A new hybrid digital chaotic system with applications in image encryption

被引:294
作者
Alawida, Moatsum [1 ]
Samsudin, Azman [1 ]
Sen Teh, Je [1 ]
Alkhawaldeh, Rami S. [2 ]
机构
[1] USM, Sch Comp Sci, Gelugor 11800, Penang, Malaysia
[2] Univ Jordan, Dept Comp Informat Syst, Aqaba 77110, Jordan
基金
中国国家自然科学基金;
关键词
Chaos theory; Chaotic map; Cryptography; Image cipher; Image encryption; Perturbation; LOGISTIC MAP; COMBINATION;
D O I
10.1016/j.sigpro.2019.02.016
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Image encryption provides confidentiality to images by transforming them into unrecognizable forms that resemble white noise. Digital chaos is one of the areas used to design image ciphers due to its many desirable properties such as ergodicity, initial state sensitivity and unpredictability. This paper proposes a new image cipher based on the perturbation of a new hybrid chaotic system. The proposed hybrid system cascades and combines two chaotic maps as part of a new chaotification method. Chaotic performance evaluation indicates that the new hybridization method has better complexity, higher sensitivity, and a larger chaotic parameter range as compared to other recently proposed chaotification methods. The new chaotic system is then used in the design of a new image cipher. Both confusion and diffusion properties are attained based on perturbing the chaotic states and system parameters, which are then involved in pixel shuffling and substitution operations respectively. Security and performance analysis indicates that the proposed scheme is highly resistant to various cryptanalytic attacks, is statistically superior and more secure than previously proposed chaos-based image ciphers. (C) 2019 Elsevier B.V. All rights reserved.
引用
收藏
页码:45 / 58
页数:14
相关论文
共 51 条
  • [31] Chaos based crossover and mutation for securing DICOM image
    Ravichandran, Dhivya
    Praveenkumar, Padmapriya
    Rayappan, John Bosco Balaguru
    Amirtharajan, Rengarajan
    [J]. COMPUTERS IN BIOLOGY AND MEDICINE, 2016, 72 : 170 - 184
  • [32] COMMUNICATION THEORY OF SECRECY SYSTEMS
    SHANNON, CE
    [J]. BELL SYSTEM TECHNICAL JOURNAL, 1949, 28 (04): : 656 - 715
  • [33] Image cryptographic algorithm based on the Haar wavelet transform
    Tedmori, Sara
    Al-Najdawi, Nijad
    [J]. INFORMATION SCIENCES, 2014, 269 : 21 - 34
  • [34] A chaos-based keyed hash function based on fixed point representation
    Teh, Je Sen
    Tan, Kaijun
    Alawida, Moatsum
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2019, 22 (02): : 649 - 660
  • [35] A bit-level image encryption algorithm based on spatiotemporal chaotic system and self-adaptive
    Teng, Lin
    Wang, Xingyuan
    [J]. OPTICS COMMUNICATIONS, 2012, 285 (20) : 4048 - 4054
  • [36] A fast image algorithm based on rows and columns switch
    Wang, Xingyuan
    Wang, Qian
    Zhang, Yingqian
    [J]. NONLINEAR DYNAMICS, 2015, 79 (02) : 1141 - 1149
  • [37] A novel colour image encryption algorithm based on chaos
    Wang, Xingyuan
    Teng, Lin
    Qin, Xue
    [J]. SIGNAL PROCESSING, 2012, 92 (04) : 1101 - 1108
  • [38] A new chaos-based fast image encryption algorithm
    Wang, Yong
    Wong, Kwok-Wo
    Liao, Xiaofeng
    Chen, Guanrong
    [J]. APPLIED SOFT COMPUTING, 2011, 11 (01) : 514 - 522
  • [39] Wu Y., 2011, J SEL AREAS TELECOMM, P31, DOI DOI 10.4236/JSS.2015.33005
  • [40] Discrete Wheel-Switching Chaotic System and Applications
    Wu, Yue
    Zhou, Yicong
    Bao, Long
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2014, 61 (12) : 3469 - 3477