An image encryption method based on chaos system and AES algorithm

被引:119
作者
Arab, Alireza [1 ]
Rostami, Mohammad Javad [1 ]
Ghavami, Behnam [1 ]
机构
[1] Shahid Bahonar Univ Kerman, Kerman, Iran
关键词
AES encryption algorithm; Arnold chaos sequence; Linear conversion; Correlation; PERMUTATION;
D O I
10.1007/s11227-019-02878-7
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, a novel image encryption algorithm is proposed based on the combination of the chaos sequence and the modified AES algorithm. In this method, the encryption key is generated by Arnold chaos sequence. Then, the original image is encrypted using the modified AES algorithm and by implementing the round keys produced by the chaos system. The proposed approach not only reduces the time complexity of the algorithm but also adds the diffusion ability to the proposed algorithm, which make the encrypted images by the proposed algorithm resistant to the differential attacks. The key space of the proposed method is large enough to resist the brute-force attacks. This method is so sensitive to the initial values and input image so that the small changes in these values can lead to significant changes in the encrypted image. Using statistical analyses, we show that this approach can protect the image against the statistical attacks. The entropy test results illustrate that the entropy values are close to the ideal, and hence, the proposed algorithm is secure against the entropy attacks. The simulation results clarify that the small changes in the original image and key result in the significant changes in the encrypted image and the original image cannot be accessed.
引用
收藏
页码:6663 / 6682
页数:20
相关论文
共 23 条
[1]  
[Anonymous], 2014, ACM SIGARCH Computer Architecture News, V42, P1
[2]  
Bashir A., 2012, INT J COMPUT APPL, V975, P8887
[3]   Chaotic image encryption system using phase-magnitude transformation and pixel substitution [J].
Borujeni, Shahram Etemadi ;
Eshghi, Mohammad .
TELECOMMUNICATION SYSTEMS, 2013, 52 (02) :525-537
[4]  
D'souza FJ, 2017, 2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), P647, DOI 10.1109/CCAA.2017.8229881
[5]  
ElBadawy ESAM, 2010, INT C SIGN EL CIRC
[6]   Chaos-based image encryption algorithm [J].
Guan, ZH ;
Huang, FJ ;
Guan, WJ .
PHYSICS LETTERS A, 2005, 346 (1-3) :153-157
[7]  
Hamida A, 2012, IJCSI, V9, P41
[8]   A Novel Idea on Multimedia Encryption using Hybrid Crypto Approach [J].
Iyer, Sridhar C. ;
Sedamkar, R. R. ;
Gupta, Shiwani .
PROCEEDINGS OF INTERNATIONAL CONFERENCE ON COMMUNICATION, COMPUTING AND VIRTUALIZATION (ICCCV) 2016, 2016, 79 :293-298
[9]  
Jha Y, 2016, 2016 INTERNATIONAL CONFERENCE ON COMMUNICATION AND SIGNAL PROCESSING (ICCSP), VOL. 1, P177, DOI 10.1109/ICCSP.2016.7754116
[10]   A Survey of Image Encryption Algorithms [J].
Kumari M. ;
Gupta S. ;
Sardana P. .
3D Research, 2017, 8 (04)