Chaos-based model for encryption and decryption of digital images

被引:24
|
作者
Elgendy, Fatma [1 ]
Sarhan, Amany M. [1 ]
Eltobely, Tarek E. [1 ]
El-Zoghdy, S. F. [2 ,5 ]
El-sayed, Hala S. [3 ]
Faragallah, Osama S. [4 ,5 ]
机构
[1] Fac Engn, Dept Computers & Automat Control Engn, Tanta, Egypt
[2] Menoufia Univ, Fac Sci, Dept Math & Comp Sci, Shibin Al Kawm, Egypt
[3] Menoufia Univ, Fac Engn, Dept Elect Engn, Shibin Al Kawm 32511, Egypt
[4] Menoufia Univ, Fac Elect Engn, Dept Comp Sci & Engn, Menoufia 32952, Egypt
[5] Taif Univ, Coll Comp & Informat Technol, Dept Informat Technol, Al Hawiya 21974, Saudi Arabia
关键词
Chaotic map; Confusion; Diffusion; Security evaluation; TRANSFORM DOMAIN; HYPER-CHAOS; ALGORITHM; MAPS; SCHEME; CRYPTANALYSIS; SECURITY;
D O I
10.1007/s11042-015-2883-z
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper introduces a secure chaos-based model for ciphering and deciphering of digital images. The proposed approach is composed of successive confusion and diffusion stages. The confusion stage is repeated n rounds using a different key in each round. The output of the confusion stage is subjected to diffusion stage which is repeated m rounds with a different key for each round. The nested iterations in the confusion and diffusion stages with a different key for each round enlarges the key space which enhances the proposed image cryptosystem security level. A security investigation is done on a family of 2D chaotic confusion maps to select the one with highest security level to be used with the proposed image cryptosystem. The results demonstrated that the Standard map has the highest security level among the examined 2D chaotic confusion maps because it is more complicated and it has a large key space. The proposed image cryptosystem is compared to other three recent image cryptosystems using different security analysis factors including statistical tests, key space analysis, information entropy test, maximum deviation analysis, irregular deviation analysis, and avalanche effect differential analysis. The results demonstrated that, the proposed image cryptosystem with Standard map outperforms all of the other examined image encryption techniques from security point of view.
引用
收藏
页码:11529 / 11553
页数:25
相关论文
共 50 条
  • [21] FPGA hardware acceleration of an improved chaos-based cryptosystem for real-time image encryption and decryption
    Mohamed Gafsi
    Mohamed Ali Hajjaji
    Jihene Malek
    Abdellatif Mtibaa
    Journal of Ambient Intelligence and Humanized Computing, 2023, 14 : 7001 - 7022
  • [22] A chaos-based visual encryption mechanism in JPEG2000 medical images
    Lin, Chin-Feng
    Chang, Wen-Thong
    Li, Ching-Yi
    Journal of Medical and Biological Engineering, 2007, 27 (03) : 144 - 149
  • [23] A New Chaos-Based Image Encryption Algorithm
    Xu, Ming
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2018, 15 (03) : 493 - 498
  • [24] Spatial chaos-based image encryption design
    LIU ShuTang & SUN FuYan College of Control Science and Engineering
    Science China(Physics,Mechanics & Astronomy), 2009, (02) : 177 - 183
  • [25] Chaos-based encryption for fractal image coding
    Yuen Ching-Hung
    Kwok-Wo, Wong
    CHINESE PHYSICS B, 2012, 21 (01)
  • [26] A novel chaos-based image encryption scheme
    Dascalescu, Ana Cristina
    Boriga, Radu
    Miitailescu, Marius Iulian
    ANNALS OF THE UNIVERSITY OF CRAIOVA-MATHEMATICS AND COMPUTER SCIENCE SERIES, 2014, 41 (01): : 47 - 58
  • [27] An improved chaos-based image encryption scheme
    Fu, Chong
    Zhang, Zhen-chuan
    Chen, Ying
    Wang, Xing-wei
    COMPUTATIONAL SCIENCE - ICCS 2007, PT 1, PROCEEDINGS, 2007, 4487 : 575 - +
  • [29] Chaos-Based Encryption Algorithm for Compressed Video
    袁春
    钟玉琢
    贺玉文
    TsinghuaScienceandTechnology, 2003, (05) : 605 - 611
  • [30] Chaos-Based Simultaneous Compression and Encryption for Hadoop
    Usama, Muhammad
    Zakaria, Nordin
    PLOS ONE, 2017, 12 (01):