Image encryption based on Fisher-Yates shuffling and three dimensional chaotic economic map

被引:18
作者
Karawia, Abdelrahman [1 ,2 ]
机构
[1] Qassim Univ, Comp Sci Unit, Deanship Educ Serv, Buraydah 51452, Saudi Arabia
[2] Mansoura Univ, Dept Math, Fac Sci, Mansoura 35516, Egypt
关键词
chaos; cryptography; image processing; plain image; image encryption algorithm; FYS; three-dimensional CEM; 3DCEM; shuffling image; Fisher-Yates shuffling; chaotic economic maps; substitution stage; ALGORITHM;
D O I
10.1049/iet-ipr.2018.5142
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Recently, few researchers investigated algorithms of image encryption using different chaotic economic maps (CEMs). However, the authors investigated the effect of these maps on the encryption of the plain image. In the current study, an image encryption algorithm via Fisher-Yates shuffling (FYS) combined with a three-dimensional (3D) CEM is given. FYS is used to generate the random permutation of a finite sequence. First, it is used to shuffle the rows and the columns of the plain image. Second, the 3DCEM is used in the substitution stage to confuse the pixels of the shuffling image. The proposed algorithm is applied to several types of images. Many measurements are performed to check the security and performance of the proposed algorithm. In addition, numerical simulations and experimental results have been implemented to verify that the proposed algorithm can resist different attack types.
引用
收藏
页码:2086 / 2097
页数:12
相关论文
共 45 条
[1]   An Enhanced Image Encryption Algorithm Using Fractional Chaotic Systems [J].
Ahmad, Musheer ;
Shamsi, Uzair ;
Khan, Imran Raza .
3RD INTERNATIONAL CONFERENCE ON RECENT TRENDS IN COMPUTING 2015 (ICRTC-2015), 2015, 57 :852-859
[2]  
[Anonymous], ACOUST SPEECH SIG PR
[3]  
Askar S.S., 2015, MATH PROBL ENG, V2015, P1
[4]   An Algorithm of Image Encryption Using Logistic and Two-Dimensional Chaotic Economic Maps [J].
Askar, Sameh S. ;
Karawia, Abdel A. ;
Al-Khedhairi, Abdulrahman ;
Al-Ammar, Fatemah S. .
ENTROPY, 2019, 21 (01)
[5]  
Askar SS, 2018, IET IMAGE PROCESS, V12, P158, DOI 10.1049/iet-ipr.2016.0906
[6]   Chaotic Image Encryption Design Using Tompkins-Paige Algorithm [J].
Borujeni, Shahram Etemadi ;
Eshghi, Mohammad .
MATHEMATICAL PROBLEMS IN ENGINEERING, 2009, 2009
[7]   An Image Encryption Scheme Based on High Dimension Chaos System [J].
Cao, Ying-yu ;
Fu, Chong .
International Conference on Intelligent Computation Technology and Automation, Vol 2, Proceedings, 2008, :104-108
[8]   A symmetric image encryption scheme based on 3D chaotic cat maps [J].
Chen, GR ;
Mao, YB ;
Chui, CK .
CHAOS SOLITONS & FRACTALS, 2004, 21 (03) :749-761
[9]   A new chaotic algorithm for video encryption [J].
Chiaraluce, F ;
Ciccarelli, L ;
Gambi, E ;
Pierleoni, P ;
Reginelli, M .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2002, 48 (04) :838-844
[10]   Analysis of the dynamics of Cournot team-game with heterogeneous players [J].
Ding, Zhanwen ;
Hang, Qinglan ;
Tian, Lixin .
APPLIED MATHEMATICS AND COMPUTATION, 2009, 215 (03) :1098-1105