A Novel Chaotic Image Encryption Scheme Based on Hash Function and Cyclic Shift

被引:32
作者
Wang, Xingyuan [1 ,2 ]
Wang, Siwei [2 ]
Wei, Na [2 ]
Zhang, Yingqian [3 ]
机构
[1] Dalian Maritime Univ, Sch Informat Sci & Technol, Dalian, Peoples R China
[2] Dalian Univ Technol, Fac Elect Informat & Elect Engn, Dalian, Peoples R China
[3] Xiamen Univ, Tan Kah Kee Coll, Sch Informat Sci & Technol, Zhangzhou, Peoples R China
基金
中国国家自然科学基金;
关键词
Bit and pixel level; Cyclic shift; Hash function; One-time keys; PWLCM; IMPROVEMENT;
D O I
10.1080/02564602.2017.1393352
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
A novel chaotic image encryption scheme based on hash function and cyclic shift is designed. The key streams are dependent on the hash value of the plain text and changed in every encryption process. The one-time keys are generated by the hash values of the plain images to get six initial values of the piecewise linear chaotic map (PWLCM). Then, the PWLCM system will produce three pseudo-random sequences to diffusion and confusion image. The mask operation and new fast ranks transformation method are used to encrypt image based on pixel level. Cycle shift is applied to the encryption system to change the position and the value of the pixels based on bit level. Many experiments are done and security analyses are discussed, which show that the novel algorithm has good effect and it can resist common attacks.
引用
收藏
页码:39 / 48
页数:10
相关论文
共 27 条
  • [1] Asymmetrical Duty-Cycle and Phase-Shift Control of a Novel Multiport CLL Resonant Converter
    Asa, Erdem
    Colak, Kerim
    Bojarski, Mariusz
    Czarkowski, Dariusz
    [J]. IEEE JOURNAL OF EMERGING AND SELECTED TOPICS IN POWER ELECTRONICS, 2015, 3 (04) : 1122 - 1131
  • [2] Chattopadhyay D., 2012, INT J ENG TECHNOL, V2, P425
  • [3] A hash-based image encryption algorithm
    Cheddad, Abbas
    Condell, Joan
    Curran, Kevin
    McKevitt, Paul
    [J]. OPTICS COMMUNICATIONS, 2010, 283 (06) : 879 - 893
  • [4] A symmetric image encryption scheme based on 3D chaotic cat maps
    Chen, GR
    Mao, YB
    Chui, CK
    [J]. CHAOS SOLITONS & FRACTALS, 2004, 21 (03) : 749 - 761
  • [5] Analysis and improvement of a hash-based image encryption algorithm
    Deng, Shaojiang
    Zhan, Yanping
    Xiao, Di
    Li, Yantao
    [J]. COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2011, 16 (08) : 3269 - 3278
  • [6] Symmetric ciphers based on two-dimensional chaotic maps
    Fridrich, J
    [J]. INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 1998, 8 (06): : 1259 - 1284
  • [7] Hash key-based image encryption using crossover operator and chaos
    Guesmi, Ramzi
    Ben Farah, Mohamed Amine
    Kachouri, Abdennaceur
    Samet, Mounir
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (08) : 4753 - 4769
  • [8] [郭海涛 Guo Haitao], 2015, [仪器仪表学报, Chinese Journal of Scientific Instrument], V36, P1350
  • [9] Multi chaotic systems based pixel shuffle for image encryption
    Huang, C. K.
    Nien, H. H.
    [J]. OPTICS COMMUNICATIONS, 2009, 282 (11) : 2123 - 2127
  • [10] Application of S-box and chaotic map for image encryption
    Hussain, Iqtadar
    Shah, Tariq
    Gondal, Muhammad Asif
    [J]. MATHEMATICAL AND COMPUTER MODELLING, 2013, 57 (9-10) : 2576 - 2579