High-sensitivity image encryption algorithm with random cross diffusion based on dynamically random coupled map lattice model

2021 ◽  
Vol 143 ◽  
pp. 110582
Author(s):  
Xingyuan Wang ◽  
Jingjing Yang ◽  
Nana Guan
2021 ◽  
Vol 13 (1) ◽  
pp. 1-15
Author(s):  
Geng Shengtao ◽  
Wu Tao ◽  
Wang Shida ◽  
Zhang Xuncai ◽  
Niu Ying

Author(s):  
Temadher Alassiry Al-Maadeed ◽  
Iqtadar Hussain ◽  
Amir Anees ◽  
Muhammad Tahir Mustafa

AbstractWe have proposed a robust, secure and efficient image encryption algorithm based on chaotic maps and algebraic structure. Nowadays, the chaotic cryptosystems gained more attention due to their efficiency, the assurance of robustness and high sensitivity corresponding to initial conditions. In literature, there are many encryption algorithms that can simply guarantees security while the schemes based on chaotic systems only promises the uncertainty, both of them can not encounter the needs of current scenario. To tackle this issue, this article proposed an image encryption algorithm based on Lorenz chaotic system and primitive irreducible polynomial substitution box. First, we have proposed 16 different S-boxes based on projective general linear group and 16 primitive irreducible polynomials of Galois field of order 256, and then utilized these S-boxes with combination of chaotic map in image encryption scheme. Three chaotic sequences can be produced by the disturbed of Lorenz chaotic system corresponding to variables x, y and z. We have constructed a new pseudo random chaotic sequence ki based on x, y and z. The plain image is encrypted by the use of chaotic sequence ki and XOR operation to get a ciphered image. To show the strength of presented image encryption, some renowned analyses are performed.


2021 ◽  
pp. 2150465
Author(s):  
Jilei Sun

3D image is a kind of image closer to life, and 3D image has a stronger visual impact. In the past, researchers mostly protected flat images, but ignored the protection of 3D images. This paper combines the 2D chaotic system and uses random cross diffusion to propose a new encryption algorithm for 3D images which are STL format. Different from the traditional scrambling and diffusion operations, this paper uses only one iterative operation to achieve the effects of scrambling and diffusion, making the algorithm more secure. In the encryption algorithm, each value of the ciphertext is XORed with the value of the plaintext on the same coordinate axis and different from the coordinate where the ciphertext is located, the chaotic sequence, the ciphertext of different coordinate axes significantly reduces the correlation between the adjacent coordinate values. In addition, the proposed 3D image encryption algorithm is tested by statistical analysis. The experimental results show that this 3D image encryption algorithm has high security.


2020 ◽  
Vol 38 (3B) ◽  
pp. 98-103
Author(s):  
Atyaf S. Hamad ◽  
Alaa K. Farhan

This research presents a method of image encryption that has been designed based on the algorithm of complete shuffling, transformation of substitution box, and predicated image crypto-system. This proposed algorithm presents extra confusion in the first phase because of including an S-box based on using substitution by AES algorithm in encryption and its inverse in Decryption. In the second phase, shifting and rotation were used based on secrete key in each channel depending on the result from the chaotic map, 2D logistic map and the output was processed and used for the encryption algorithm. It is known from earlier studies that simple encryption of images based on the scheme of shuffling is insecure in the face of chosen cipher text attacks. Later, an extended algorithm has been projected. This algorithm performs well against chosen cipher text attacks. In addition, the proposed approach was analyzed for NPCR, UACI (Unified Average Changing Intensity), and Entropy analysis for determining its strength.


2019 ◽  
Vol 38 (3) ◽  
pp. 647-678 ◽  
Author(s):  
Ľuboš Ovseník ◽  
Ján Turán ◽  
Tomáš Huszaník ◽  
Jakub Oravec ◽  
Ondrej Kováč ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document