New color image cryptosystem via SHA-512 and hybrid domain

被引:11
作者
Wang, Kunshu [1 ]
Wu, Xiangjun [2 ,3 ]
Wang, Hui [2 ]
Kan, Haibin [3 ]
Kurths, Jurgen [4 ,5 ]
机构
[1] Nankai Univ, Coll Software, Tianjin 300000, Peoples R China
[2] Henan Univ, Sch Software, Kaifeng 475004, Peoples R China
[3] Fudan Univ, Shanghai Key Lab Intelligent Informat Proc, Sch Comp Sci, Shanghai 200433, Peoples R China
[4] Potsdam Inst Climate Impact Res PIK, D-14473 Potsdam, Germany
[5] Humboldt Univ, Dept Phys, D-12489 Berlin, Germany
基金
中国国家自然科学基金; 中国博士后科学基金;
关键词
Image encryption; SHA-512; Discrete wavelet transform (DWT); Chaotic maps; Spatial domain; DNA-SEQUENCE OPERATION; HYPER-CHAOTIC SYSTEM; ENCRYPTION SCHEME; WAVELET TRANSFORM; ARNOLD TRANSFORM; ALGORITHM; MAP; COMPRESSION; BLEND; CODE;
D O I
10.1007/s11042-021-10511-0
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Most current image encryption algorithms directly confuse and/or diffuse the image pixels only in spatial domain which results in reducing storage efficiency and making the cipher-image incompressible. In this paper, we introduce a new color image encryption scheme based on the hash function SHA-512, discrete wavelet transform (DWT) and chaotic maps with excellent performance. Combining with the plain-image and the secret keys, the SHA-512 is employed to generate the new keys. In the proposed algorithm, both the 2D-LASM and the 2D-SIMM are used to generate the keystreams, where the initial values and parameters are produced by the SHA-512 hash value. The single-level DWT is applied to decompose the plain-image into four image sub-bands. Then these sub-bands are shuffled, minified, reversed and swapped by the keystreams. The image after inverse discrete wavelet transform (IDWT) reconstruction is further divided and diffused using the keystreams (more than 2(349)) in spatial domain. Experimental results and performance analysis demonstrate the proposed scheme is an efficient, secure and robust encryption mechanism. Besides, the duration of the experiment was relatively short and required only 0.3628 s on average.
引用
收藏
页码:18875 / 18899
页数:25
相关论文
共 58 条
[1]  
Abdulla, EXPLOITING SIMILARIT
[2]   FPGA-based implementation alternatives for the inner loop of the Secure Hash Algorithm SHA-256 [J].
Algredo-Badillo, I. ;
Feregrino-Uribe, C. ;
Cumplido, R. ;
Morales-Sandoval, M. .
MICROPROCESSORS AND MICROSYSTEMS, 2013, 37 (6-7) :750-757
[3]   Some basic cryptographic requirements for chaos-based cryptosystems [J].
Alvarez, Gonzalo ;
Li, Shujun .
INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2006, 16 (08) :2129-2151
[4]   Encryption of multimedia content in partial encryption scheme of DCT transform coefficients using a lightweight stream algorithm [J].
Bahrami, Saeed ;
Naderi, Majid .
OPTIK, 2013, 124 (18) :3693-3700
[5]   Image encryption: Generating visually meaningful encrypted images [J].
Bao, Long ;
Zhou, Yicong .
INFORMATION SCIENCES, 2015, 324 :197-207
[6]   A novel chaotic based image encryption using a hybrid model of deoxyribonucleic acid and cellular automata [J].
Enayatifar, Rasul ;
Sadaei, Hossein Javedani ;
Abdullah, Abdul Hanan ;
Lee, Malrey ;
Isnin, Ismail Fauzi .
OPTICS AND LASERS IN ENGINEERING, 2015, 71 :33-41
[7]   An image encryption scheme based on irregularly decimated chaotic maps [J].
Ghebleh, M. ;
Kanso, A. ;
Noura, H. .
SIGNAL PROCESSING-IMAGE COMMUNICATION, 2014, 29 (05) :618-627
[8]   A novel chaos-based image encryption using DNA sequence operation and Secure Hash Algorithm SHA-2 [J].
Guesmi, R. ;
Farah, M. A. B. ;
Kachouri, A. ;
Samet, M. .
NONLINEAR DYNAMICS, 2016, 83 (03) :1123-1136
[9]   Chaotic image cryptosystem using DNA deletion and DNA insertion [J].
Hu, Ting ;
Liu, Ye ;
Gong, Li-Hua ;
Guo, Shao-Feng ;
Yuan, Hong-Mei .
SIGNAL PROCESSING, 2017, 134 :234-243
[10]   2D Sine Logistic modulation map for image encryption [J].
Hua, Zhongyun ;
Zhou, Yicong ;
Pun, Chi-Man ;
Chen, C. L. Philip .
INFORMATION SCIENCES, 2015, 297 :80-94