Chaotic image encryption based on finite field bidirectional diffusion and steganography

被引:1
|
作者
Liu, Xiang [1 ]
Ding, Dawei [1 ,2 ,3 ]
Yang, Zongli [1 ,2 ,3 ]
机构
[1] Anhui Univ, Sch Elect Informat Engn, Hefei, Peoples R China
[2] Yuexi Unmanned Aviat Ind Res Inst, Anqing, Peoples R China
[3] Anqing Civil Unmanned Aerial Test Zone, Anqing, Peoples R China
来源
2024 3RD INTERNATIONAL CONFERENCE ON IMAGE PROCESSING AND MEDIA COMPUTING, ICIPMC 2024 | 2024年
关键词
Image encryption; Steganography; Memristive HR neuron model; Finite field bidirectional diffusion; Least significant bit; CIRCUIT;
D O I
10.1109/ICIPMC62364.2024.10586715
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
This paper proposes an algorithm combining image encryption and steganography which provides double protection for images that need to be kept secret. First, a new Three-Dimensional (3-D) fractional-order memristive Hindmarsh-Rose (HR) neuron model is constructed. It has highly complex and unpredictable dynamic behavior, which can produce complex state transition phenomena such as period, period-doubling bifurcation, chaos and hyperchaos. Then, the finite-field bidirectional diffusion algorithm was used to perform nonrepetitive scrambling and bidirectional diffusion of the image. Finally, the Least Significant Bit (LSB) algorithm is used to hide the encrypted image in the carrier image that is normally transmitted. Experimental results show that the algorithm has a large key space, which is robust, has high computational time efficiency, and can resist various attacks.
引用
收藏
页码:218 / 222
页数:5
相关论文
共 50 条
  • [31] An Edge Based Image Steganography with Compression and Encryption
    Mishra, Rina
    Mishra, Atish
    Bhanodiya, Praveen
    2015 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION AND CONTROL (IC4), 2015,
  • [32] An Edge Based Image Steganography with Compression and Encryption
    Mishra, Rina
    Mishra, Atish
    Bhanodiya, Praveen
    2015 International Conference on Computing, Communication and Security (ICCCS), 2015,
  • [33] Image Encryption Based on Chaotic Sub-Block Scrambling and Chaotic Digit Selection Diffusion
    Xian, Yongjin
    Wang, Xingyuan
    Yan, Xiaopeng
    Li, Qi
    Wang, Xiaoyu
    OPTICS AND LASERS IN ENGINEERING, 2020, 134
  • [34] Image Encryption with The Cross Diffusion of Two Chaotic Maps
    Jiao, Ge
    Peng, Xiaojiang
    Duan, Kaiwen
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2019, 13 (02): : 1064 - 1079
  • [35] Cryptanalysis of a chaotic image encryption scheme based on permutation-diffusion structure
    Li, Ming
    Guo, Yuzhu
    Huang, Jie
    Li, Yang
    SIGNAL PROCESSING-IMAGE COMMUNICATION, 2018, 62 : 164 - 172
  • [36] Evaluating the permutation and diffusion operations used in image encryption based on chaotic maps
    Wang, Bin
    Xie, Yingjie
    Zhou, Changjun
    Zhou, Shihua
    Zheng, Xuedong
    OPTIK, 2016, 127 (07): : 3541 - 3545
  • [37] A fast image encryption system based on chaotic maps with finite precision representation
    Kwok, H. S.
    Tang, Wallace K. S.
    CHAOS SOLITONS & FRACTALS, 2007, 32 (04) : 1518 - 1529
  • [38] Image encryption based on chaotic maps
    Fridrich, J
    SMC '97 CONFERENCE PROCEEDINGS - 1997 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS, VOLS 1-5: CONFERENCE THEME: COMPUTATIONAL CYBERNETICS AND SIMULATION, 1997, : 1105 - 1110
  • [39] A novel chaotic encryption scheme based on image segmentation and multiple diffusion models
    Wang, Mingxu
    Wang, Xingyuan
    Zhang, Yingqian
    Gao, Zhenguo
    OPTICS AND LASER TECHNOLOGY, 2018, 108 : 558 - 573
  • [40] Chaotic map-based selective image encryption via diffusion and confusion
    Paliwal, Mrinal
    Soni, Punit
    Kumar, Rajender
    Goyal, Ankur
    Malik, Meena
    Goyal, Bhavna
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2024, 27 (2B): : 763 - 773