Color pathological image encryption scheme with S-boxes generated by complex chaotic system and environmental noise

被引:9
作者
Liu, Guoyan [1 ]
Kadir, Abdurahman [2 ]
Liu, Hongjun [3 ]
机构
[1] Weifang Med Univ, Affiliated Hosp, Dept Dermatol, Weifang 261031, Peoples R China
[2] Xinjiang Univ Finance & Econ, Sch Comp Sci & Engn, Urumqi 830012, Peoples R China
[3] Weifang Vocat Coll, Sch Informat Engn, Weifang 261061, Peoples R China
基金
中国国家自然科学基金;
关键词
Pathological image encryption; Complex chaotic system; Environmental noise; S-box; Post-quantum cryptography; LORENZ SYSTEM; COUPLED MAP; ALGORITHM; TRANSFORMATION; PERMUTATION;
D O I
10.1007/s00521-015-1888-x
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Pathological image encryption can help protect medical privacy. The paper proposes a color pathological image encryption scheme where three S-boxes are utilized to encrypt the red, green and blue components alternately. The S-boxes generated by complex chaotic system are changed dynamically, for the initial values and parameter are dependent on both the plain image and the environmental noise. The S-box switching sequence for each color component is also generated by complex chaotic system. Some effective measures have been taken to speed up the processes of encryption and decryption. Simulation result demonstrates that the scheme is suitable for color pathological image encryption.
引用
收藏
页码:687 / 697
页数:11
相关论文
共 25 条
[1]   Pseudo random number generator based on quantum chaotic map [J].
Akhshani, A. ;
Akhavan, A. ;
Mobaraki, A. ;
Lim, S. -C. ;
Hassan, Z. .
COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2014, 19 (01) :101-111
[2]  
[Anonymous], 2007, Applied Cryptography: Protocols, Algorithms, and Source Code in C
[3]  
Fan J. W., 2013, Advanced Materials Research, V614-615, P1220, DOI 10.4028/www.scientific.net/AMR.631-632.1220
[4]   An efficient and provably secure three-party password-based authenticated key exchange protocol based on Chebyshev chaotic maps [J].
Farash, Mohammad Sabzinejad ;
Attari, Mahmoud Ahmadian .
NONLINEAR DYNAMICS, 2014, 77 (1-2) :399-411
[5]   A fast chaotic block cipher for image encryption [J].
Fouda, J. S. Armand Eyebe ;
Effa, J. Yves ;
Sabat, Samrat L. ;
Ali, Maaruf .
COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2014, 19 (03) :578-588
[6]   Improvement of an image encryption algorithm based on hyper-chaos [J].
Hermassi, Houcemeddine ;
Rhouma, Rhouma ;
Belghith, Safya .
TELECOMMUNICATION SYSTEMS, 2013, 52 (02) :539-549
[7]   Attacking code-based cryptosystems with information set decoding using special-purpose hardware [J].
Heyse, Stefan ;
Zimmermann, Ralf ;
Paar, Christof .
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8772 :126-141
[8]   Image encryption algorithm based on total shuffling scheme and chaotic S-box transformation [J].
Hussain, Iqtadar ;
Shah, Tariq ;
Gondal, Muhammad Asif .
JOURNAL OF VIBRATION AND CONTROL, 2014, 20 (14) :2133-2136
[9]   Stego optical encryption based on chaotic S-box transformation [J].
Hussain, Iqtadar ;
Azam, Naveed Ahmed ;
Shah, Tariq .
OPTICS AND LASER TECHNOLOGY, 2014, 61 :50-56
[10]   An extended image encryption using chaotic coupled map and S-box transformation [J].
Hussain, Iqtadar ;
Gondal, Muhammad Asif .
NONLINEAR DYNAMICS, 2014, 76 (02) :1355-1363