Cosine-transform-based chaotic system for image encryption

被引:564
作者
Hua, Zhongyun [1 ]
Zhou, Yicong [2 ]
Huang, Hejiao [1 ]
机构
[1] Harbin Inst Technol, Sch Comp Sci & Technol, Shenzhen 518055, Peoples R China
[2] Univ Macau, Dept Comp & Informat Sci, Macau 999078, Peoples R China
基金
中国国家自然科学基金;
关键词
Chaotic system; Chaos-based encryption; Cryptography; Image privacy; Image encryption; Security analysis; ALGORITHM; COMPRESSION; DESIGN; SECURE; MAP;
D O I
10.1016/j.ins.2018.12.048
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Chaos is known as a natural candidate for cryptography applications owing to its properties such as unpredictability and initial state sensitivity. However, certain chaos-based cryptosystems have been proven to exhibit various security defects because their used chaotic maps do not have complex dynamical behaviors. To address this problem, this paper introduces a cosine-transform-based chaotic system (CTBCS). Using two chaotic maps as seed maps, the CTBCS can produce chaotic maps with complex dynamical behaviors. For illustration, we produce three chaotic maps using the CTBCS and analyze their chaos complexity. Using one of the generated chaotic maps, we further propose an image encryption scheme. The encryption scheme uses high-efficiency scrambling to separate adjacent pixels and employs random order substitution to spread a small change in the plain-image to all pixels of the cipher-image. The performance evaluation demonstrates that the chaotic maps generated by the CTBCS exhibit substantially more complicated chaotic behaviors than the existing ones. The simulation results indicate the reliability of the proposed image encryption scheme. Moreover, the security analysis demonstrates that the proposed image encryption scheme provides a higher level of security than several advanced image encryption schemes. (C) 2018 The Authors. Published by Elsevier Inc.
引用
收藏
页码:403 / 419
页数:17
相关论文
共 48 条
[1]   Some basic cryptographic requirements for chaos-based cryptosystems [J].
Alvarez, Gonzalo ;
Li, Shujun .
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2006, 16 (08) :2129-2151
[2]  
[Anonymous], 2010, 80022REV1A LEB 3 NAT
[3]  
Cantrell C. D., 2000, Modern Mathematical Methods for Physicists and Engineers
[4]   A novel bit-level image encryption algorithm based on 2D-LICM hyperchaotic map [J].
Cao, Chun ;
Sun, Kehui ;
Liu, Wenhao .
SIGNAL PROCESSING, 2018, 143 :122-133
[5]   The strict avalanche criterion randomness test [J].
Castro, JCH ;
Sierra, JM ;
Seznec, A ;
Izquierdo, A ;
Ribagorda, A .
MATHEMATICS AND COMPUTERS IN SIMULATION, 2005, 68 (01) :1-7
[6]   A visually secure image encryption scheme based on compressive sensing [J].
Chai, Xiuli ;
Gan, Zhihua ;
Chen, Yiran ;
Zhang, Yushu .
SIGNAL PROCESSING, 2017, 134 :35-51
[7]   A novel chaos-based image encryption algorithm using DNA sequence operations [J].
Chai, Xiuli ;
Chen, Yiran ;
Broyde, Lucie .
OPTICS AND LASERS IN ENGINEERING, 2017, 88 :197-213
[8]   Exploiting self-adaptive permutation-diffusion and DNA random encoding for secure and efficient image encryption [J].
Chen, Junxin ;
Zhu, Zhi-liang ;
Zhang, Li-bo ;
Zhang, Yushu ;
Yang, Ben-Qiang .
SIGNAL PROCESSING, 2018, 142 :340-353
[9]   Parameter Identification of Chaotic and Hyper-Chaotic Systems Using Synchronization-Based Parameter Observer [J].
Chen, Zhihuan ;
Yuan, Xiaohui ;
Yuan, Yanbin ;
Iu, Herbert Ho-Ching ;
Fernando, Tyrone .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2016, 63 (09) :1464-1475
[10]   Circular inter-intra pixels bit-level permutation and chaos-based image encryption [J].
Diaconu, Adrian-Viorel .
INFORMATION SCIENCES, 2016, 355 :314-327