A color image privacy scheme established on nonlinear system of coupled differential equations

被引:8
作者
Javeed, Adnan [1 ]
Shah, Tariq [1 ]
Ullah, Atta [1 ]
机构
[1] Natl Univ Technol, Dept Math, Islamabad, Pakistan
关键词
Differential equations; Chaotic system; Image privacy; Encryption analysis; ENCRYPTION SCHEME; DYNAMICAL-SYSTEM; ALGORITHM; CHAOS; DESIGN;
D O I
10.1007/s11042-020-09582-2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this manuscript, an encryption technique is developed using a coupled chaotic system of differential equations. The lengthy process of recurring rounds of encryption consumes more space and time on the computing systems demands simple but yet applicable scheme of image encryption, which opens the gateway of the utilization of complex and nonlinear chaotic systems. The proposed image encryption procedure is fast as implementation is concerned because of containing only one round, furthermore, it is found resistant against any type of differential and linear attacks due to the large keyspace and involvement of complex mathematical systems. The third order nonlinearity of Rabinovich-Fabrikant (RF) system of differential equations generates rich and complex chaotic dynamics. Initially, this system is used to generate three chaotic sequences of pseudorandom numbers from the numerical solution of RF system. Then, a color image being converted into three layers is passed from three mathematical operations i.e. XOR, permutation and substitution to create confusion and diffusion in them to generate enciphered image. Moreover, encrypted images successfully passed the NIST SP-800 test and encryption analyses like correlation, histogram and information entropy etc.
引用
收藏
页码:32487 / 32501
页数:15
相关论文
共 43 条
[1]   Security analysis and enhancements of an image cryptosystem based on hyperchaotic system [J].
Ahmad, Musheer ;
Doja, Mohammad Najam ;
Beg, Mirza Mohd Sufyan .
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES, 2021, 33 (01) :77-85
[2]  
Alligood K.T., 1996, Chaos: An Introduction to Dynamical Systems
[3]   An Image Encryption Scheme Based on Lorenz System for Low Profile Applications [J].
Anees, Amir .
3D RESEARCH, 2015, 6 (03) :01-10
[4]  
[Anonymous], 1985, IEEE STAND BIN FLOAT
[5]   BCH Codes with computational approach and its applications in image encryption [J].
Asif, Muhammad ;
Shah, Tariq .
JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2019, 37 (03) :3925-3939
[6]   A novel algorithm for image encryption based on mixture of chaotic maps [J].
Behnia, S. ;
Akhshani, A. ;
Mahmodi, H. ;
Akhavan, A. .
CHAOS SOLITONS & FRACTALS, 2008, 35 (02) :408-419
[7]   Efficient cryptosystem approaches: S-boxes and permutation-substitution-based encryption [J].
Belazi, Akram ;
Khan, Majid ;
Abd El-Latif, Ahmed A. ;
Belghith, Safya .
NONLINEAR DYNAMICS, 2017, 87 (01) :337-361
[8]   Chaos-based partial image encryption scheme based on linear fractional and lifting wavelet transforms [J].
Belazi, Akram ;
El-Latif, Ahmed A. Abd ;
Diaconu, Adrian-Viorel ;
Rhouma, Rhouma ;
Belghith, Safya .
OPTICS AND LASERS IN ENGINEERING, 2017, 88 :37-50
[9]   Secure image encryption algorithm design using a novel chaos based S-Box [J].
Cavusoglu, Unal ;
Kacar, Sezgin ;
Pehlivan, Ihsan ;
Zengin, Ahmet .
CHAOS SOLITONS & FRACTALS, 2017, 95 :92-101
[10]   A novel chaos-based image encryption algorithm using DNA sequence operations [J].
Chai, Xiuli ;
Chen, Yiran ;
Broyde, Lucie .
OPTICS AND LASERS IN ENGINEERING, 2017, 88 :197-213