A Chaotic Image Encryption Scheme Based on Henon-Chebyshev Modulation Map and Genetic Operations

被引:18
|
作者
Liu, Yu [1 ]
Qin, Zheng [1 ]
Liao, Xiaofeng [2 ]
Wu, Jiahui [3 ]
机构
[1] Hunan Univ, Coll Comp Sci & Elect Engn, Changsha 410082, Hunan, Peoples R China
[2] Chongqing Univ, Coll Comp Sci, Chongqing 400044, Peoples R China
[3] Southwest Univ, Coll Elect & Informat Engn, Chongqing 400715, Peoples R China
来源
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS | 2020年 / 30卷 / 06期
基金
中国国家自然科学基金;
关键词
Image encryption; Chebyshev map; Henon map; chaotic cryptography; genetic operation; NUMBER GENERATOR; SINE MAP; CRYPTANALYSIS; SECURE; COMBINATION; SYSTEM;
D O I
10.1142/S021812742050090X
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
Thanks to the complex characteristics of ergodicity, pseudo-randomness and sensitivity in initial conditions, chaotic systems have been widely applied in the field of cryptography. By cascading the Henon map and the Chebyshev map, a new two-dimensional Henon-Chebyshev modulation map (2D-HCMM) is proposed in this paper. Several methods of objective assessment, including phase diagrams, bifurcation diagrams, Lyapunov exponents and information entropy, are utilized to analyze the dynamics of the 2D-HCMM. The results show that the 2D-HCMM possesses better ergodicity and unpredictability, with larger chaotic ranges, compared with the original chaotic maps. By using the proposed map and the essential principles of genetic recombination and genetic mutation, a new image encryption scheme is proposed. In this scheme, the bit planes of image are substituted by genetic recombination operation, and the pixel values are scrambled randomly by genetic mutation operation. The simulation results and security analysis demonstrate that the proposed scheme not only can resist various conventional attacks, but also possesses a fast speed, achieving a good trade-off between security and efficiency.
引用
收藏
页数:22
相关论文
共 50 条
  • [1] Genetic algorithm for attack of image encryption scheme based chaotic map
    Mekhaznia, Tahar
    Zidani, Abdelmadjid
    2016 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY FOR ORGANIZATIONS DEVELOPMENT (IT4OD), 2016,
  • [2] Cryptanalysis of an image encryption scheme based on two-point diffusion strategy and Henon map
    Wong, Kuan-Wai
    Yap, Wun-She
    Goi, Bok -Min
    Wong, Denis C. K.
    Ye, Guodong
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2024, 81
  • [3] An image encryption approach based on chaotic maps and genetic operations
    Niu, Ying
    Zhou, Zheng
    Zhang, Xuncai
    MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (35-36) : 25613 - 25633
  • [4] An image encryption scheme based on chaotic tent map
    Li, Chunhu
    Luo, Guangchun
    Qin, Ke
    Li, Chunbao
    NONLINEAR DYNAMICS, 2017, 87 (01) : 127 - 133
  • [5] An image encryption scheme based on chaotic tent map
    Chunhu Li
    Guangchun Luo
    Ke Qin
    Chunbao Li
    Nonlinear Dynamics, 2017, 87 : 127 - 133
  • [6] An Effective Color Image Encryption Based on Henon Map, Tent Chaotic Map, and Orthogonal Matrices
    Kanwal, Shamsa
    Inam, Saba
    Ben Othman, Mohamed Tahar
    Waqar, Ayesha
    Ibrahim, Muhammad
    Nawaz, Fariha
    Nawaz, Zainab
    Hamam, Habib
    SENSORS, 2022, 22 (12)
  • [7] Colour image encryption scheme based on enhanced quadratic chaotic map
    Herbadji, Djamel
    Belmeguenai, Aissa
    Derouiche, Nadir
    Liu, Hongjung
    IET IMAGE PROCESSING, 2020, 14 (01) : 40 - 52
  • [8] Image encryption algorithm based on genetic operations and chaotic DNA encoding
    Qobbi, Younes
    Jarjar, Abdeltif
    Essaid, Mohamed
    Benazzi, Abdelhamid
    SOFT COMPUTING, 2022, 26 (12) : 5823 - 5832
  • [9] A novel image encryption scheme based on Henon map and compound spatiotemporal chaos
    Zheng, Yifeng
    Jin, Jianxiu
    MULTIMEDIA TOOLS AND APPLICATIONS, 2015, 74 (18) : 7803 - 7820
  • [10] An Image Encryption Transmission Scheme Based on a Polynomial Chaotic Map
    Zhang, Yanpeng
    Dong, Wenjie
    Zhang, Jing
    Ding, Qun
    ENTROPY, 2023, 25 (07)