A Chaos-Based Image Encryption Technique Utilizing Hilbert Curves and H-Fractals

被引:61
作者
Zhang, Xuncai [1 ]
Wang, Lingfei [1 ]
Zhou, Zheng [1 ]
Niu, Ying [1 ]
机构
[1] Zhengzhou Univ Light Ind, Sch Elect & Informat Engn, Zhengzhou 450002, Henan, Peoples R China
基金
中国国家自然科学基金;
关键词
Hilbert curve; H-geometric fractal; hyperchaotic system; SHA-3; image encryption; chaotic cryptography; ALGORITHM; SCHEME; CRYPTANALYSIS; PERMUTATION; MIXTURE; MAP;
D O I
10.1109/ACCESS.2019.2921309
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Image encryption is the most direct and effective technical means for protecting the security of image information. Based on the space filling property of the Hilbert curve and the infinite property of the H-geometric fractal, a new image encryption technique is proposed, which combines the pseudo-randomness of a hyperchaotic system and the sensitivity to initial values. First, the hash value of a plaintext image is calculated using the secure hash algorithm 3 (SHA-3) as the initial value of the piece-wise linear chaotic map (PWLCM) and Rossler chaotic systems, which associates the key with the plaintext. In addition, the chaotic sequences that are generated by the chaotic systems are used to scramble the global pixel positions and the pixel values of the images, thereby disturbing the distribution of the pixel positions and the pixel values. Second, the Hilbert curve and H-fractal are alternately used to scramble the local pixel positions and diffuse the pixel values twice. Finally, the ciphertext feedback is used to further enhance the confusion and diffusion characteristics of the algorithm in order to achieve higher security. The experimental results and security analysis show that the encryption technique has enough key space to resist exhaustive attacks and can effectively resist statistical attacks, differential attacks, noise attacks, and cropping attacks. It can be used for military, judicial, and other privacy-related digital images secure storage and network security transmissions.
引用
收藏
页码:74734 / 74746
页数:13
相关论文
共 56 条
  • [1] A hybrid chaotic system and cyclic elliptic curve for image encryption
    Abd El-Latif, Ahmed A.
    Niu, Xiamu
    [J]. AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, 2013, 67 (02) : 136 - 143
  • [2] Al-Saidi Nadia M. G., 2009, Journal of Mathematics and Statistics, V5, P183, DOI 10.3844/jmssp.2009.183.189
  • [3] Alia Mohammad Ahmad, 2007, American Journal of Applied Sciences, V4, P848, DOI 10.3844/ajassp.2007.848.856
  • [4] Some basic cryptographic requirements for chaos-based cryptosystems
    Alvarez, Gonzalo
    Li, Shujun
    [J]. INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2006, 16 (08): : 2129 - 2151
  • [5] Anandi PMR, 2009, INT J COMPUT SCI NET, V9, P20
  • [6] [Anonymous], 2005, RES MANAGEMENT
  • [7] [Anonymous], 2004, CHINESE J STEREOLOGY
  • [8] Awad A., IEEE T COMPUT
  • [9] An authenticated image encryption scheme based on chaotic maps and memory cellular automata
    Bakhshandeh, Atieh
    Eslami, Ziba
    [J]. OPTICS AND LASERS IN ENGINEERING, 2013, 51 (06) : 665 - 673
  • [10] A novel algorithm for image encryption based on mixture of chaotic maps
    Behnia, S.
    Akhshani, A.
    Mahmodi, H.
    Akhavan, A.
    [J]. CHAOS SOLITONS & FRACTALS, 2008, 35 (02) : 408 - 419