Image encryption algorithm based on Lorenz chaotic map with dynamic secret keys

被引:47
作者
Al-Hazaimeh, Obaida M. [1 ]
Al-Jamal, Mohammad F. [2 ]
Alhindawi, Nouh [3 ]
Omari, Abedalkareem [2 ]
机构
[1] Al Balqa Appl Univ, Al Huson Univ Coll, Dept Comp Sci, POB 50, Irbid, Jordan
[2] Yarmouk Univ, Dept Math, Irbid, Jordan
[3] Jadara Univ, Fac Sci & Informat Technol, Irbid, Jordan
关键词
Digital image encryption; Lorenz chaotic map; Chaos-based cryptography; Chaos theory; SCHEME;
D O I
10.1007/s00521-017-3195-1
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Over the past two decades, chaos-based encryption appeared as an original application for nonlinear dynamics and deterministic chaos to encrypt and decrypt data. In this paper, an implementation of digital image encryption scheme based on the Lorenz chaotic system is proposed. While in the process of generating chaotic key stream, the hash value of the plain image is embedded in the proposed cryptosystem to dynamically alter the initial secret keys to increase the security level. The proposed digital image encryption algorithm is described in detail along with its security analysis and implementation. The experimental results show that the proposed digital image encryption algorithm is efficient and has high security features and is suitable for practical uses across insecure networks.
引用
收藏
页码:2395 / 2405
页数:11
相关论文
共 32 条
[1]  
Al-hazaimeh O.M., 2012, IJCSI, V9
[2]  
Al-Hazaimeh O. M. Awad, 2012, INT J COMPUTER SCI I, V9, P240
[3]  
Al-Hazaimeh OMA, 2010, NEW CRYPTOGRAPHIC AL
[4]   A novel algorithm for image encryption based on mixture of chaotic maps [J].
Behnia, S. ;
Akhshani, A. ;
Mahmodi, H. ;
Akhavan, A. .
CHAOS SOLITONS & FRACTALS, 2008, 35 (02) :408-419
[5]   Clarifying chaos: Examples and counterexamples [J].
Brown, R ;
Chua, LO .
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 1996, 6 (02) :219-249
[6]   A symmetric image encryption scheme based on 3D chaotic cat maps [J].
Chen, GR ;
Mao, YB ;
Chui, CK .
CHAOS SOLITONS & FRACTALS, 2004, 21 (03) :749-761
[7]   An adaptive chaos synchronization scheme applied to secure communication [J].
Feki, M .
CHAOS SOLITONS & FRACTALS, 2003, 18 (01) :141-148
[8]   INFORMATION AND ENTROPY IN STRANGE ATTRACTORS [J].
FRASER, AM .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1989, 35 (02) :245-262
[9]   Symmetric ciphers based on two-dimensional chaotic maps [J].
Fridrich, J .
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 1998, 8 (06) :1259-1284
[10]  
Hao B-L, 1993, STARTING PARABOLAS I, P10