scholarly journals An Image Encryption Algorithm Based on the Improved Sine-Tent Map

2021 ◽  
Vol 2021 ◽  
pp. 1-16
Author(s):  
Zijing Gao ◽  
Zeyu Liu ◽  
Lichan Wang

This paper makes use of the characteristics of initial sensitivity and randomness of the chaotic map to design an image encryption algorithm based on the sine map and the tent map. The sine map is used to improve the tent map; then, the improved sine-tent map is proposed. The traditional tent map proposed in this paper has an expanded control parameter range and better chaos. In this algorithm, bit rearrangement is adopted to further improve the improved sine-tent map, which can reconstruct the output value and expand the chaotic characteristics of the map. In this algorithm, the image parameters are connected with the algorithm to generate the key. In the encryption step, a method of replacing the most significant bit and scrambling-diffusion algorithm is designed to encrypt the plaintext image. Finally, the algorithm is simulated with the experiment and evaluated with analysis; then, the experimental results are given. The evaluation results show that the ciphertext of the algorithm has high randomness, strong robustness, and better resistance to differential attacks after comparison. The correlation of the ciphertext image pixels is very low, and the algorithm is highly secure as a conclusion.

2021 ◽  
Vol 2021 ◽  
pp. 1-16
Author(s):  
Pengcheng He ◽  
Kehui Sun ◽  
Congxu Zhu

To improve the dynamical behaviors of 1D chaotic maps, a new linear-delay-modulation method (LDM) is proposed. Derived from the Sine map, a delayed Sine map (DSM) is proposed based on the LDM. Then, we substitute the Sine map in the SIMM system with DSM and obtained a delayed SIMM system (DSIMM). Its chaotic performance is analyzed through the phase diagram, Lyapunov exponent spectrum, and complexity. The results show that the delayed chaotic map can generate more complex dynamical behaviors and more random sequences. Hence, we apply the two delayed systems to a novel image encryption algorithm with the permutation-confusion-diffusion architecture. Firstly, to permutate the pixel of the image efficiently, the plain-image is scrambled by using a multilayer of the nonlinear index. Secondly, the image is confused by using the chaotic matrix generated with two chaotic sequences, and then, the ciphertext is transformed into a 1D sequence. Finally, to improve the plaintext sensitivity and facilitate key management, we enhance the sensitivity by applying a novel diffusion algorithm instead of using plaintext-related keystream. The diffusion equation contains the sum of undiffused pixels and the operation of cyclic bit-shift. Simulation results for the gray image illustrate the effectiveness of the proposed encryption algorithm.


2020 ◽  
Vol 38 (3B) ◽  
pp. 98-103
Author(s):  
Atyaf S. Hamad ◽  
Alaa K. Farhan

This research presents a method of image encryption that has been designed based on the algorithm of complete shuffling, transformation of substitution box, and predicated image crypto-system. This proposed algorithm presents extra confusion in the first phase because of including an S-box based on using substitution by AES algorithm in encryption and its inverse in Decryption. In the second phase, shifting and rotation were used based on secrete key in each channel depending on the result from the chaotic map, 2D logistic map and the output was processed and used for the encryption algorithm. It is known from earlier studies that simple encryption of images based on the scheme of shuffling is insecure in the face of chosen cipher text attacks. Later, an extended algorithm has been projected. This algorithm performs well against chosen cipher text attacks. In addition, the proposed approach was analyzed for NPCR, UACI (Unified Average Changing Intensity), and Entropy analysis for determining its strength.


IEEE Access ◽  
2018 ◽  
Vol 6 ◽  
pp. 23733-23746 ◽  
Author(s):  
Xingyuan Wang ◽  
Xiaoqiang Zhu ◽  
Yingqian Zhang

Sign in / Sign up

Export Citation Format

Share Document