In this paper, an image encryption algorithm based on cascaded chaotic map and improved Zigzag transform is proposed. Firstly, a cascade chaotic system is improved to make its chaotic sequence evenly distributed and i...
详细信息
In this paper, an image encryption algorithm based on cascaded chaotic map and improved Zigzag transform is proposed. Firstly, a cascade chaotic system is improved to make its chaotic sequence evenly distributed and improve its parameter range. The purpose is to obtain high random chaotic sequence and make the ciphertext image more secure. Secondly, the improved Zigzag transform is used to scramble the image. Compared with the standard Zigzag transform, the improved Zigzag transform can fully scramble all the pixels and improve the randomness of the ciphertext image. Thirdly, a wave-shaped diffusion algorithm is designed, its characteristic is that it can alternate between different row and column for diffusion. The combination of SHA256 algorithm and plain image makes the cipher image better resist the select plaintext attack. Simulation results show that the algorithm has fast encryption efficiency, high security and can effectively resist various attacks.
In order to improve the problems of security and robustness for existing image encryption algorithms and to reduce the security risks of encryptionalgorithms against statistical analysis, differential attacks, exhaus...
详细信息
In order to improve the problems of security and robustness for existing image encryption algorithms and to reduce the security risks of encryptionalgorithms against statistical analysis, differential attacks, exhaustive attacks, cropping and noise attacks etc., a novel image encryption algorithm based on image hashing, improved chaotic mapping and DNA coding is proposed. Firstly, extracting the image features and evenly block after pre-processing the original image and fingerprint image. Secondly, the features are generated to be a binary hash sequence through the image hash algorithm, and the generated hash sequence is iterated as the initial parameter of the improved chaotic map and Chen's chaotic system. Finally, Chen's chaotic system is used to generate a random sequence, and the matrix generated by the improved chaotic map and the original image is subjected to DNA calculation and encoding operations to obtain an encrypted image. Experimental results show that the proposed algorithm has better performance on security, larger key space and higher key sensitivity, the pixel correlation coefficient close to 0, the information entropy close to 8, unified average changing intensity and number of pixels change rate values are close to ideal values, and it has better robustness on noise and cropping attacks.
A new two-dimensional chaotic system in the form of a cascade structure is designed, which is derived from the Chebyshev system and the infinite collapse system. Performance analysis including trajectory, Lyapunov exp...
详细信息
A new two-dimensional chaotic system in the form of a cascade structure is designed, which is derived from the Chebyshev system and the infinite collapse system. Performance analysis including trajectory, Lyapunov exponent and approximate entropy indicate that it has a larger chaotic range, better ergodicity and more complex chaotic behaviour than those of advanced two-dimensional chaotic system recently proposed. Moreover, to protect the security of the crowd image data, the newly designed two-dimensional chaotic system is utilized to propose a visually meaningful image cryptosystem combined with singular value decomposition and Bernstein polynomial. First, the plain image is compressed by singular value decomposition, and then encrypted to the noise-like cipher image by scrambling and diffusion algorithm. Later, the steganographic image is obtained by randomly embedding the cipher image into a carrier image in spatial domain through the Bernstein polynomial-based embedding method, thereby realizing the double security of image information and image appearance. Besides, the visual quality of the steganographic image can be improved by the adjustment factor according to different carrier images during the embedding process. Ultimately, security analyses indicate that it has higher encryption efficiency (2 Mbps) and the visual quality of steganography image can reach 39 dB.
A novel visually meaningful image encryption algorithm is proposed based on a hyperchaotic system and compressive sensing(CS), which aims to improve the visual security of steganographic image and decrypted quality. F...
详细信息
A novel visually meaningful image encryption algorithm is proposed based on a hyperchaotic system and compressive sensing(CS), which aims to improve the visual security of steganographic image and decrypted quality. First, a dynamic spiral block scrambling is designed to encrypt the sparse matrix generated by performing discrete wavelet transform(DWT)on the plain image. Then, the encrypted image is compressed and quantified to obtain the noise-like cipher image. Then the cipher image is embedded into the alpha channel of the carrier image in portable network graphics(PNG) format to generate the visually meaningful steganographic image. In our scheme, the hyperchaotic Lorenz system controlled by the hash value of plain image is utilized to construct the scrambling matrix, the measurement matrix and the embedding matrix to achieve higher security. In addition, compared with other existing encryptionalgorithms, the proposed PNG-based embedding method can blindly extract the cipher image, thus effectively reducing the transmission cost and storage space. Finally, the experimental results indicate that the proposed encryptionalgorithm has very high visual security.
In this paper, a novel image encryption algorithm is presented based on self-cited pixel summation. With the classical mechanism of permutation plus diffusion, a pixel summation of the plain image is employed to make ...
详细信息
In this paper, a novel image encryption algorithm is presented based on self-cited pixel summation. With the classical mechanism of permutation plus diffusion, a pixel summation of the plain image is employed to make a gravity influence on the pixel positions in the permutation stage. Then, for each pixel in every step of the diffusion stage, the pixel summation calculated from the permuted image is updated. The values from a chaotic sequence generated by an intertwining logistic map are selected by this summation. Consequently, the keystreams generated in both stages are dependent on both the plain image and the permuted image. Because of the sensitivity of the chaotic map to its initial conditions and the plain-imagedependent keystreams, any tiny change in the secret key or the plain image would lead to a significantly different cipher image. As a result, the proposed encryptionalgorithm is immune to the known plaintext attack(KPA) and the chosen plaintext attack(CPA). Moreover, experimental simulations and security analyses show that the proposed permutationdiffusion encryption scheme can achieve a satisfactory level of security.
A new meaningful image encryption algorithm based on compressive sensing(CS)and integer wavelet transformation(IWT)is proposed in this *** of all,the initial values of chaotic system are encrypted by RSA algorithm,and...
详细信息
A new meaningful image encryption algorithm based on compressive sensing(CS)and integer wavelet transformation(IWT)is proposed in this *** of all,the initial values of chaotic system are encrypted by RSA algorithm,and then they are open as public *** make the chaotic sequence more random,a mathematical model is constructed to improve the random ***,the plain image is compressed and encrypted to obtain the secret ***,the secret image is inserted with numbers zero to extend its size same to the plain *** applying IWT to the carrier image and discrete wavelet transformation(DWT)to the inserted image,the secret image is embedded into the carrier ***,a meaningful carrier image embedded with secret plain image can be obtained by inverse ***,the measurement matrix is built by both chaotic system and Hadamard matrix,which not only retains the characteristics of Hadamard matrix,but also has the property of control and synchronization of chaotic ***,information entropy of the plain image is employed to produce the initial conditions of chaotic *** a result,the proposed algorithm can resist known-plaintext attack(KPA)and chosen-plaintext attack(CPA).By the help of asymmetric cipher algorithm RSA,no extra transmission is needed in the *** simulations show that the normalized correlation(NC)values between the host image and the cipher image are *** is to say,the proposed encryptionalgorithm is imperceptible and has good hiding effect.
In this paper, a memristive circuit system is proposed and its dynamical characteristics are analyzed by two-parameters bifurcation diagrams, Lyapunov exponent spectrum, SE complexity and C0 complexity. The numerical ...
详细信息
In this paper, a memristive circuit system is proposed and its dynamical characteristics are analyzed by two-parameters bifurcation diagrams, Lyapunov exponent spectrum, SE complexity and C0 complexity. The numerical analysis results illustrate that the chaotic state of the memristive system is distributed in a large range of parameters, which is especially suitable for imageencryption application. Then, in view of the fact that the traditional method of observing three-dimensional chaotic attractors can not give full play to the essence of human eyes cooperating with brain information processing, a new method to obtain the brain information of complete three-dimensional chaotic attractors by using red-blue 3D glasses is proposed. The results show that compared with the traditional method based on the memristive system, the visual effect of chaotic attractors observed by red-blue 3D glasses is shocking. In addition, an image encryption algorithm is designed to verify the imageencryption application of the memristive system based on DNA variation. A series of security performance analysis experiments are performed to verify the effectiveness and reliability of the designed algorithm such as the secret key space analysis, histogram distribution analysis, information entropy analysis, correlation analysis and key sensitivity analysis. Finally, the hardware circuit based on the memristive system is implemented with some common electronic devices, which has the advantages of simple structure and low cost.
This paper describes an image encryption algorithm that utilises a plaintext-related quantisation scheme. Various plaintext-related approaches from other algorithms are presented and their properties are briefly discu...
详细信息
This paper describes an image encryption algorithm that utilises a plaintext-related quantisation scheme. Various plaintext-related approaches from other algorithms are presented and their properties are briefly discussed. Main advantage of the proposed solution is the achievement of a similar behaviour like that of more complex approaches with a plaintext-related technique used in a rather simple step such as quantisation. This design should result in a favourable computational complexity of the whole algorithm. The properties of the proposal are evaluated by a number of commonly used numerical parameters. Also, the statistical properties of a pseudo-random sequence that is quantised according to the plain image pixel intensities are investigated by tests from NIST 800-22 suite. Obtained results are compared to values reported in related works and they imply that the proposed solution produces encrypted images with comparable statistical properties but authors' design is faster and more efficient.
To reduce the bandwidth and storage resources of image information in communication transmission, and improve the secure communication of information. In this paper, an image compression and encryptionalgorithm based...
详细信息
To reduce the bandwidth and storage resources of image information in communication transmission, and improve the secure communication of information. In this paper, an image compression and encryptionalgorithm based on fractional-order memristive hyperchaotic system and BP neural network is proposed. In this algorithm, the image pixel values are compressed by BP neural network, the chaotic sequences of the fractional-order memristive hyperchaotic system are used to diffuse the pixel values. The experimental simulation results indicate that the proposed algorithm not only can effectively compress and encrypt image, but also have better security features. Therefore, this work provides theoretical guidance and experimental basis for the safe transmission and storage of image information in practical communication.
In order to hide image information more efficaciously, improve the radio of workpiece and quality of encryption, this paper proposes delayed chaotic neuron dynamical system, extracts a single neuron research model to ...
详细信息
In order to hide image information more efficaciously, improve the radio of workpiece and quality of encryption, this paper proposes delayed chaotic neuron dynamical system, extracts a single neuron research model to determine its dynamic properties, analyzes the model's sensitivity, stability and the randomness of the chaotic sequence, and verifies its dynamics feasibility of combining the system with DNA encoding. The single delay neuron can simulate the unknown dynamic behavior and capability in the model in a certain sense which can effectively improve optimization ability and con-vergence speed of the neural to make the network more practical. DNA encoding also offers new train of thoughts and directions for the study of cryptography. In addition, by introducing the functional form of fuzzy number can further enhance the stability and adaptability of chaotic system in un-certain environment, and get more distinct chaotic phenomena. The experimental simulation and comprehensive data analysis of the algorithm are carried out in this paper. The data manifest that the system has a large chaotic range, can pass the randomness test of NIST and TestU01, has high complexity and sensitivity which could effectively avoid noise attacks. The encrypted information entropy of classical images can reach 7.9998, which confirms that it can effectively and safely realize the encryption of digital images.
暂无评论