A Novel Chaotic Image Encryption Scheme Based on Hash Function and Cyclic Shift

被引:32
作者
Wang, Xingyuan [1 ,2 ]
Wang, Siwei [2 ]
Wei, Na [2 ]
Zhang, Yingqian [3 ]
机构
[1] Dalian Maritime Univ, Sch Informat Sci & Technol, Dalian, Peoples R China
[2] Dalian Univ Technol, Fac Elect Informat & Elect Engn, Dalian, Peoples R China
[3] Xiamen Univ, Tan Kah Kee Coll, Sch Informat Sci & Technol, Zhangzhou, Peoples R China
基金
中国国家自然科学基金;
关键词
Bit and pixel level; Cyclic shift; Hash function; One-time keys; PWLCM; IMPROVEMENT;
D O I
10.1080/02564602.2017.1393352
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
A novel chaotic image encryption scheme based on hash function and cyclic shift is designed. The key streams are dependent on the hash value of the plain text and changed in every encryption process. The one-time keys are generated by the hash values of the plain images to get six initial values of the piecewise linear chaotic map (PWLCM). Then, the PWLCM system will produce three pseudo-random sequences to diffusion and confusion image. The mask operation and new fast ranks transformation method are used to encrypt image based on pixel level. Cycle shift is applied to the encryption system to change the position and the value of the pixels based on bit level. Many experiments are done and security analyses are discussed, which show that the novel algorithm has good effect and it can resist common attacks.
引用
收藏
页码:39 / 48
页数:10
相关论文
共 27 条
  • [11] Triple-image encryption scheme based on one-time key stream generated by chaos and plain images
    Liu, Hongjun
    Wang, Xingyuan
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2013, 86 (03) : 826 - 834
  • [12] Image encryption using DNA complementary rule and chaotic maps
    Liu, Hongjun
    Wang, Xingyuan
    Kadir, Abdurahman
    [J]. APPLIED SOFT COMPUTING, 2012, 12 (05) : 1457 - 1466
  • [13] An image encryption process based on Chaotic logistic map
    Mandal, Mrinal Kanti
    Banik, Gourab Dutta
    Chattopadhyay, Debasish
    Nandi, Debashis
    [J]. IETE TECHNICAL REVIEW, 2012, 29 (05) : 395 - 404
  • [14] A novel image encryption based on hash function with only two-round diffusion process
    Norouzi, Benyamin
    Seyedzadeh, Seyed Mohammad
    Mirzakuchaki, Sattar
    Mosavi, Mohammad Reza
    [J]. MULTIMEDIA SYSTEMS, 2014, 20 (01) : 45 - 64
  • [15] Pisarchik A. N., 2015, PHYSICA D, V239, P2638
  • [16] Cryptanalysis of a new substitution-diffusion based image cipher
    Rhouma, Rhouma
    Solak, Ercan
    Belghith, Safya
    [J]. COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2010, 15 (07) : 1887 - 1892
  • [17] Cryptanalysis of Image Encryption Algorithms Based on Pixels Shuffling and Bits Shuffling
    Sharma, Pankaj Kumar
    Kumar, Aditya
    Ahmad, Musheer
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGY, ICICT 2015, VOL 2, 2016, 439 : 281 - 289
  • [18] Multiple-image encryption with bit-plane decomposition and chaotic maps
    Tang, Zhenjun
    Song, Juan
    Zhang, Xianquan
    Sun, Ronghai
    [J]. OPTICS AND LASERS IN ENGINEERING, 2016, 80 : 1 - 11
  • [19] Novel image encryption algorithm based on cycle shift and chaotic system
    Wang, Xing-Yuan
    Gu, Sheng-Xian
    Zhang, Ying-Qian
    [J]. OPTICS AND LASERS IN ENGINEERING, 2015, 68 : 126 - 134
  • [20] A novel image encryption algorithm based on chaotic system and improved Gravity Model
    Wang, Xing-yuan
    Wei, Na
    Zhang, Dou-dou
    [J]. OPTICS COMMUNICATIONS, 2015, 338 : 209 - 217