1
|
Moysis L, Lawnik M, Antoniades IP, Kafetzis I, Baptista MS, Volos C. Chaotification of 1D Maps by Multiple Remainder Operator Additions—Application to B-Spline Curve Encryption. Symmetry (Basel) 2023; 15:726. [DOI: 10.3390/sym15030726] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 03/17/2023] Open
Abstract
In this work, a chaotification technique is proposed for increasing the complexity of chaotic maps. The technique consists of adding the remainder of multiple scalings of the map’s value for the next iteration, so that the most- and least-significant digits are combined. By appropriate parameter tuning, the resulting map can achieve a higher Lyapunov exponent value, a result that was first proven theoretically and then showcased through numerical simulations for a collection of chaotic maps. As a proposed application of the transformed maps, the encryption of B-spline curves and patches was considered. The symmetric encryption consisted of two steps: a shuffling of the control point coordinates and an additive modulation. A transformed chaotic map was utilised to perform both steps. The resulting ciphertext curves and patches were visually unrecognisable compared to the plaintext ones and performed well on several statistical tests. The proposed work gives an insight into the potential of the remainder operator for chaotification, as well as the chaos-based encryption of curves and computer graphics.
Collapse
|
2
|
Toktas A, Erkan U, Ustun D, Wang X. Parameter optimization of chaotic system using Pareto-based triple objective artificial bee colony algorithm. Neural Comput Appl 2023. [DOI: 10.1007/s00521-023-08434-y] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 03/28/2023]
|
3
|
Li D, Li J, Di X. A novel exponential one-dimensional chaotic map enhancer and its application in an image encryption scheme using modified ZigZag transform. Journal of Information Security and Applications 2022. [DOI: 10.1016/j.jisa.2022.103304] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/15/2022]
|
4
|
Chen X, Gong M, Gan Z, Lu Y, Chai X, He X. CIE-LSCP: color image encryption scheme based on the lifting scheme and cross-component permutation. COMPLEX INTELL SYST. [DOI: 10.1007/s40747-022-00835-1] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/15/2022]
Abstract
AbstractEncryption of meaningful images into unidentifiable noise-like images can improve the security of images during storage and transmission. In this paper, a novel color image encryption method based on the lifting scheme and cross-component permutation (CIE-LSCP) is introduced. First, original image is divided into red, green and blue components, and then the three components are processed by a preprocessing strategy based on the lifting scheme (PSLS) to change the statistical distribution of the pixels. Second, a block-based cross-component permutation based on index vectors (BCPIV) is presented to divide three preprocessed components into blocks and perform the cross-component permutation operation on them, and three random matrices are utilized to determine the target component, target block and target pixel position of the current pixel to be moved, respectively. Subsequently, a multi stochastic diffusion based on random sequences (MSDRS) is developed to alter the pixel values of the permutated components, and finally a ciphertext image is gotten by merging the three components. Moreover, the SHA256 hash values of the plaintext image are used to obtain the initial parameters of the chaotic system, and the obtained chaotic sequences are applied in the image encryption process. Wherein the generated random sequences are highly reliant on the plaintext image, making the encryption scheme resistant to both known-plaintext attacks and chosen-plaintext attacks. Experimental results demonstrate that the proposed scheme has good security and effectiveness and can be applied for secure transmission of digital images over the Internet.
Collapse
|
5
|
Zhu L, Jiang D, Ni J, Wang X, Rong X, Ahmad M. A visually secure image encryption scheme using adaptive-thresholding sparsification compression sensing model and newly-designed memristive chaotic map. Inf Sci (N Y) 2022; 607:1001-22. [DOI: 10.1016/j.ins.2022.06.011] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/21/2022]
|
6
|
|
7
|
Zhong H, Li G, Xu X, Song X. Image Encryption Algorithm Based on a Novel Wide-Range Discrete Hyperchaotic Map. Mathematics 2022; 10:2583. [DOI: 10.3390/math10152583] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 12/04/2022]
Abstract
Existing hyperchaotic systems suffer from a small parameter range and small key space. Therefore, we propose herein a novel wide-range discrete hyperchaotic map(3D-SCC) based on the mathematical model of the Sine map. Dynamic numerical analysis shows that this map has a wide-range of parameters, high sensitive, high sensitivity of sequences and good ergodicity, which proves that the system is well suited to the field of communication encryption. Moreover, this paper proposes an image encryption algorithm based on a dynamic cycle shift scramble algorithm and image-sensitive function. First, the image feature is extracted by the image-sensitive function to input into the chaos map. Then, the plaintext image is decomposed by an integer wavelet, and the low-frequency part is scrambled by a dynamic cyclic shifting algorithm. The shuffled low-frequency part and high-frequency parts are reconstructed by wavelet, and the chaotic matrix image is bitwise XOR with it to obtain the final ciphertext. The experimental results show that the average NPCR is 99.6024%, the average UACI is 33.4630%, and the average local Shannon entropy is 7.9029, indicating that the statistical properties of the ciphertext are closer to the ideal value. The anti-attack test shows that the algorithm can effectively resist cutting attacks and noise attacks. Therefore, the algorithm has great application value in the field of image encryption.
Collapse
|
8
|
Ahmad M, Agarwal S, Alkhayyat A, Alhudhaif A, Alenezi F, Zahid AH, Aljehane NO. An image encryption algorithm based on new generalized fusion fractal structure. Inf Sci (N Y) 2022. [DOI: 10.1016/j.ins.2022.01.042] [Citation(s) in RCA: 6] [Impact Index Per Article: 3.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/29/2022]
|
9
|
|
10
|
Chen Y, Xie S, Zhang J. A Hybrid Domain Image Encryption Algorithm Based on Improved Henon Map. Entropy 2022; 24:e24020287. [PMID: 35205581 PMCID: PMC8870770 DOI: 10.3390/e24020287] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.5] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 11/29/2021] [Revised: 02/14/2022] [Accepted: 02/15/2022] [Indexed: 02/06/2023]
Abstract
A hybrid domain image encryption algorithm is developed by integrating with improved Henon map, integer wavelet transform (IWT), bit-plane decomposition, and deoxyribonucleic acid (DNA) sequence operations. First, we improve the classical two-dimensional Henon map. The improved Henon map is called 2D-ICHM, and its chaotic performance is analyzed. Compared with some existing chaotic maps, 2D-ICHM has larger parameter space, continuous chaotic range, and more complex dynamic behavior. Second, an image encryption structure based on diffusion–scrambling–diffusion and spatial domain–frequency domain–spatial domain is proposed, which we call the double sandwich structure. In the encryption process, the diffusion and scrambling operations are performed in the spatial and frequency domains, respectively. In addition, initial values and system parameters of the 2D-ICHM are obtained by the secure hash algorithm-512 (SHA-512) hash value of the plain image and the given parameters. Consequently, the proposed algorithm is highly sensitive to plain images. Finally, simulation experiments and security analysis show that the proposed algorithm has a high level of security and strong robustness to various cryptanalytic attacks.
Collapse
Affiliation(s)
- Yong Chen
- School of Communication and Information Engineering, Xi’an University of Posts and Telecommunications, Xi’an 710121, China;
| | - Shucui Xie
- School of Science, Xi’an University of Posts and Telecommunications, Xi’an 710121, China
- Correspondence:
| | - Jianzhong Zhang
- School of Mathematics and Statistics, Shaanxi Normal University, Xi’an 710119, China;
| |
Collapse
|
11
|
Zhang S, Liu L, Xiang H. A Novel Plain-Text Related Image Encryption Algorithm Based on LB Compound Chaotic Map. Mathematics 2021; 9:2778. [DOI: 10.3390/math9212778] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
Abstract
Chaos systems have been widely used in image encryption algorithms. In this article, we introduce an LB (Logistic-Baker) compound chaotic map that can greatly improve the complexity of original Logistic map and Baker map, as well as the generated sequences have pseudo-randomness. Furthermore, based on the LB compound chaotic map, an image encryption algorithm is proposed. To resist the differential attack, and enhance the sensitivity of plain-text, the parameters of this algorithm are plain-text related. In this algorithm, the compound chaotic function is influenced by the plain-text image; thus, the specific form of this chaotic map, and its dynamics will be different when encrypting different images. Numerical experiment results indicate that the effect of this novel plain-text related image encryption scheme is excellent, as well as can be competitive with other corresponding algorithms.
Collapse
|