Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3573942.3574063acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaiprConference Proceedingsconference-collections
research-article

An Efficient Image Encryption Algorithm Based on Hyperchaotic and Two Times of Scrambling Diffusion

Published: 16 May 2023 Publication History

Abstract

An image encryption algorithm based on hyperchaotic system is proposed to satisfy the security of image information transmission, the encryption algorithm consists of two times of scrambling and diffusion. The relation between plaintext and key is constructed to generate plaintext related chaotic sequence. Two rounds of scrambling operation are performed to make the pixel positions of the image are sufficiently scrambled, and two-way diffusion is carried out after scrambling, in this way, the value of any one pixel can affect other pixel values as much as possible. The information entropy, histogram distribution, adjacent pixel correlation, plaintext sensitivity, key sensitivity and key space are analyzed. As show by simulation results, our algorithm has good encryption effect and high security.

References

[1]
Chengqing Li, Yun Zhang, and Eric Yong Xie. 2019. When an attacker meets a cipher-image in 2018: A Year in Review. Inf. Secur. Tech. Rep. 48 (October 2019), 102361. https://doi.org/10.1016/j.jisa.2019.102361
[2]
Shuang Yi, Yicong Zhou, and Zhongyun Hua. 2018. Reversible data hiding in encrypted images using adaptive block-level prediction-error expansion. Signal Process-Image 64 (May 2018), 78–88. https://doi.org/10.1016/j.image.2018.03.001
[3]
V. M. Manikandan and V. Masilamani. 2018. A Novel Reversible Data Hiding Scheme that Provides Image Encryption. Journal of Image and Graphics, Vol. 6, No. 1, pp. 64-68 (June 2018). https://doi.org/10.18178/joig.6.1.64-68
[4]
Frank Y. Shih. 2017. Digital watermarking and steganography: Fundamentals and techniques (2st. ed.). CRC Press, Boca Raton. https://doi.org/10.1201/9781315121109
[5]
Ali Soleymani, Md Jan Nordin, and Zulkarnain Md Ali. 2013. A Novel Public Key Image Encryption Based on Elliptic Curves over Prime Group Field. Journal of Image and Graphics, Vol. 1, No. 1, pp. 43-49 (March 2013). https://doi.org/10.12720/joig.1.1.43-49
[6]
Zhongyun Hua and Yicong Zhou. 2016. Image encryption using 2D Logistic-adjusted-Sine map. Inf. Sci. 339 (April 2016), 237–253. https://doi.org/10.1016/j.ins.2016.01.017
[7]
Zhongyun Hua, Yicong Zhou, Chiman Pun, and C.L. Philip Chen. 2015. 2D Sine Logistic modulation map for image encryption. Inform. Sciences 297 (March 2015), 80–94. https://doi.org/10.1016/j.ins.2014.11.018
[8]
Zhongyun Hua, Fan Jin, Binxuan Xu, and Hejiao Huang. 2D Logistic-Sine-coupling map for image encryption. Signal Process. 149 (August 2018), 148–161. https://doi.org/10.1016/j.sigpro.2018.03.010
[9]
NIST. 1999. FIPS PUB 46, Data Encryption Standard (DES). FIPS PUB, New York, NY.
[10]
NIST. 2001. FIPS PUB 197, Advanced Encryption Standard (AES). FIPS PUB, New York, NY.
[11]
Shujun Li, Guanrong Chen, Albert Cheung, Bharat Bhargava, and Kwok-Tung Lo. 2007. On the design of perceptual MPEG-video encryption algorithms. IEEE T. Circ. Syst. Vid. 17, 2 (February 2007), 214–223. https://doi.org/10.1109/TCSVT.2006.888840
[12]
Shihua Chen and Jinhu Lü. 2002. Parameters identification and synchronization of chaotic systems based upon adaptive control. Phys. Lett. A 299, 4 (July 2002), 353–358. https://doi.org/10.1016/S0375-9601(02)00522-4
[13]
Xiaogang Wu, Hanping Hu, and Baoliang Zhang. 2004. Parameter estimation only from the symbolic sequences generated by chaos system. Chaos Soliton. Fract. 22, 2 (October 2004), 359–366. https://doi.org/10.1016/j.chaos.2004.02.008
[14]
S. Yoosefian Dezfuli Nezhad, Naser Safdarian, and Seyed A. Hoseini Zadeh. 2020. New method for fingerprint images encryption using DNA sequence and chaotic tent map. Optik 224, 7 (December 2020), 165661. https://doi.org/10.1016/j.ijleo.2020.165661
[15]
Xiuli Chai, Yiran Chen, and Lucie Broydea. 2017. A novel chaos-based image encryption algorithm using DNA sequence operations. Opt. Lasers Eng. 88 (January 2017), 197–213. https://doi.org/10.1016/j.optlaseng.2016.08.009
[16]
Dan Yang, Shucui Xie, and Jianzhong Zhang. 2020. Fast image encryption scheme based on hyper-chaotic and blocking. Comput. Eng. Des. 41, 1 (January 2020), 40–45. https://doi.org/10.16208/j.issn1000-7024.2020.01.007
[17]
Zhen Li, Changgen Peng, Liangrong Li and Xiaoyan Zhu. A novel plaintext-related image encryption scheme using hyper-chaotic system. 2018. Nonlinear Dyn 94, 1319-1333. https://doi.org/10.1007/s1107-018-4426-4.
[18]
Guobo Xie and Zhenyu Wu. 2019. Chaotic image encryption algorithm based on wavelet transform and gravity model. Comput. Eng. Appl. 55, 13 (July 2019), 100–105. https://doi.org/10.3778/j.issn.1002-8331.1805-0358
[19]
Yong Zhang. 2016. Chaotic digital cryptosystem (1st. ed.). Tsinghua University Press, Beijing, 16-101.
[20]
Yong Zhang. 2017. A chaotic system based image encryption scheme with identical encryption and decryption algorithm. Chinese J. Electron. 26, 5 (September 2017), 1022–1031. https://doi.org/10.1049/cje.2017.08.022
[21]
Lie Lei, Pengcheng Wei, and Li Li, and Sheng Yin. Fast image encryption algorithm based on a second secret key. Sci. Techn. Eng. 16, 28 (October 2016), 259–263. https://doi.org/10.3969/j.issn.1671-1815.2016.28.047
[22]
Wenhao Liu, Kehui Sun, and Congxu Zhu. 2016. A fast image encryption algorithm based on chaotic map. Opt. Laser. Eng. 84 (September 2016), 26–36. https://doi.org/10.1016/j.optlaseng.2016.03.019
[23]
Gonzalo Alvarez and Shujun Li. 2006. Some basic cryptographic requirements for chaos-based cryptosystems. Int. J. Bifurcat. Chaos 16, 8 (August 2006), 2129–2151. https://doi.org/10.1142/S0218127406015970

Index Terms

  1. An Efficient Image Encryption Algorithm Based on Hyperchaotic and Two Times of Scrambling Diffusion
          Index terms have been assigned to the content through auto-classification.

          Recommendations

          Comments

          Information & Contributors

          Information

          Published In

          cover image ACM Other conferences
          AIPR '22: Proceedings of the 2022 5th International Conference on Artificial Intelligence and Pattern Recognition
          September 2022
          1221 pages
          ISBN:9781450396899
          DOI:10.1145/3573942
          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          Published: 16 May 2023

          Permissions

          Request permissions for this article.

          Check for updates

          Qualifiers

          • Research-article
          • Research
          • Refereed limited

          Conference

          AIPR 2022

          Contributors

          Other Metrics

          Bibliometrics & Citations

          Bibliometrics

          Article Metrics

          • 0
            Total Citations
          • 16
            Total Downloads
          • Downloads (Last 12 months)4
          • Downloads (Last 6 weeks)0
          Reflects downloads up to 04 Oct 2024

          Other Metrics

          Citations

          View Options

          Get Access

          Login options

          View options

          PDF

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader

          HTML Format

          View this article in HTML Format.

          HTML Format

          Media

          Figures

          Other

          Tables

          Share

          Share

          Share this Publication link

          Share on social media