A Tweakable Image Encryption Algorithm Using an Improved Logistic Chaotic Map

被引:33
作者
Herbadji, Djamel [1 ]
Derouiche, Nadir [1 ]
Belmeguenai, Aissa [1 ]
Herbadji, Abderrahmane [2 ]
Boumerdassi, Selma [3 ]
机构
[1] Univ 20 August 1955, Elect Res Lab, Skikda 21000, Algeria
[2] Univ Mohamed Boudiaf, Lab Syst Anal & Signals LASS, Msila 28000, Algeria
[3] Conservatoire Natl Arts & Metiers, 292 Rue St Martin, F-75141 Paris 03, France
关键词
image encryption; chaos; logistic map; tweakable; TRANSFORM; PERMUTATION; SYSTEM;
D O I
10.18280/ts.360505
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper aims to improves the chaotic behavior of classical logistic chaotic map for image encryption. First, this classical technique was enhanced, and the effectiveness of the improved technique was verified by the bifurcation diagram and Lyapunov exponent, in comparison to the classical technique. On this basis, an efficient tweakable image encryption algorithm was proposed to protect the security of digital image transmission. The proposed algorithm adopts a confusion-diffusion architecture. With the aid of the tweak, each original image is encrypted as multiple different images using the same secret key-stream. The experimental results prove that the proposed algorithm, despite its simplicity, can withstand several types of attacks through image encryption. The research results shed new light on the data security in the transmission of digital images.
引用
收藏
页码:407 / 417
页数:11
相关论文
共 37 条
[1]   Image encryption by chaos mixing [J].
Abanda, Yannick ;
Tiedeu, Alain .
IET IMAGE PROCESSING, 2016, 10 (10) :742-750
[2]   Visual Meaningful Encryption Scheme Using Intertwinning Logistic Map [J].
Abbasi, Saadullah Farooq ;
Ahmad, Jawad ;
Khan, Jan Sher ;
Khan, Muazzam A. ;
Sheikh, Shehzad Amin .
INTELLIGENT COMPUTING, VOL 2, 2019, 857 :764-773
[3]   Cryptanalysis of a one round chaos-based Substitution Permutation Network [J].
Arroyo, David ;
Diaz, Jesus ;
Rodriguez, F. B. .
SIGNAL PROCESSING, 2013, 93 (05) :1358-1364
[4]  
Bashir Zia, 2016, Pacific Science Review A: Natural Science and Engineering, V18, P254, DOI 10.1016/j.psra.2016.11.003
[5]   A novel chaotic image cryptosystem based on DNA sequence operations and single neuron model [J].
Ben Slimane, Nabil ;
Aouf, Nahed ;
Bouallegue, Kais ;
Machhout, Mohsen .
MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (23) :30993-31019
[6]   A novel image encryption scheme based on DNA sequence operations and chaotic systems [J].
Chai, Xiuli ;
Gan, Zhihua ;
Yuan, Ke ;
Chen, Yiran ;
Liu, Xianxing .
NEURAL COMPUTING & APPLICATIONS, 2019, 31 (01) :219-237
[7]   Cryptography of medical images based on a combination between chaotic and neural network [J].
Dridi, Manel ;
Hajjaji, Mohamed Ali ;
Bouallegue, Belgacem ;
Mtibaa, Abdellatif .
IET IMAGE PROCESSING, 2016, 10 (11) :830-839
[8]   A novel sensitive image encryption algorithm based on the Zaslavsky chaotic map [J].
Hamza, Rafik ;
Titouna, Faiza .
INFORMATION SECURITY JOURNAL, 2016, 25 (4-6) :162-179
[9]  
HERBADJI D, 2018, 2018 INT C APPL SMAR, P1, DOI DOI 10.1109/ICASS.2018.8652065
[10]   Cosine-transform-based chaotic system for image encryption [J].
Hua, Zhongyun ;
Zhou, Yicong ;
Huang, Hejiao .
INFORMATION SCIENCES, 2019, 480 :403-419