2D eπ-map for image encryption

被引:99
作者
Erkan, Ugur [1 ]
Toktas, Abdurrahim [2 ]
Toktas, Feyza [3 ]
Alenezi, Fayadh [4 ]
机构
[1] Karamanoglu Mehmetbey Univ, Fac Engn, Dept Comp Engn, TR-70200 Karaman, Turkey
[2] Karamanoglu Mehmetbey Univ, Fac Engn, Dept Elect & Elect Engn, TR-70200 Karaman, Turkey
[3] Mersin Univ, Fac Engn, Dept Comp Engn, TR-33343 Yenisehir, Mersin, Turkey
[4] Jouf Univ, Coll Engn, Dept Elect Engn, Sakakah, Saudi Arabia
关键词
Image processing; Image encryption; Chaotic map; 2D chaotic map; Euler map; Pi map; DIMENSIONAL CHAOTIC MAP; SEMI-TENSOR PRODUCT; ALGORITHM; MATRIX;
D O I
10.1016/j.ins.2021.12.126
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A chaotic map generally employed to generate chaotic sequence is key element for an image encryption algorithm (IEA). In this study, an IEA using novel 2D chaotic map, which is based on Euler and Pi numbers so-called e pi-map, is presented. e pi-map exploits infinity diversity attribute of these numbers. Moreover, a diffusion operation referred to as "bit reversion" in which the bits of the pixels are symmetrically reverted is proposed for manipulating the pixel value. e pi-map is exhaustively examined through bifurcation and trajectory diagrams, Lyapunov exponent (LE), sample entropy (SE), permutation entropy (PE) and 0-1 test. The encryption performance of the IEA is then investigated across various cryptanalysis such as key-space, key sensitivity, histogram, information entropy, correlation coefficient, differential attack, cropping attack, noise attack and encryption execution time. Furthermore, the results are compared with the most recent literature. It is demonstrated that e pi-map has superior hyperchaotic performance in views of ergodicity, complexity and randomness. The IEA based on e pi-map and bit reversion is a secure and reliable algorithm thanks to its outperforming cryptanalysis results. (C) 2022 Elsevier Inc. All rights reserved.
引用
收藏
页码:770 / 789
页数:20
相关论文
共 49 条
[1]   A superposition based multiple-image encryption using Fresnel-Domain high dimension chaotic phase encoding [J].
Abuturab, Muhammad Rafiq .
OPTICS AND LASERS IN ENGINEERING, 2020, 129
[2]   Some basic cryptographic requirements for chaos-based cryptosystems [J].
Alvarez, Gonzalo ;
Li, Shujun .
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2006, 16 (08) :2129-2151
[3]  
Asuni N., 2014, P STAG, P63
[4]   A substitution box generator, its analysis, and applications in image encryption [J].
Azam, Naveed Ahmed ;
Hayat, Umar ;
Ayub, Maria .
SIGNAL PROCESSING, 2021, 187
[5]   Permutation entropy: A natural complexity measure for time series [J].
Bandt, C ;
Pompe, B .
PHYSICAL REVIEW LETTERS, 2002, 88 (17) :4
[6]   A novel bit-level image encryption algorithm based on 2D-LICM hyperchaotic map [J].
Cao, Chun ;
Sun, Kehui ;
Liu, Wenhao .
SIGNAL PROCESSING, 2018, 143 :122-133
[7]   Designing a 2D infinite collapse map for image encryption [J].
Cao, Weijia ;
Mao, Yujun ;
Zhou, Yicong .
SIGNAL PROCESSING, 2020, 171
[8]   The strict avalanche criterion randomness test [J].
Castro, JCH ;
Sierra, JM ;
Seznec, A ;
Izquierdo, A ;
Ribagorda, A .
MATHEMATICS AND COMPUTERS IN SIMULATION, 2005, 68 (01) :1-7
[9]   Pixel similarity-based adaptive Riesz mean filter for salt-and-pepper noise removal [J].
Enginoglu, Serdar ;
Erkan, Ugur ;
Memis, Samet .
MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (24) :35401-35418
[10]   Image encryption algorithm based on 2D hyperchaotic map [J].
Gao, Xiaohong .
OPTICS AND LASER TECHNOLOGY, 2021, 142