A Sensitive Image Encryption Algorithm Based on a Higher-Dimensional Chaotic Map and Steganography

被引:9
|
作者
Liu, Jinyuan [1 ]
Wang, Yong [2 ]
Han, Qi [3 ]
Gao, Jerry [4 ]
机构
[1] Chongqing Univ Posts & Telecommun, Coll Comp Sci & Technol, Chongqing 400065, Peoples R China
[2] Guilin Univ Elect Technol, Guangxi Key Lab Cryptog & Informat Secur, Guilin 541004, Peoples R China
[3] Chongqing Univ Sci & Technol, Sch Intelligent Technol & Engn, Chongqing 401331, Peoples R China
[4] San Jose State Univ, Comp Engn Dept, San Jose, CA 95192 USA
来源
基金
中国国家自然科学基金;
关键词
Image encryption; sensitive encryption; steganography; hash embedding; chaos; PERMUTATION; DNA;
D O I
10.1142/S0218127422500043
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
Chaotic maps have been widely used in image encryption due to their complexity, pseudorandomness and high sensitivity to initial values. In this paper, an image encryption algorithm based on a 4D chaotic map and steganography is proposed. The algorithm consists of two rounds of encryption and one operation of embedding hash. In the first round of encryption, the hash value of plaintext image is used to control the generation of chaotic sequences, which makes the encryption algorithm highly relevant to the content of the image. Then, the hash value is embedded into the intermediate image according to the idea of steganography. In the second round of encryption, the image is encrypted under the control of another set of chaotic sequences to hide the hash value and further enhance the security of the algorithm. Different from other algorithms, our algorithm does not need to additionally transmit the hash value to the decryptor through a special channel. It has good availability and adaptability. Experimental results and security analysis demonstrate that the algorithm has high security performance and can resist various attacks.
引用
收藏
页数:22
相关论文
共 50 条
  • [1] A novel sensitive image encryption algorithm based on the Zaslavsky chaotic map
    Hamza, Rafik
    Titouna, Faiza
    INFORMATION SECURITY JOURNAL, 2016, 25 (4-6): : 162 - 179
  • [2] An image encryption algorithm based on the perturbed high-dimensional chaotic map
    Xiao Jun Tong
    Zhu Wang
    Miao Zhang
    Yang Liu
    Hui Xu
    Jing Ma
    Nonlinear Dynamics, 2015, 80 : 1493 - 1508
  • [3] An Efficient Image Encryption Algorithm Based on Three-dimensional Chaotic Map
    Ye, Guodong
    Huang, Xiaoling
    Pan, Chen
    ICAIP 2018: 2018 THE 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN IMAGE PROCESSING, 2018, : 78 - 82
  • [4] An image encryption algorithm based on the perturbed high-dimensional chaotic map
    Tong, Xiao Jun
    Wang, Zhu
    Zhang, Miao
    Liu, Yang
    Xu, Hui
    Ma, Jing
    NONLINEAR DYNAMICS, 2015, 80 (03) : 1493 - 1508
  • [5] A new image encryption algorithm based on the high-dimensional chaotic map
    Tong, X. J.
    Zhang, M.
    Wang, Z.
    IMAGING SCIENCE JOURNAL, 2015, 63 (05): : 263 - 272
  • [6] An Image Encryption Algorithm Based on Oversampled Chaotic Map
    Liu, Shucong
    Song, Yanxing
    Yang, Jingsong
    MANUFACTURING PROCESS AND EQUIPMENT, PTS 1-4, 2013, 694-697 : 2016 - 2020
  • [7] A fast image encryption algorithm based on chaotic map
    Liu, Wenhao
    Sun, Kehui
    Zhu, Congxu
    OPTICS AND LASERS IN ENGINEERING, 2016, 84 : 26 - 36
  • [8] Chaotic coyote optimization algorithm for image encryption and steganography
    Tong, Huawei
    Li, Tianyou
    Xu, Youyun
    Su, Xinzhong
    Qiao, Guopeng
    MULTIMEDIA TOOLS AND APPLICATIONS, 2024, 83 (07) : 20861 - 20887
  • [9] Chaotic coyote optimization algorithm for image encryption and steganography
    Huawei Tong
    Tianyou Li
    Youyun Xu
    Xinzhong Su
    Guopeng Qiao
    Multimedia Tools and Applications, 2024, 83 : 20861 - 20887
  • [10] Colour image encryption based on advanced encryption standard algorithm with two-dimensional chaotic map
    Li, Jianhua
    Liu, Hui
    IET INFORMATION SECURITY, 2013, 7 (04) : 265 - 270