A novel image encryption scheme based on 3D bit matrix and chaotic map with Markov properties

被引:21
作者
Ge, Meng [1 ]
Ye, Ruisong [1 ]
机构
[1] Shantou Univ, Dept Math, Shantou 515063, Guangdong, Peoples R China
基金
中国国家自然科学基金;
关键词
Image encryption; Chaotic map; Markov property; Lorenz system; Logistic map; ALGORITHM; CRYPTANALYSIS; CIPHERS;
D O I
10.1016/j.eij.2018.10.001
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Based on 3D cat map, reverse 3D cat map and an improved class of chaotic maps with Markov properties, an effective bit-level image encryption scheme is proposed. Firstly, we convert the plain-image into binary matrix, and use the sum of all bits in the binary matrix as a part of secret keys to resist chosenplaintext attack and known-plaintext attack. Secondly, we design a mapping which maps a random bit position to another random bit position rather than using traditional sequential visiting the plainimage. Thirdly, a chaotic map with Markov properties is used in the diffuse process. This kind of chaotic map has good chaotic natures than the Logistic map, which keeps the uniformity and low autocorrelation. The results of simulation and security analysis show that the proposed image encryption scheme is able to resist various attacks and has excellent encryption performance. (C) 2019 Production and hosting by Elsevier B.V. on behalf of Faculty of Computers and Information, Cairo University.
引用
收藏
页码:45 / 54
页数:10
相关论文
共 30 条
[1]   Some basic cryptographic requirements for chaos-based cryptosystems [J].
Alvarez, Gonzalo ;
Li, Shujun .
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2006, 16 (08) :2129-2151
[2]   A symmetric image encryption scheme based on 3D chaotic cat maps [J].
Chen, GR ;
Mao, YB ;
Chui, CK .
CHAOS SOLITONS & FRACTALS, 2004, 21 (03) :749-761
[3]   Reusing the permutation matrix dynamically for efficient image cryptographic algorithm [J].
Chen, Jun-xin ;
Zhu, Zhi-liang ;
Fu, Chong ;
Yu, Hai ;
Zhang, Yushu .
SIGNAL PROCESSING, 2015, 111 :294-307
[4]   A fast chaos-based image encryption scheme with a dynamic state variables selection mechanism [J].
Chen, Jun-xin ;
Zhu, Zhi-liang ;
Fu, Chong ;
Yu, Hai ;
Zhang, Li-bo .
COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2015, 20 (03) :846-860
[5]   Symmetric ciphers based on two-dimensional chaotic maps [J].
Fridrich, J .
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 1998, 8 (06) :1259-1284
[6]   Chaos-based image encryption algorithm [J].
Guan, ZH ;
Huang, FJ ;
Guan, WJ .
PHYSICS LETTERS A, 2005, 346 (1-3) :153-157
[7]  
IEEE, 1985, IEEE Standard for Binary Floating-Point Arithmetic, P1, DOI 10.1109/IEEESTD.2019.8766229
[8]   A novel image encryption algorithm based on a 3D chaotic map [J].
Kanso, A. ;
Ghebleh, M. .
COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2012, 17 (07) :2943-2959
[9]   A general quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks [J].
Li, Shujun ;
Li, Chengqing ;
Chen, Guanrong ;
Bourbakis, Nikolaos G. ;
Lo, Kwok-Tung .
SIGNAL PROCESSING-IMAGE COMMUNICATION, 2008, 23 (03) :212-223
[10]   Security analysis of a chaos-based image encryption algorithm [J].
Lian, SG ;
Sun, JS ;
Wang, ZQ .
PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2005, 351 (2-4) :645-661