Enhancing image security through an advanced chaotic system with free control and zigzag scrambling encryption

被引:11
作者
Islam, Yousuf [1 ,2 ]
Li, Chunbiao [2 ]
Sun, Kehui [1 ]
He, Shaobo [3 ]
机构
[1] Cent South Univ, Sch Phys & Elect, Changsha 410083, Peoples R China
[2] Nanjing Univ Informat Sci & Technol, Sch Artificial Intelligence, Nanjing 210044, Peoples R China
[3] Xiangtan Univ, Sch Automat & Elect Informat, Xiangtan 411105, Peoples R China
基金
中国国家自然科学基金;
关键词
Chaotic system; Free control; Image encryption; Zigzag Scrambling; BROWNIAN-MOTION; ALGORITHM; IMPLEMENTATION; CRYPTANALYSIS; PERMUTATION; MODEL;
D O I
10.1007/s11042-024-18107-0
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
To ensure the secure and efficient transmission of images, we propose a new image encryption algorithm based on a chaotic system with free control and zigzag scrambling. The performance of the chaotic system is analyzed using the phase trajectory, Lyapunov exponents (LEs), and bifurcation diagram, which demonstrate its good ergodicity, complex chaotic behavior, large and continuous chaotic range, and stable Lyapunov exponent spectrum. In addition, based on this chaotic system, this algorithm also provided the security for the protection of image data. The algorithm involves scrambling pixel positions using an improved zigzag algorithm and substituting pixel values. The simulation and analysis results show that the proposed algorithm has high security and low time complexity. It can resist various attacks, including statistical analysis, differential attacks, brute-force attacks, known plaintext attacks, and chosen plaintext attacks. The experimental simulations and its performance tests prove that the proposed scheme is effective and secure in image data.
引用
收藏
页码:67327 / 67355
页数:29
相关论文
共 65 条
  • [1] A new approach to chaotic image encryption based on quantum chaotic system, exploiting color spaces
    Abd El-Latif, Ahmed A.
    Li, Li
    Wang, Ning
    Han, Qi
    Niu, Xiamu
    [J]. SIGNAL PROCESSING, 2013, 93 (11) : 2986 - 3000
  • [2] Chaos-based engineering applications with a 3D chaotic system without equilibrium points
    Akgul, Akif
    Calgan, Haris
    Koyuncu, Ismail
    Pehlivan, Ihsan
    Istanbullu, Ayhan
    [J]. NONLINEAR DYNAMICS, 2016, 84 (02) : 481 - 495
  • [3] Cryptanalysis of an image encryption algorithm based on DNA encoding
    Akhavan, A.
    Samsudin, A.
    Akhshani, A.
    [J]. OPTICS AND LASER TECHNOLOGY, 2017, 95 : 94 - 99
  • [4] Cryptanalysis of "an improvement over an image encryption method based on total shuffling"
    Akhavan, A.
    Samsudin, A.
    Akhshani, A.
    [J]. OPTICS COMMUNICATIONS, 2015, 350 : 77 - 82
  • [5] RAMHU: A New Robust Lightweight Scheme for Mutual Users Authentication in Healthcare Applications
    Al-Zubaidie, Mishall
    Zhang, Zhongwei
    Zhang, Ji
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2019, 2019
  • [6] Cryptanalyzing a nonlinear chaotic algorithm (NCA) for image encryption
    Alvarez, G.
    Li, Shujun
    [J]. COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2009, 14 (11) : 3743 - 3749
  • [7] Chaos-based partial image encryption scheme based on linear fractional and lifting wavelet transforms
    Belazi, Akram
    El-Latif, Ahmed A. Abd
    Diaconu, Adrian-Viorel
    Rhouma, Rhouma
    Belghith, Safya
    [J]. OPTICS AND LASERS IN ENGINEERING, 2017, 88 : 37 - 50
  • [8] Belazi A, 2015, INT WIREL COMMUN, P606, DOI 10.1109/IWCMC.2015.7289152
  • [9] Detection of selective forwarding attacks in heterogeneous sensor networks
    Brown, Jeremy
    Du, Xiaojiang
    [J]. 2008 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS, VOLS 1-13, 2008, : 1583 - 1587
  • [10] Social network data analysis to highlight privacy threats in sharing data
    Cerruto, Francesca
    Cirillo, Stefano
    Desiato, Domenico
    Gambardella, Simone Michele
    Polese, Giuseppe
    [J]. JOURNAL OF BIG DATA, 2022, 9 (01)