Chaotic system is widely applied in field of information security because of its excellent properties of unpredictability, no periodicity, pseudo-randomness, and high sensitivity to initial parameters. In this paper, ...
详细信息
Chaotic system is widely applied in field of information security because of its excellent properties of unpredictability, no periodicity, pseudo-randomness, and high sensitivity to initial parameters. In this paper, we propose a new chaotic map, named 2D arcsine and sine combined logistic map (2D-ASLM), which is a combination of arcsine, Sine, and Logistic maps. Compared with the existing chaotic maps, the proposed one has the better pseudo-randomness and ergodicity from the viewpoint of chaotic performance. Besides, it also has a more unpredictable chaotic rang as well as a relatively low implementation cost. A chaotic tree transform (CTT) is introduced to effectively disrupt the image pixel positions. Then, the image can be encrypted by combining 2D-ASLM and CTT. Extensive results on encryption simulation and security analysis have shown the effectiveness of the proposed algorithm from different aspects.
The principal constituent of a block cipher in symmetric-key cryptography is the Boolean function, determining the substitution box (S-box). Block ciphers rely totally on S-boxes with excellent nonlinearity and uprigh...
详细信息
The principal constituent of a block cipher in symmetric-key cryptography is the Boolean function, determining the substitution box (S-box). Block ciphers rely totally on S-boxes with excellent nonlinearity and upright cryptographic structures. In AES, an 8 x 8 S-box is a 16 x 16 lookup table over the Galois field GF(2(8)), that occupies 8 x 2(8) bytes storage of computer memory. By using traditional method to construct a 24 x 24 S-box over Galois field GF(2(24)), which lodges a storage memory of 24 x 2(24) bytes in traditional sense. Thus, the memory storage does not support a 24 x 24 S-box over a very larger order Galois field like GF(2(24)). A resolute of this difficulty is possibly coming out from the algebraic structure of the commutative finite chain ring F-q[x]/ = Sigma(k-1)(i=0) x(i)F(q). In this study, a subgroup of the multiplicative group of units of the chain ring F-2[x]/ = Sigma(23x)(i=0)iF(2) is considered to construct a 24 x 24 S-box that occupy just 24 x 2(8) bits storage memory of computer. The proposed S-box has a substantial potential to create confusion during substitution phase of the color image enciphering algorithm. While for the permutation component of the algorithm, DNA transform is applied for creating diffusion in the pixels of the color image. The proposed RGB imageencryption attains the standard optimum level when compared it to the DNA and chaos-based imageencryption techniques.
With the advancement of information technology, the security of digital images has become increasingly important. To ensure the integrity of images, this paper presents a novel color imageencryption and decryption ar...
详细信息
With the advancement of information technology, the security of digital images has become increasingly important. To ensure the integrity of images, this paper presents a novel color imageencryption and decryption architecture. Firstly, a fractional-order five-dimensional hyper-chaotic system (F5DHS) is proposed and used to generate chaotic sequences for permutation and diffusion processes. Secondly, the extended DNA encoding scheme is employed to generate more DNA encoding rules and four DNA computation methods are used to improve the security of the encryption scheme. Thirdly, a blocked imageencryption method is designed to divide the color image into sub-blocks and then determine the DNA encoding, DNA decoding and DNA arithmetic rules for each sub-block based on chaotic sequences. Finally, the results of simulation experiments and security analysis show that the color image encryption algorithm has good encryption performance, a large secret key space, and strong robustness to noise and data loss attacks, indicating that the proposed encryptionalgorithm can effectively protect the secure communication of digital images.
Threat to sensitive data and images during storage and transmission between Earth Observation Satellites and ground stations increasing with the increasing number of satellites. We present an infinite dimensional chao...
详细信息
Threat to sensitive data and images during storage and transmission between Earth Observation Satellites and ground stations increasing with the increasing number of satellites. We present an infinite dimensional chaotic encryptionalgorithm for satellite images of Earth Observation Satellite, which using by a novel RNA encoding method combined with layered bidirectional diffusion operations of pixels. Firstly, dynamic characteristics of the infinite dimensional chaotic system are introduced, including infinite dimensional properties of the system, phase diagrams, sequence charts, Lyapunov exponential results, and bifurcation diagrams. Secondly, a novel RNA encoding method is designed to dynamically encode image pixel values based on sequences generated by infinite dimensional chaotic system after processing. Meanwhile, multiple RNA operations are used to solve the possibility of being vulnerable to brute force attacks caused by fewer RNA coding rules. Thirdly, layer bidirectional diffusion operations are brought into the image encryption algorithm to complete pixels diffusion and achieve required security effects. Finally, the experimental simulation results on MATLAB platform verify effectiveness and practicability of the presented image encryption algorithm, such as key sensitivity, information entropy, efficiency, robustness against transmission errors and other indicators, which could provide bases for effectively resisting various attacks. The presented satellite image encryption algorithm is a safe method and could achieve universal and satellite-required security, as well as robustness against transmission errors. In addition, the secure key space is incomparable to other similar algorithms. (c) 2025 COSPAR. Published by Elsevier B.V. All rights are reserved, including those for text and data mining, AI training, and similar technologies.
Chaos has practical significance in various domains, including the stock market, quantum physics, communication networks, disease diagnosis, cosmic events, and digital data security. Chaotic maps are widely utilised f...
详细信息
Chaos has practical significance in various domains, including the stock market, quantum physics, communication networks, disease diagnosis, cosmic events, and digital data security. Chaotic maps are widely utilised for encrypting multimedia data for secure communication due to their sensitivity to initial conditions and unpredictability. However, some chaotic maps suffer from weak chaotic dynamics that can make them vulnerable to certain types of attacks, limiting their effectiveness in sensitive applications such as encryption or secure communication in military operations and personal data. This research study proposes a novel nonlinear discrete chaotic map termed a coupled Kaplan-Yorke-Logistic map. By coupling chaotic maps, the Kaplan-Yorke map and the Logistic map, we have significantly enhanced key features such as the length of chaotic orbits, output distribution, and the security of chaotic sequences. An empirical assessment of the proposed coupled Kaplan-Yorke-Logistic map in terms of several measures such as bifurcation diagrams, phase diagrams, Lyapunov exponent analysis, permutation entropy, and sample entropy shows promising ergodicity and a diverse range of hyperchaotic behaviours compared to several recent chaotic maps. Consequently, the proposed map is utilised to develop an efficient image encryption algorithm. The encryptionalgorithm employs a methodology that utilises simultaneous confusion and diffusion processes aiming to significantly reduce the computation time for encryption and decryption processes for realtime applications without compromising the security parameters. A thorough assessment of the proposed image encryption algorithm is performed on a variety of image datasets by utilising multiple cryptanalysis methods, including key space analysis, information entropy, correlation coefficient evaluation, differential attack, key sensitivity testing, histogram analysis, computational time analysis, and occlusion and noise attacks. Comparat
Deoxyribonucleic Acid (DNA) coding technology is a new research field developed by the combination of computer science and molecular biology, that has been gradually applied in the field of imageencryption in recent ...
详细信息
Deoxyribonucleic Acid (DNA) coding technology is a new research field developed by the combination of computer science and molecular biology, that has been gradually applied in the field of imageencryption in recent years. Furthermore, sensitivity to initial conditions, pseudo-random properties, and state ergodicity of coupled chaotic maps can help produce good pseudo-random number generators and meet the requirements of an imageencryption system well. In this paper, an image encryption algorithm based on high-dimensional coupled chaotic maps and DNA coding is proposed. A pseudo-random sequence is generated by a long short-term memory (LSTM) architecture using the proposed maps and evaluated through a set of statistical tests to show the high performance of the proposed generator. All intensity values of an input image are converted to a binary sequence, which is scrambled globally by the high-dimensional coupled chaotic maps. The DNA operations are performed on the scrambled binary sequences instead of binary operations to increase the algorithm efficiency. Simulation results and performance analyses demonstrate that the proposed encryption scheme is extremely sensitive to small changes in secret keys, provides high security and can resist differential attack.
This paper proposes an image encryption algorithm LQBPNN(logistic quantum and back propagation neural network)based on chaotic sequences incorporating quantum keys. Firstly, the improved one-dimensional logistic cha...
详细信息
This paper proposes an image encryption algorithm LQBPNN(logistic quantum and back propagation neural network)based on chaotic sequences incorporating quantum keys. Firstly, the improved one-dimensional logistic chaotic sequence is used as the basic key sequence. After the quantum key is introduced, the quantum key is incorporated into the chaotic sequence by nonlinear operation. Then the pixel confused process is completed by the neural network. Finally, two sets of different mixed secret key sequences are used to perform two rounds of diffusion encryption on the confusing image. The experimental results show that the randomness and uniformity of the key sequence are effectively enhanced. The algorithm has a secret key space greater than 2182. The adjacent pixel correlation of the encrypted image is close to 0, and the information entropy is close to 8. The ciphertext image can resist several common attacks such as typical attacks, statistical analysis attacks and differential attacks.
The fractional-order chaotic systems have characteristics of the all chaotic systems, however, the improper fractional-order chaotic systems have more complexity random sequences, which more suitable for chaotic crypt...
详细信息
The fractional-order chaotic systems have characteristics of the all chaotic systems, however, the improper fractional-order chaotic systems have more complexity random sequences, which more suitable for chaotic cryptosystems. To investigate the application of improper fraction order chaotic system in chaotic cryptography, in this paper, an improper fractional-order laser chaotic system is constructed and applied in image encryption algorithm. The dynamic performances of the system are studied through phase diagrams, Lyapunov exponents spectrum, bifurcation diagrams and C-0 complexity. Meanwhile, the improper fractional-order laser chaotic system is realized based on DSP platform. In addition, the performances of the designed encryption scheme are analyzed by key space, correlation coefficients, information entropy, histogram, differential attacks and robustness analysis. The experimental simulation results indicate that the improper fractional-order laser chaotic system not only has the abundant dynamic characteristics, but also has better security when it is used to image encryption algorithm. Therefore, this research would provide theoretical basis for the improper fractional-order laser chaotic system in security communications application.
Recently, few researchers investigated algorithms of imageencryption using different chaotic economic maps (CEMs). However, the authors investigated the effect of these maps on the encryption of the plain image. In t...
详细信息
Recently, few researchers investigated algorithms of imageencryption using different chaotic economic maps (CEMs). However, the authors investigated the effect of these maps on the encryption of the plain image. In the current study, an image encryption algorithm via Fisher-Yates shuffling (FYS) combined with a three-dimensional (3D) CEM is given. FYS is used to generate the random permutation of a finite sequence. First, it is used to shuffle the rows and the columns of the plain image. Second, the 3DCEM is used in the substitution stage to confuse the pixels of the shuffling image. The proposed algorithm is applied to several types of images. Many measurements are performed to check the security and performance of the proposed algorithm. In addition, numerical simulations and experimental results have been implemented to verify that the proposed algorithm can resist different attack types.
The problems of vulnerability of the image encryption algorithm are proposed by the researchers analyzing the algorithm concerning pixel permutation and diffusion based on the hyper-chaos. Not given any knowledge of t...
详细信息
ISBN:
(纸本)9781467349345
The problems of vulnerability of the image encryption algorithm are proposed by the researchers analyzing the algorithm concerning pixel permutation and diffusion based on the hyper-chaos. Not given any knowledge of the key value, these vulnerable parts are attacked by three plaintext matrixes with their own characters, causing the ciphered-image being recovered at a low computing pay in which the theoretical analysis process, practical block diagram and simulation results of the chosen plaintext attacking are given. According to the results, these imperfect parts cause that the algorithm can not resist the chosen plaintext attacking.
暂无评论