS & FRACTALS, 2023, 167
[6]   2D hyperchaotic system based on Schaffer function for image encryption [J].
Erkan, Ugur ;
Toktas, Abdurrahim ;
Lai, Qiang .
EXPERT SYSTEMS WITH APPLICATIONS, 2023, 213
[7]   A Novel Compound-Coupled Hyperchaotic Map for Image Encryption [J].
Etoundi, Christophe Magloire Lessouga ;
Nkapkop, Jean De Dieu ;
Tsafack, Nestor ;
Ngono, Joseph Mvogo ;
Ele, Pierre ;
Wozniak, Marcin ;
Shafi, Jana ;
Ijaz, Muhammad Fazal .
SYMMETRY-BASEL, 2022, 14 (03)
[8]   Image Encryption Algorithm Based on Plane-Level Image Filtering and Discrete Logarithmic Transform [J].
Feng, Wei ;
Zhao, Xiangyu ;
Zhang, Jing ;
Qin, Zhentao ;
Zhang, Junkun ;
He, Yigang .
MATHEMATICS, 2022, 10 (15)
[9]   Cryptanalysis and Improvement of the Image Encryption Scheme Based on Feistel Network and Dynamic DNA Encoding [J].
Feng, Wei ;
Qin, Zhentao ;
Zhang, Jing ;
Ahmad, Musheer .
IEEE ACCESS, 2021, 9 :145459-145470
[10]   Cryptanalysis of the integrated chaotic systems based image encryption algorithm [J].
Feng, Wei ;
He, Yi-Gang ;
Li, Hong-Min ;
Li, Chun-Lai .
OPTIK, 2019, 186 :449-457