An image encryption scheme based on constructing large permutation with chaotic sequence

被引:19
|
作者
Zhang, Xuanping [1 ]
Shao, Liping [2 ]
Zhao, Zhongmeng [1 ]
Liang, Zhigang [1 ]
机构
[1] Xi An Jiao Tong Univ, Dept Comp Sci, Xian 710049, Peoples R China
[2] Shaanxi Normal Univ, Sch Comp Sci, Xian 710062, Peoples R China
基金
中国国家自然科学基金;
关键词
ALGORITHM; ROBUST; CAT;
D O I
10.1016/j.compeleceng.2013.08.008
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes a chaos-based image encryption scheme with a permutation-diffusion structure. In the proposed scheme, the large permutation with the same size as the plain-image is used to shuffle the positions of image pixels totally. An effective method is also presented to construct the large permutation quickly and easily by combining several small permutations, where small permutations are directly generated using a chaotic map. In the diffusion stage, the pixel is enciphered by exclusive or with the previous ciphered pixel and a random number produced by the Logistic map with different initial conditions. Test results and analysis by using several security measures have shown that the proposed scheme is efficient and reliable, and can be applied to real-time image encryption. (C) 2013 Elsevier Ltd. All rights reserved.
引用
收藏
页码:931 / 941
页数:11
相关论文
共 50 条
  • [21] A Fast Chaotic Image Encryption Scheme With Simultaneous Permutation-Diffusion Operation
    Liu, Lidong
    Lei, Yuhang
    Wang, Dan
    IEEE ACCESS, 2020, 8 : 27361 - 27374
  • [22] An efficient chaotic image encryption scheme using simultaneous permutation–diffusion operation
    Qingxin Sheng
    Chong Fu
    Zhaonan Lin
    Junxin Chen
    Lin Cao
    Chiu-Wing Sham
    The Visual Computer, 2024, 40 : 1643 - 1658
  • [23] Image Encryption Algorithm Based on Chaotic Sequence
    Chen, Xiaodi
    Wu, Hong
    COMMUNICATIONS, SIGNAL PROCESSING, AND SYSTEMS, CSPS 2018, VOL II: SIGNAL PROCESSING, 2020, 516 : 262 - 265
  • [24] Image encryption algorithm based on chaotic sequence
    Zhang, Yong-Hong
    Kang, Bao-Sheng
    Zhang, Xue-Feng
    ICAT 2006: 16TH INTERNATIONAL CONFERENCE ON ARTIFICIAL REALITY AND TELEXISTENCE - WORSHOPS, PROCEEDINGS, 2006, : 221 - +
  • [25] Cracking a hierarchical chaotic image encryption algorithm based on permutation
    Li, Chengqing
    SIGNAL PROCESSING, 2016, 118 : 203 - 210
  • [26] An Image Encryption Scheme Based on IAVL Permutation Scheme and DNA Operations
    Sha, Yuwen
    Cao, Yinghong
    Yan, Huizhen
    Gao, Xinyu
    Mou, Jun
    IEEE ACCESS, 2021, 9 : 96321 - 96336
  • [27] New chaotic permutation methods for image encryption
    Awad, Abir
    Saadane, Abdelhakim
    IAENG International Journal of Computer Science, 2010, 37 (04)
  • [28] A Novel Chaotic Permutation-Substitution Image Encryption Scheme Based on Logistic Map and Random Substitution
    Arif, Jameel
    Khan, Muazzam A.
    Ghaleb, Baraq
    Ahmad, Jawad
    Munir, Arslan
    Rashid, Umer
    Al-Dubai, Ahmed Y.
    IEEE ACCESS, 2022, 10 : 12966 - 12982
  • [29] A robust and secure chaotic standard map based pseudorandom permutation-substitution scheme for image encryption
    Patidar, Vinod
    Pareek, N. K.
    Purohit, G.
    Sud, K. K.
    OPTICS COMMUNICATIONS, 2011, 284 (19) : 4331 - 4339
  • [30] AN IMAGE ENCRYPTION USING CHAOTIC PERMUTATION AND DIFFUSION
    Gopalakrishnan, T.
    Ramakrishnan, S.
    Balakumar, M.
    2014 INTERNATIONAL CONFERENCE ON RECENT TRENDS IN INFORMATION TECHNOLOGY (ICRTIT), 2014,