Color image chaos encryption algorithm combining CRC and nine palace map

被引:131
作者
Xiong, Zenggang [1 ,2 ]
Wu, Yuan [1 ,2 ]
Ye, Conghuan [1 ,2 ]
Zhang, Xuemin [1 ]
Xu, Fang [1 ,2 ]
机构
[1] Hubei Engn Univ, Sch Comp & Informat Sci, Xiaogan 432000, Hubei, Peoples R China
[2] Hubei Univ, Sch Comp Sci & Informat Engn, Wuhan 430062, Hubei, Peoples R China
基金
中国国家自然科学基金;
关键词
Color image encryption; Cyclic redundancy check (CRC); Nine palace map; Logistic map; Cross shift; PERMUTATION; NETWORK; SYSTEM;
D O I
10.1007/s11042-018-7081-3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The color image encryption algorithm based on the chaos theory is not strong enough. In this paper, we proposed a color image chaos encryption algorithm combining Cyclic Redundancy Check (CRC) and nine palace map. Firstly, the pixel data of the plain image were moved and shuffled based on the theory of nine palace map. And the R, G and B components were extracted and converted into a binary sequence matrix that was then cyclically shifted based on the technology of generating CRC code. Finally, the encrypted image was derived from the XOR operation with random key matrix. The average entropy of encrypted image by our algorithm is 7.9993, which is slight improved compared with the coupled hyper chaotic Lorenz algorithm in previous studies. In addition, the algorithm has the advantages of large key space, high key sensitivity, anti-robust attack, and feasible encryption efficiency.
引用
收藏
页码:31035 / 31055
页数:21
相关论文
共 41 条
  • [1] [Anonymous], 2017, BIG DATA COMPUTATION
  • [2] AqeelurRehman LX, 2018, OPTIK, V153
  • [3] A novel image encryption scheme based on substitution-permutation network and chaos
    Belazi, Akram
    Abd El-Latif, Ahmed A.
    Belghith, Safya
    [J]. SIGNAL PROCESSING, 2016, 128 : 155 - 170
  • [4] An image encryption algorithm based on bit level Brownian motion and new chaotic systems
    Chai, Xiuli
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (01) : 1159 - 1175
  • [5] A novel chaos-based image encryption algorithm using DNA sequence operations
    Chai, Xiuli
    Chen, Yiran
    Broyde, Lucie
    [J]. OPTICS AND LASERS IN ENGINEERING, 2017, 88 : 197 - 213
  • [6] Exploiting chaos-based compressed sensing and cryptographic algorithm for image encryption and compression
    Chen, Junxin
    Zhang, Yu
    Qi, Lin
    Fu, Chong
    Xu, Lisheng
    [J]. OPTICS AND LASER TECHNOLOGY, 2018, 99 : 238 - 248
  • [7] Network Function Virtualization in Dynamic Networks: A Stochastic Perspective
    Cheng, Xiangle
    Wu, Yulei
    Min, Geyong
    Zomaya, Albert Y.
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2018, 36 (10) : 2218 - 2232
  • [8] Cheng YT, 2006, INT CONF NANO MICRO, P1
  • [9] Fu C, 2017, 2017 18TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNDP 2017), P121, DOI 10.1109/SNPD.2017.8022710
  • [10] Hua Z, 2017, SIGNAL PROCESS, V144