A new chaos-based image encryption algorithm with dynamic key selection mechanisms

被引:82
作者
Chai, Xiuli [1 ,2 ]
Yang, Kang [1 ]
Gan, Zhihua [3 ]
机构
[1] Henan Univ, Inst Image Proc & Pattern Recognit, Sch Comp & Informat Engn, Kaifeng 475004, Peoples R China
[2] Univ Pittsburgh, Dept Elect & Comp Engn, Pittsburgh, PA 15261 USA
[3] Henan Univ, Sch Software, Kaifeng 475004, Peoples R China
基金
中国国家自然科学基金;
关键词
Dynamic keystream sequence group selection mechanism (DKSGSM); Dynamic keystream selection mechanism (DKSM); Image encryption; Chaos; Permutation; Diffusion; SCHEME; IMPROVEMENT; STANDARD; CRYPTANALYSIS; PERMUTATION; MAP;
D O I
10.1007/s11042-016-3585-x
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In recent years, a wide variety of cryptographic algorithms based on chaos have been put forward and most of them have been proved to be successful by adopting the traditional permutation-diffusion architecture. However, one drawback these methods mostly hold is that they have little connection with the plaintext or, properly speaking, the relationship between them is rather less. The drawback makes the encryption algorithms vulnerable to the known-plaintext and chosen-plaintext attack. In addition, the secret keys are stationary at most times, and they can't be selected dynamically by the corresponding plain image pixels. In order to overcome these disadvantages mentioned above, we introduce a new chaos-based image encryption algorithm with dynamic key selection mechanisms in this paper, and present a dynamic keystream sequence group selection mechanism (DKSGSM) and a dynamic keystream selection mechanism (DKSM). They strongly enhance the relationship between the plaintext and the encryption scheme. In particular, the DKSGSM and DKSM expand the selection range of the keys and allow us to select the keys dynamically by the corresponding plaintext pixels. What's more, by adopting the bidirectional encryption, we can spread the influence to the whole image once a tiny change in plain image and this can greatly increase the security level of our encryption method. Simulation results and numerical analyses indicate that our encryption scheme is safe and efficient.
引用
收藏
页码:9907 / 9927
页数:21
相关论文
共 40 条
  • [1] A new image encryption scheme based on cyclic elliptic curve and chaotic system
    Abd El-Latif, Ahmed A.
    Li, Li
    Niu, Xiamu
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2014, 70 (03) : 1559 - 1584
  • [2] Cryptanalysis of "an improvement over an image encryption method based on total shuffling"
    Akhavan, A.
    Samsudin, A.
    Akhshani, A.
    [J]. OPTICS COMMUNICATIONS, 2015, 350 : 77 - 82
  • [3] An image encryption scheme based on quantum logistic map
    Akhshani, A.
    Akhavan, A.
    Lim, S. -C.
    Hassan, Z.
    [J]. COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2012, 17 (12) : 4653 - 4661
  • [4] An image encryption algorithm based on bit level Brownian motion and new chaotic systems
    Chai, Xiuli
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (01) : 1159 - 1175
  • [5] A fast chaos-based image encryption scheme with a dynamic state variables selection mechanism
    Chen, Jun-xin
    Zhu, Zhi-liang
    Fu, Chong
    Yu, Hai
    Zhang, Li-bo
    [J]. COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2015, 20 (03) : 846 - 860
  • [6] An improvement over an image encryption method based on total shuffling
    Eslami, Ziba
    Bakhshandeh, Atieh
    [J]. OPTICS COMMUNICATIONS, 2013, 286 : 51 - 55
  • [7] Symmetric ciphers based on two-dimensional chaotic maps
    Fridrich, J
    [J]. INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 1998, 8 (06): : 1259 - 1284
  • [8] A novel chaos-based bit-level permutation scheme for digital image encryption
    Fu, Chong
    Lin, Bin-bin
    Miao, Yu-sheng
    Liu, Xiao
    Chen, Jun-jie
    [J]. OPTICS COMMUNICATIONS, 2011, 284 (23) : 5415 - 5423
  • [9] Color image encryption using chaotic nonlinear adaptive filter
    Hsiao, Hung-I
    Lee, Junghsi
    [J]. SIGNAL PROCESSING, 2015, 117 : 281 - 309
  • [10] 2D Sine Logistic modulation map for image encryption
    Hua, Zhongyun
    Zhou, Yicong
    Pun, Chi-Man
    Chen, C. L. Philip
    [J]. INFORMATION SCIENCES, 2015, 297 : 80 - 94