Design a new image encryption algorithm based on a 2D-ASCC map

被引:7
作者
Fei, Xiaoyu [1 ]
Zhang, Jiujun [2 ]
Qin, Wenjie [3 ]
机构
[1] Anshan Normal Univ, Sch Foreign Languages, Anshan 114007, Liaoning, Peoples R China
[2] Liaoning Univ, Sch Math & Stat, Shenyang 110000, Peoples R China
[3] Yunnan Minzu Univ, Sch Math & Comp Sci, Kunming 650500, Peoples R China
基金
中国国家自然科学基金;
关键词
chaos; image encryption; 2D-ASCC; jump diffusion; SYSTEM;
D O I
10.1088/1402-4896/ac95d9
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
In this paper, a new model of 2D absolute sine-cosine coupling (2D-ASCC) is proposed. In comparison with other 2D chaos map, the proposed system has higher complexity and better property of pseudo-random. It can effectively improve the security performance of encryption algorithm, if the proposed chaos map is applied in the design of image encryption algorithm based on chaos. Then, a new diffusion algorithm is designed based on the jumping diffusion. The plaintext is divided into two groups, and each group of plaintext is encrypted with a different formula. The pixel value of each ciphertext is composed of several non-adjacent pixels and the pseudo-random values generated by the proposed chaos map. In comparison with some existing encryption scheme, by using the design encryption scheme, the plaintext image can be completely encrypted in one iteration, it can significantly increase the security of algorithm and reduces the correlation between adjacent pixels. Finally, by using the numerical simulation and the security analysis, the effectiveness of the encryption algorithm is verified, and the comparison results show the higher security of the design encryption algorithm.
引用
收藏
页数:19
相关论文
共 33 条
[1]   An authenticated image encryption scheme based on chaotic maps and memory cellular automata [J].
Bakhshandeh, Atieh ;
Eslami, Ziba .
OPTICS AND LASERS IN ENGINEERING, 2013, 51 (06) :665-673
[2]   Experimental validation of new non-coherent chaotic modulation via SDR implementation [J].
Benimam, Houssem ;
Sadoudi, Said ;
Teguig, Djamal .
PHYSICA SCRIPTA, 2022, 97 (08)
[3]   A new secure image encryption algorithm based on a 5D hyperchaotic map [J].
Fang, Dejian ;
Sun, Shuliang .
PLOS ONE, 2020, 15 (11)
[4]   STRUCTURE OF THE PARAMETER SPACE OF THE HENON MAP [J].
GALLAS, JAC .
PHYSICAL REVIEW LETTERS, 1993, 70 (18) :2714-2717
[5]   Cosine-transform-based chaotic system for image encryption [J].
Hua, Zhongyun ;
Zhou, Yicong ;
Huang, Hejiao .
INFORMATION SCIENCES, 2019, 480 :403-419
[6]   2D Sine Logistic modulation map for image encryption [J].
Hua, Zhongyun ;
Zhou, Yicong ;
Pun, Chi-Man ;
Chen, C. L. Philip .
INFORMATION SCIENCES, 2015, 297 :80-94
[7]   A robust image encryption algorithm resistant to attacks using DNA and chaotic logistic maps [J].
Jain, Anchal ;
Rajpal, Navin .
MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (10) :5455-5472
[8]   A New Class of Two-Dimensional Chaotic Maps with Closed Curve Fixed Points [J].
Jiang, Haibo ;
Liu, Yang ;
Wei, Zhouchao ;
Zhang, Liping .
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2019, 29 (07)
[9]   Quick response code and interference-based optical asymmetric cryptosystem [J].
Kumar, Avishek ;
Nishchal, Naveen K. .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 45 :35-43
[10]   Concealed Attack for Robust Watermarking Based on Generative Model and Perceptual Loss [J].
Li, Qi ;
Wang, Xingyuan ;
Ma, Bin ;
Wang, Xiaoyu ;
Wang, Chunpeng ;
Gao, Suo ;
Shi, Yunqing .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2022, 32 (08) :5695-5706