scholarly journals A Novel Compressive Image Encryption with an Improved 2D Coupled Map Lattice Model

2021 ◽  
Vol 2021 ◽  
pp. 1-21
Author(s):  
Zhuo Liu ◽  
Yong Wang ◽  
Leo Yu Zhang ◽  
Jun Ma

The digital image, as the critical component of information transmission and storage, has been widely used in the fields of big data, cloud and frog computing, Internet of things, and so on. Due to large amounts of private information in the digital image, the image protection is fairly essential, and the designing of the encryption image scheme has become a hot issue in recent years. In this paper, to resolve the shortcoming that the probability density distribution (PDD) of the chaotic sequences generated in the original two-dimensional coupled map lattice (2D CML) model is uneven, we firstly proposed an improved 2D CML model according to adding the offsets for each node after every iteration of the original model, which possesses much better chaotic performance than the original one, and also its chaotic sequences become uniform. Based on the improved 2D CML model, we designed a compressive image encryption scheme. Under the condition of different keys, the uniform chaotic sequences generated by the improved 2D CML model are utilized for compressing, confusing, and diffusing, respectively. Meanwhile, the message authentication code (MAC) is employed for guaranteeing that the encryption image be integration. Finally, theoretical analysis and simulation tests both demonstrate that the proposed image encryption scheme owns outstanding statistical, well encryption performance, and high security. It has great potential for ensuring the digital image security in application.

2021 ◽  
Vol 544 ◽  
pp. 1-24
Author(s):  
Mingxu Wang ◽  
Xingyuan Wang ◽  
Tingting Zhao ◽  
Chuan Zhang ◽  
Zhiqiu Xia ◽  
...  

2015 ◽  
pp. 228
Author(s):  
حكمت نجم عبدالله ◽  
اثير جبار منصور ◽  
هادى طارش زبون

2012 ◽  
Vol 13 (2) ◽  
pp. 67-88 ◽  
Author(s):  
Ahmed A. Abd El-Latif ◽  
Li Li ◽  
Tiejun Zhang ◽  
Ning Wang ◽  
Xianhua Song ◽  
...  

2021 ◽  
Author(s):  
Krasimir Kordov ◽  
Stanimir Zhelezov ◽  
Atanas Nachev ◽  
Nikolay Gueorguiev ◽  
Daniela Pavlova

2014 ◽  
Vol 7 (4) ◽  
pp. 65 ◽  
Author(s):  
Obaida M. Al-hazaimeh

In this paper, an implementation of digital image encryption scheme based on one dimensional logistic map is proposed. The chaotic cryptography technique concentrates in general on the symmetric key cryptographic technique. In the proposed algorithm, a random key table lookup criterion was combined with a one-dimensional chaotic map were used for high degree 2-stage security image encryption while maintaining acceptable overhead delay time. The proposed algorithm is based on image row shuffling and pixel-wise XOR encryption. To increase the security of row shuffling variable rotation and inversion were applied to each shuffled row, based on the difference between old and new row location. The experimental results showed that the proposed algorithm is effective and applicable. The combination of logistic map and key table lookup shows advantages of large random key space and high-level of security. The resulting cipher image is suitable for practical use in secure image storing and transmission.


2020 ◽  
Vol 10 (21) ◽  
pp. 7469
Author(s):  
Zhen Li ◽  
Changgen Peng ◽  
Weijie Tan ◽  
Liangrong Li

To ensure the security and privacy of digital image when its transmitting online or storing in the cloud, we proposed a novel chaos based image encryption scheme by using randomly DNA encode and plaintext related permutation. In our scheme, we first randomly encode plain image into a nucleotide sequence under the control by the piecewise linear chaotic map(PWLCM). After that, the plaintext related permutation would be done under the control sequence which generated by hyper chaotic Lorenz system (HCLS). Next, we make diffusion processing with key DNA sequence which is generated by another PWLCM system and also encoded randomly. Finally, we decode DNA sequence into cipher image matrix. In addition, we used many common security analysis methods to test our scheme, and the result compared with other works. The tests and comparison results are shown that our proposed image cryptosystem has excellent security performance to ensure the digital image security on communication.


Sign in / Sign up

Export Citation Format

Share Document