Chaos-based model for encryption and decryption of digital images

被引:24
|
作者
Elgendy, Fatma [1 ]
Sarhan, Amany M. [1 ]
Eltobely, Tarek E. [1 ]
El-Zoghdy, S. F. [2 ,5 ]
El-sayed, Hala S. [3 ]
Faragallah, Osama S. [4 ,5 ]
机构
[1] Fac Engn, Dept Computers & Automat Control Engn, Tanta, Egypt
[2] Menoufia Univ, Fac Sci, Dept Math & Comp Sci, Shibin Al Kawm, Egypt
[3] Menoufia Univ, Fac Engn, Dept Elect Engn, Shibin Al Kawm 32511, Egypt
[4] Menoufia Univ, Fac Elect Engn, Dept Comp Sci & Engn, Menoufia 32952, Egypt
[5] Taif Univ, Coll Comp & Informat Technol, Dept Informat Technol, Al Hawiya 21974, Saudi Arabia
关键词
Chaotic map; Confusion; Diffusion; Security evaluation; TRANSFORM DOMAIN; HYPER-CHAOS; ALGORITHM; MAPS; SCHEME; CRYPTANALYSIS; SECURITY;
D O I
10.1007/s11042-015-2883-z
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper introduces a secure chaos-based model for ciphering and deciphering of digital images. The proposed approach is composed of successive confusion and diffusion stages. The confusion stage is repeated n rounds using a different key in each round. The output of the confusion stage is subjected to diffusion stage which is repeated m rounds with a different key for each round. The nested iterations in the confusion and diffusion stages with a different key for each round enlarges the key space which enhances the proposed image cryptosystem security level. A security investigation is done on a family of 2D chaotic confusion maps to select the one with highest security level to be used with the proposed image cryptosystem. The results demonstrated that the Standard map has the highest security level among the examined 2D chaotic confusion maps because it is more complicated and it has a large key space. The proposed image cryptosystem is compared to other three recent image cryptosystems using different security analysis factors including statistical tests, key space analysis, information entropy test, maximum deviation analysis, irregular deviation analysis, and avalanche effect differential analysis. The results demonstrated that, the proposed image cryptosystem with Standard map outperforms all of the other examined image encryption techniques from security point of view.
引用
收藏
页码:11529 / 11553
页数:25
相关论文
共 50 条
  • [31] A Chaos-Based Encryption Algorithm for Database System
    Albahrani E.A.
    Lafta S.H.
    Ghayad N.H.
    Journal of Cyber Security and Mobility, 2023, 12 (01): : 25 - 54
  • [32] An improved chaos-based image encryption algorithm
    Cao Yingyu
    Fu Chong
    Zhang Zhenchuan
    Advanced Computer Technology, New Education, Proceedings, 2007, : 675 - 679
  • [33] Cryptanalysis of a chaos-based image encryption algorithm
    Cokal, Cahit
    Solak, Ercan
    PHYSICS LETTERS A, 2009, 373 (15) : 1357 - 1360
  • [34] A new chaos-based image encryption system
    El Assad, Safwan
    Farajallah, Mousa
    SIGNAL PROCESSING-IMAGE COMMUNICATION, 2016, 41 : 144 - 157
  • [35] A novel chaos-based video encryption algorithm
    Jian, H
    Mao, YB
    Wang, ZQ
    Li, Z
    Li, P
    APPLIED COMPUTATIONAL INTELLIGENCE, 2004, : 641 - 648
  • [36] Cycle detection for secure chaos-based encryption
    Hasimoto-Beltran, Rogelio
    Ramirez-Ramirez, Roxana
    COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2011, 16 (08) : 3203 - 3211
  • [37] A ROBUST CHAOS-BASED IMAGE ENCRYPTION SCHEME
    Li, Weihai
    Yu, Nenghai
    ICME: 2009 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, VOLS 1-3, 2009, : 1034 - 1037
  • [38] Chaos-based encryption for fractal image coding
    袁正雄
    黄国和
    ChinesePhysicsB, 2012, 21 (01) : 115 - 126
  • [39] A Chaos-based Color Image Encryption Algorithm
    Yu, Gan
    Shen, Yongjun
    Zhang, Guidong
    Yang, Yanhua
    2013 SIXTH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN (ISCID), VOL 2, 2013, : 92 - 95
  • [40] Scheme for Chaos-based Encryption and Lyapunov Analysis
    Gularte, Kevin H. M.
    Rego, Leonardo N. C.
    Vargas, Jose A. R.
    2018 IEEE INTERNATIONAL CONFERENCE ON AUTOMATION/XXIII CONGRESS OF THE CHILEAN ASSOCIATION OF AUTOMATIC CONTROL (ICA-ACCA), 2018,