1
|
Wen H, Lin Y, Xie Z, Liu T. Chaos-based block permutation and dynamic sequence multiplexing for video encryption. Sci Rep 2023; 13:14721. [PMID: 37679414 PMCID: PMC10485078 DOI: 10.1038/s41598-023-41082-9] [Citation(s) in RCA: 3] [Impact Index Per Article: 3.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 05/29/2023] [Accepted: 08/21/2023] [Indexed: 09/09/2023] Open
Abstract
This paper proposes a video security transmission enhancement algorithm based on block permutation and dynamic multiplexing sequences encryption based on 4D autonomous hyperchaotic system. Firstly, we employ the block permutation encryption and diffusion confusion encryption module, which is based on dynamic multiplexing chaotic sequences, to encrypt the plaintext and obtain the ciphertext. Subsequently, the hash value of this round's ciphertext is utilized to generate the chaotic key, produced by the multiplexing sequence of this round after mathematical processing. Then, the key is used to generate the chaotic sequence to confuse the N-th of the multiplexed sequence, and the next round of multiplexed sequence is obtained. If the current round of chaotic sequence has been completely confused, the chaotic sequence is re-generated to generate a new multiplex sequence by using the key generated by the current round key and the initial key. Finally, the above steps are repeated for the encryption of each frame of the video. Compared with the traditional permutation coding algorithm, it increases the difficulty of estimation or recognition while ensuring efficiency, and effectively improves the avalanche effect of the algorithm. Through frame by frame ciphertext closed-loop feedback, it has the ability to resist known plaintext attack and selected plaintext attack. The results show that the scheme has high security and significant diffusion characteristics, and can effectively resist various common cryptographic attacks.
Collapse
Affiliation(s)
- Heping Wen
- School of Electronic Information, University of Electronic Science and Technology of China, Zhongshan Institute, Zhongshan, 528402, China.
- School of Information and Communication Engineering, University of Electronic Science and Technology of China, Chengdu, 611731, China.
| | - Yiting Lin
- School of Electronic Information, University of Electronic Science and Technology of China, Zhongshan Institute, Zhongshan, 528402, China.
- School of Information and Communication Engineering, University of Electronic Science and Technology of China, Chengdu, 611731, China.
| | - Zhiyu Xie
- School of Electronic Information, University of Electronic Science and Technology of China, Zhongshan Institute, Zhongshan, 528402, China
| | - Tengyu Liu
- School of Electronic Information, University of Electronic Science and Technology of China, Zhongshan Institute, Zhongshan, 528402, China
| |
Collapse
|
2
|
Fan W, Li T, Wu J, Wu J. Chaotic Color Image Encryption Based on Eight-Base DNA-Level Permutation and Diffusion. Entropy (Basel) 2023; 25:1268. [PMID: 37761567 PMCID: PMC10529059 DOI: 10.3390/e25091268] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 06/28/2023] [Revised: 08/12/2023] [Accepted: 08/17/2023] [Indexed: 09/29/2023]
Abstract
Images, as a crucial information carrier in the era of big data, are constantly generated, stored, and transmitted. Determining how to guarantee the security of images is a hot topic in the information security community. Image encryption is a simple and direct approach for this purpose. In order to cope with this issue, we propose a novel scheme based on eight-base DNA-level permutation and diffusion, termed as EDPD, for color image encryption in this paper. The proposed EDPD integrates secure hash algorithm-512 (SHA-512), a four-dimensional hyperchaotic system, and eight-base DNA-level permutation and diffusion that conducts on one-dimensional sequences and three-dimensional cubes. To be more specific, the EDPD has four main stages. First, four initial values for the proposed chaotic system are generated from plaintext color images using SHA-512, and a four-dimensional hyperchaotic system is constructed using the initial values and control parameters. Second, a hyperchaotic sequence is generated from the four-dimensional hyperchaotic system for consequent encryption operations. Third, multiple permutation and diffusion operations are conducted on different dimensions with dynamic eight-base DNA-level encoding and algebraic operation rules determined via the hyperchaotic sequence. Finally, DNA decoding is performed in order to obtain the cipher images. Experimental results from some common testing images verify that the EDPD has excellent performance in color image encryption and can resist various attacks.
Collapse
Affiliation(s)
| | - Taiyong Li
- School of Computing and Artificial Intelligence, Southwestern University of Finance and Economics, Chengdu 611130, China
| | | | | |
Collapse
|
3
|
Wenkack Liedji D, Talla Mbé JH, Kenne G. Classification of hyperchaotic, chaotic, and regular signals using single nonlinear node delay-based reservoir computers. Chaos 2022; 32:123126. [PMID: 36587364 DOI: 10.1063/5.0124204] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Received: 09/04/2022] [Accepted: 11/21/2022] [Indexed: 06/17/2023]
Abstract
The Lyapunov exponent method is generally used for classifying hyperchaotic, chaotic, and regular dynamics based on the equations modeling the system. However, several systems do not benefit from appropriate modeling underlying their dynamic behaviors. Therefore, having methods for classifying hyperchaotic, chaotic, and regular dynamics using only the observational data generated either by the theoretical or the experimental systems is crucial. In this paper, we use single nonlinear node delay-based reservoir computers to separate hyperchaotic, chaotic, and regular dynamics. We show that their classification capabilities are robust with an accuracy of up to 99.61% and 99.03% using the Mackey-Glass and the optoelectronic oscillator delay-based reservoir computers, respectively. Moreover, we demonstrate that the reservoir computers trained with the two-dimensional Hénon-logistic map can classify the dynamical state of another system (for instance, the two-dimensional sine-logistic modulation map). Our solution extends the state-of-the-art machine learning and deep learning approaches for chaos detection by introducing the detection of hyperchaotic signals.
Collapse
Affiliation(s)
- Dagobert Wenkack Liedji
- Research Unit of Condensed Matter, Electronics and Signal Processing, Department of Physics, University of Dschang, P.O. Box 67, Dschang, Cameroon
| | - Jimmi Hervé Talla Mbé
- Research Unit of Condensed Matter, Electronics and Signal Processing, Department of Physics, University of Dschang, P.O. Box 67, Dschang, Cameroon
| | - Godpromesse Kenne
- Laboratoire d'Automatique et d'Informatique Appliquée, Department of Electrical Engineering, IUT-FV Bandjoun, University of Dschang, P.O. Box 134, Bandjoun, Cameroon
| |
Collapse
|
4
|
Shi G, Yu S, Wang Q. Security Analysis of the Image Encryption Algorithm Based on a Two-Dimensional Infinite Collapse Map. Entropy (Basel) 2022; 24:e24081023. [PMID: 35893003 PMCID: PMC9394294 DOI: 10.3390/e24081023] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 06/13/2022] [Revised: 07/14/2022] [Accepted: 07/22/2022] [Indexed: 02/04/2023]
Abstract
This paper analyzes the security of the image encryption algorithm based on a two-dimensional (2D) infinite collapse map. The encryption algorithm adopts a permutation–diffusion structure and can perform two or more rounds to achieve a higher level of security. By cryptanalysis, it is found that the original diffusion process can be split into a permutation–diffusion structure, which comes after the original permutation, so these two permutations can be merged into one. Then, some theorems about round-down operation are summarized, and the encryption and decryption equations in the diffusion process are deduced and simplified accordingly. Since the chaotic sequences used in encryption algorithm are independent of the plaintext and ciphertext, there are equivalent keys. The original encryption algorithm with single-round, two-round, and multi-round of permutation–diffusion processes is cracked, and the data complexity of the cryptanalysis attacks is analyzed. Numerical simulation is carried out by MATLAB, and the experimental results and theoretical analysis show the effectiveness of the cryptanalysis attacks. Finally, some suggestions for improvement are given to overcome the shortcomings of the original encryption algorithm.
Collapse
|
5
|
Liu Z, Li J, Di X. A New Hyperchaotic 4D-FDHNN System with Four Positive Lyapunov Exponents and Its Application in Image Encryption. Entropy (Basel) 2022; 24:e24070900. [PMID: 35885123 PMCID: PMC9316339 DOI: 10.3390/e24070900] [Citation(s) in RCA: 2] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 05/17/2022] [Revised: 06/20/2022] [Accepted: 06/21/2022] [Indexed: 12/02/2022]
Abstract
In this paper, a hyperchaotic four-dimensional fractional discrete Hopfield neural network system (4D-FDHNN) with four positive Lyapunov exponents is proposed. Firstly, the chaotic dynamics’ characteristics of the system are verified by analyzing and comparing the iterative trajectory diagram, phase diagram, attractor diagram, 0-1 test, sample entropy, and Lyapunov exponent. Furthermore, a novel image encryption scheme is designed to use the chaotic system as a pseudo-random number generator. In the scenario, the confusion phase using the fractal idea proposes a fractal-like model scrambling method, effectively enhancing the complexity and security of the confusion. For the advanced diffusion phase, we proposed a kind of Hilbert dynamic random diffusion method, synchronously changing the size and location of the pixel values, which improves the efficiency of the encryption algorithm. Finally, simulation results and security analysis experiments show that the proposed encryption algorithm has good efficiency and high security, and can resist common types of attacks.
Collapse
Affiliation(s)
- Zefei Liu
- School of Computer Science and Technology, Changchun University of Science and Technology, Changchun 130022, China; (Z.L.); (X.D.)
- Jilin Province Key Laboratory of Network and Information Security, Changchun 130033, China
| | - Jinqing Li
- School of Computer Science and Technology, Changchun University of Science and Technology, Changchun 130022, China; (Z.L.); (X.D.)
- Jilin Province Key Laboratory of Network and Information Security, Changchun 130033, China
- Correspondence:
| | - Xiaoqiang Di
- School of Computer Science and Technology, Changchun University of Science and Technology, Changchun 130022, China; (Z.L.); (X.D.)
- Jilin Province Key Laboratory of Network and Information Security, Changchun 130033, China
- Information Center, Changchun University of Science and Technology, Changchun 130022, China
| |
Collapse
|
6
|
Wang Z, Zhou M, Liu B, Li T. Deep Image Steganography Using Transformer and Recursive Permutation. Entropy 2022; 24:878. [PMID: 35885101 PMCID: PMC9319918 DOI: 10.3390/e24070878] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 05/08/2022] [Revised: 06/23/2022] [Accepted: 06/24/2022] [Indexed: 01/27/2023]
Abstract
Image steganography, which usually hides a small image (hidden image or secret image) in a large image (carrier) so that the crackers cannot feel the existence of the hidden image in the carrier, has become a hot topic in the community of image security. Recent deep-learning techniques have promoted image steganography to a new stage. To improve the performance of steganography, this paper proposes a novel scheme that uses the Transformer for feature extraction in steganography. In addition, an image encryption algorithm using recursive permutation is proposed to further enhance the security of secret images. We conduct extensive experiments to demonstrate the effectiveness of the proposed scheme. We reveal that the Transformer is superior to the compared state-of-the-art deep-learning models in feature extraction for steganography. In addition, the proposed image encryption algorithm has good attributes for image security, which further enhances the performance of the proposed scheme of steganography.
Collapse
|
7
|
|
8
|
Zhang M, Tong X, Wang Z, Chen P. Joint Lossless Image Compression and Encryption Scheme Based on CALIC and Hyperchaotic System. Entropy (Basel) 2021; 23:e23081096. [PMID: 34441236 PMCID: PMC8394254 DOI: 10.3390/e23081096] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.7] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 07/07/2021] [Revised: 08/08/2021] [Accepted: 08/16/2021] [Indexed: 11/25/2022]
Abstract
For efficiency and security of image transmission and storage, the joint image compression and encryption method that performs compression and encryption in a single step is a promising solution due to better security. Moreover, on some important occasions, it is necessary to save images in high quality by lossless compression. Thus, a joint lossless image compression and encryption scheme based on a context-based adaptive lossless image codec (CALIC) and hyperchaotic system is proposed to achieve lossless image encryption and compression simultaneously. Making use of the characteristics of CALIC, four encryption locations are designed to realize joint image compression and encryption: encryption for the predicted values of pixels based on gradient-adjusted prediction (GAP), encryption for the final prediction error, encryption for two lines of pixel values needed by prediction mode and encryption for the entropy coding file. Moreover, a new four-dimensional hyperchaotic system and plaintext-related encryption based on table lookup are all used to enhance the security. The security tests show information entropy, correlation and key sensitivity of the proposed methods reach 7.997, 0.01 and 0.4998, respectively. This indicates that the proposed methods have good security. Meanwhile, compared to original CALIC without security, the proposed methods increase the security and reduce the compression ratio by only 6.3%. The test results indicate that the proposed methods have high security and good lossless compression performance.
Collapse
Affiliation(s)
- Miao Zhang
- School of Computer Science and Technology, Harbin Institute of Technology, Weihai 264209, China; (M.Z.); (P.C.)
| | - Xiaojun Tong
- School of Computer Science and Technology, Harbin Institute of Technology, Weihai 264209, China; (M.Z.); (P.C.)
- Correspondence:
| | - Zhu Wang
- School of Information Science and Engineering, Harbin Institute of Technology, Weihai 264209, China;
| | - Penghui Chen
- School of Computer Science and Technology, Harbin Institute of Technology, Weihai 264209, China; (M.Z.); (P.C.)
- Agricultural Bank of China, Beijing 100089, China
| |
Collapse
|