A Novel Chaos-Based Symmetric Image Encryption Using Bit-Pair Level Process

被引:47
作者
Ge, Rongjun [1 ,2 ,3 ]
Yang, Guanyu [1 ,2 ,3 ]
Wu, Jiasong [1 ,2 ,3 ]
Chen, Yang [1 ,2 ,3 ,4 ]
Coatrieux, Gouenou [5 ]
Luo, Limin [1 ,2 ,3 ]
机构
[1] Southeast Univ, Sch Comp Sci & Engn, Lab Image Sci & Technol, Nanjing 210096, Jiangsu, Peoples R China
[2] Ctr Rech Informat Biomed Sino Francais LIA CRIBs, F-35000 Rennes, France
[3] Southeast Univ, Minist Educ, Key Lab Comp Network & Informat Integrat, Nanjing 210096, Jiangsu, Peoples R China
[4] Southeast Univ, Sch Cyber Sci & Engn, Nanjing 210096, Jiangsu, Peoples R China
[5] Inst Mines Telecom, Telecom Bretagne, INSERM U1101 LaTIM, F-29238 Brest, France
来源
IEEE ACCESS | 2019年 / 7卷
关键词
Chaos; image encryption; bit-pair level process; security; FRACTIONAL FOURIER-TRANSFORM; BLOCK CIPHER; SCHEME; SYSTEM;
D O I
10.1109/ACCESS.2019.2927415
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Nowadays, chaos-based image encryption is recognized as an effective choice in secure communications. This paper proposes a novel approach, which uses bit-pair level XOR, add, and rotation from top to bottom and enhances diffusion with pixel level XOR operator from the lower right corner to the upper left corner. Due to the bit-pair level encryption, the proposed scheme has ensured great security and high encryption speed. The chaotic series employed for encryption are obtained from the modified pulse-coupled spiking neurons circuit map. It is suitable for use encryption because of its abundant parameters: wide chaotic range, ergodicity, complexity, and high sensitivity. Furthermore, the results show the superiority of this scheme compared to the other four methods in terms of robustness to differential attack.
引用
收藏
页码:99470 / 99480
页数:11
相关论文
共 34 条
[1]   Some basic cryptographic requirements for chaos-based cryptosystems [J].
Alvarez, Gonzalo ;
Li, Shujun .
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2006, 16 (08) :2129-2151
[2]   Permutation entropy: A natural complexity measure for time series [J].
Bandt, C ;
Pompe, B .
PHYSICAL REVIEW LETTERS, 2002, 88 (17) :4
[3]   A novel image encryption scheme based on substitution-permutation network and chaos [J].
Belazi, Akram ;
Abd El-Latif, Ahmed A. ;
Belghith, Safya .
SIGNAL PROCESSING, 2016, 128 :155-170
[4]   Discrete fractional wavelet transform and its application to multiple encryption [J].
Bhatnagar, Gaurav ;
Wu, Q. M. Jonathan ;
Raman, Balasubramanian .
INFORMATION SCIENCES, 2013, 223 :297-316
[5]   A symmetric image encryption scheme based on 3D chaotic cat maps [J].
Chen, GR ;
Mao, YB ;
Chui, CK .
CHAOS SOLITONS & FRACTALS, 2004, 21 (03) :749-761
[6]   A fast chaos-based image encryption scheme with a dynamic state variables selection mechanism [J].
Chen, Jun-xin ;
Zhu, Zhi-liang ;
Fu, Chong ;
Yu, Hai ;
Zhang, Li-bo .
COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2015, 20 (03) :846-860
[7]   Optical color image encryption based on Arnold transform and interference method [J].
Chen, W. ;
Quan, C. ;
Tay, C. J. .
OPTICS COMMUNICATIONS, 2009, 282 (18) :3680-3685
[8]  
Corrochano E.B., 2005, Handbook of geometric computing: applications in pattern recognition, computer vision, neuralcomputing, and robotics
[9]   A fast chaotic block cipher for image encryption [J].
Fouda, J. S. Armand Eyebe ;
Effa, J. Yves ;
Sabat, Samrat L. ;
Ali, Maaruf .
COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2014, 19 (03) :578-588
[10]   Symmetric ciphers based on two-dimensional chaotic maps [J].
Fridrich, J .
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 1998, 8 (06) :1259-1284