Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Hyperchaotic Encryption Algorithm Based on Joseph Traversal and Bit Plane Reconstruction

  • Conference paper
  • First Online:
Bio-Inspired Computing: Theories and Applications (BIC-TA 2020)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1363))

  • 645 Accesses

Abstract

Image encryption is an effective technology to protect digital image security. This paper designs an image encryption algorithm based on Joseph problem and bit plane reconstruction. The encryption algorithm adopts the classical scrambling diffusion structure. By using the principle of Joseph problem, pixel points of encrypted image are moved to different positions to realize pixel scrambling of the image. The pseudo-random sequence generated by hyperchaos is used to scramble the different bit-planes of the encrypted image. Finally, DNA is used to encode the image and cipher feedback is used for diffusion. The simulation results show that the algorithm can encrypt different types of images into evenly distributed encrypted images. The security analysis shows that the algorithm has high key sensitivity and can resist various attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Cao, C., Sun, K., Liu, W.: A novel bit-level image encryption algorithm based on 2d-licm hyperchaotic map. Signal Process. 143, 122–133 (2018)

    Article  Google Scholar 

  2. Chai, X., Chen, Y., Broyde, L.: A novel chaos-based image encryption algorithm using DNA sequence operations. Opt. Lasers Eng. 88, 197–213 (2017)

    Article  Google Scholar 

  3. Chen, Y.: Optimal windows of rewiring period in randomly coupled chaotic maps. Phys. Lett. A 374(31), 3185–3189 (2010)

    Article  Google Scholar 

  4. Gong, L., Qiu, K., Deng, C.: An image compression and encryption algorithm based on chaotic system and compressive sensing. Opt. Laser Technol. 115, 257–267 (2019)

    Article  Google Scholar 

  5. Li, C., Zhang, Y.: When an attacker meets a cipher-image in 2018: a year in review. J. Inf. Secur. Appl. 48, 102361 (2019)

    Google Scholar 

  6. Lin, H.: Influences of electromagnetic radiation distribution on chaotic dynamics of a neural network. Appl. Math. Comput. 369, 124048 (2020)

    MathSciNet  Google Scholar 

  7. Liu, Q., Li, P., Zhang, M., Sui, Y.: A novel image encryption algorithm based on chaos maps with Markov properties. Commun. Nonlinear Sci. Numer. Simul. 20(2), 506–515 (2015)

    Article  Google Scholar 

  8. Pak, C., Huang, L.: A new color image encryption using combination of the 1d chaotic map. Signal Process. 138, 129–137 (2017)

    Article  Google Scholar 

  9. Radwan, A.G., AbdElHaleem, S.H.: Symmetric encryption algorithms using chaotic and non-chaotic generators: a review. J. Adv. Res. 7(2), 193–208 (2016)

    Article  Google Scholar 

  10. Wang, X., Teng, L.: An image blocks encryption algorithm based on spatiotemporal chaos. Nonlinear Dyn. 67(1), 365–371 (2012)

    Article  MathSciNet  Google Scholar 

  11. Wang, Y., Wong, K.W., Liao, X., Xiang, T.: A chaos-based image encryption algorithm with variable control parameters. Chaos, Solitons Fractals 41(4), 1773–1783 (2009)

    Article  Google Scholar 

  12. Wu, J., Liao, X., Yang, B.: Cryptanalysis and enhancements of image encryption based on three-dimensional bit matrix permutation. Signal Process. 142, 292–300 (2018)

    Article  Google Scholar 

  13. Wu, Y., Noonan, J.P., Agaian, S.: NPCR and UACI randomness tests for image encryption. Cyber J. Multidiscipl. J. Sci. Technol. J. Sel. Areas in Telecommunications 2, 31–38 (2011)

    Google Scholar 

  14. Wu, Y., Zhou, Y., Noonan, J.P., Agaian, S.: Design of image cipher using Latin squares. Inf. Sci. 264, 317–339 (2014)

    Article  MathSciNet  Google Scholar 

  15. Wu, Y., Zhou, Y., Saveriades, G., Agaian, S., Noonan, J.P., Natarajan, P.: Local Shannon entropy measure with statistical tests for image randomness. Inf. Sci. 222, 323–342 (2013)

    Article  MathSciNet  Google Scholar 

  16. Xiang, D., Xiong, Y.: Digital image scrambling based on Josephus traversing. Comput. Eng. Appl. 41(10), 44–46 (2005)

    Google Scholar 

  17. Zhang, H., Huang, W., Wang, Z., Chai, T.: Adaptive synchronization between two different chaotic systems with unknown parameters. Phys. Lett. A 350(5), 363–366 (2006)

    Article  Google Scholar 

  18. Zhang, X., Wang, C., Yao, W., Lin, H.: Chaotic system with Bondorbital attractors. Nonlinear Dyn. 97(4), 2159–2174 (2019). https://doi.org/10.1007/s11071-019-05113-3

    Article  MATH  Google Scholar 

  19. Zhang, Y.: Spatiotemporal chaos of fractional order logistic equation in nonlinear coupled lattices. Commun. Nonlinear Sci. Numer. Simul. 52(52), 52–61 (2017)

    MathSciNet  MATH  Google Scholar 

  20. Zhang, Y., Wang, X.: A new image encryption algorithm based on non-adjacent coupled map lattices. Appl. Soft Comput. 26, 10–20 (2015)

    Article  Google Scholar 

  21. Zhao, Q., Wang, C., Zhang, X.: A universal emulator for memristor, memcapacitor, and meminductor and its chaotic circuit. Chaos 29(1), 13141 (2019)

    Article  MathSciNet  Google Scholar 

  22. Gan, Z., Chai, X., Han, D., Chen, Y.: A chaotic image encryption algorithm based on 3-D bit-plane permutation. Neural Comput. Appl. 31(11), 7111–7130 (2018). https://doi.org/10.1007/s00521-018-3541-y

    Article  Google Scholar 

  23. Zhou, Y., Bao, L.: A new 1d chaotic system for image encryption. Signal Process. 97, 172–182 (2014)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xuncai Zhang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wu, T., Wang, S., Zhao, K., Zhang, X., Zhang, H., Wang, Y. (2021). Hyperchaotic Encryption Algorithm Based on Joseph Traversal and Bit Plane Reconstruction. In: Pan, L., Pang, S., Song, T., Gong, F. (eds) Bio-Inspired Computing: Theories and Applications. BIC-TA 2020. Communications in Computer and Information Science, vol 1363. Springer, Singapore. https://doi.org/10.1007/978-981-16-1354-8_9

Download citation

  • DOI: https://doi.org/10.1007/978-981-16-1354-8_9

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-16-1353-1

  • Online ISBN: 978-981-16-1354-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics