A Novel Hybrid Secure Image Encryption Based on the Shuffle Algorithm and the Hidden Attractor Chaos System

被引:9
|
作者
Jin, Xin [1 ]
Duan, Xintao [1 ]
Jin, Hang [2 ]
Ma, Yuanyuan [1 ]
机构
[1] Henan Normal Univ, Coll Comp & Informat Engn, Xinxiang 453007, Peoples R China
[2] Wuhan Univ, Econ & Management Sch, Wuhan 430072, Peoples R China
关键词
security analysis; image encryption; shuffle algorithm; chaotic system; DNA sequence; SCHEME; PERMUTATION; CIRCUIT; MAP;
D O I
10.3390/e22060640
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
Aiming at the problems of small key space, low security of encryption structure, and easy to crack existing image encryption algorithms combining chaotic system and DNA sequence, this paper proposes an image encryption algorithm based on a hidden attractor chaotic system and shuffling algorithm. Firstly, the chaotic sequence generated by the hidden attractor chaotic system is used to encrypt the image. The shuffling algorithm is used to scramble the image, and finally, the DNA sequence operation is used to diffuse the pixel value of the image. Experimental results show that the key space of the scheme reaches 2(327)and is very sensitive to keys. The histogram of encrypted images is evenly distributed. The correlation coefficient of adjacent pixels is close to 0. The entropy values of encrypted images are all close to eight and the unified average change intensity (UACI) value and number of pixel changing rate (NPCR) value are close to ideal values. All-white and all-black image experiments meet the requirements. Experimental results show that the encryption scheme in this paper can effectively resist exhaustive attacks, statistical attacks, differential cryptanalysis, known plaintext and selected plaintext attacks, and noise attacks. The above research results show that the system has better encryption performance, and the proposed scheme is useful and practical in communication and can be applied to the field of image encryption.
引用
收藏
页数:22
相关论文
共 50 条
  • [11] A new image encryption algorithm based on chaos system
    Zhang, H
    Feng, WX
    Hui, LZ
    Hai, LD
    Chou, LY
    2003 IEEE INTERNATIONAL CONFERENCE ON ROBOTICS, INTELLIGENT SYSTEMS AND SIGNAL PROCESSING, VOLS 1 AND 2, PROCEEDINGS, 2003, : 778 - 782
  • [12] New image encryption algorithm based on chaos system
    Sun, Xin
    Yi, Kaixiang
    Sun, Youxian
    Jisuanji Fuzhu Sheji Yu Tuxingxue Xuebao/Journal of Computer-Aided Design and Computer Graphics, 2002, 14 (02): : 136 - 139
  • [13] Breaking a novel colour image encryption algorithm based on chaos
    Chengqing Li
    Leo Yu Zhang
    Rong Ou
    Kwok-Wo Wong
    Shi Shu
    Nonlinear Dynamics, 2012, 70 : 2383 - 2388
  • [14] Breaking a novel colour image encryption algorithm based on chaos
    Li, Chengqing
    Zhang, Leo Yu
    Ou, Rong
    Wong, Kwok-Wo
    Shu, Shi
    NONLINEAR DYNAMICS, 2012, 70 (04) : 2383 - 2388
  • [15] A Novel Algorithm for Block Encryption of Digital Image Based on Chaos
    Peng, Jun
    Zhang, Du
    Liao, Xiaofeng
    INTERNATIONAL JOURNAL OF COGNITIVE INFORMATICS AND NATURAL INTELLIGENCE, 2011, 5 (01) : 59 - 74
  • [16] A novel image encryption algorithm based on chaos and Line map
    Zhou, Guomin
    Zhang, Daxing
    Liu, Yanjian
    Yuan, Ying
    Liu, Qiang
    NEUROCOMPUTING, 2015, 169 : 150 - 157
  • [17] A secure and efficient image encryption algorithm based on DNA coding and spatiotemporal chaos
    Li X.
    Zhou C.
    Xu N.
    International Journal of Network Security, 2018, 20 (01) : 110 - 120
  • [18] An Image Encryption Algorithm Based on Chaos
    Jin, Yong-Xian
    Guan, Yi-Sheng
    Zheng, Lin
    ADVANCES IN COMPUTER SCIENCE, INTELLIGENT SYSTEM AND ENVIRONMENT, VOL 3, 2011, 106 : 493 - 497
  • [19] Image Encryption Based On Knutt / Durstenfeld Shuffle Algorithm
    Guvenoglu, Erdal
    Esin, E. Murat
    JOURNAL OF POLYTECHNIC-POLITEKNIK DERGISI, 2009, 12 (03): : 151 - 155
  • [20] An image encryption method based on chaos system and AES algorithm
    Alireza Arab
    Mohammad Javad Rostami
    Behnam Ghavami
    The Journal of Supercomputing, 2019, 75 : 6663 - 6682