A Novel Image Encryption Algorithm Based on Chaotic Sequences and Cross-Diffusion of Bits
To protect image information security, we propose an encryption algorithm based on chaotic sequences and bits' cross-diffusion. First, two chaotic sequences are generated by two-dimensional logic-sine coupling mapping, and the original image is scrambled with the two sequences. Secondly, the sc...
Saved in:
| Main Authors: | , , , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
IEEE
2021-01-01
|
| Series: | IEEE Photonics Journal |
| Subjects: | |
| Online Access: | https://ieeexplore.ieee.org/document/9291442/ |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1850093788766142464 |
|---|---|
| author | Geng Shengtao Wu Tao Wang Shida Zhang Xuncai Niu Ying |
| author_facet | Geng Shengtao Wu Tao Wang Shida Zhang Xuncai Niu Ying |
| author_sort | Geng Shengtao |
| collection | DOAJ |
| description | To protect image information security, we propose an encryption algorithm based on chaotic sequences and bits' cross-diffusion. First, two chaotic sequences are generated by two-dimensional logic-sine coupling mapping, and the original image is scrambled with the two sequences. Secondly, the scrambled image is transformed into a one-dimensional sequence, and the low-order bits between every two pixels are fused to change the detailed information of the image, improved the ability to resist differential attacks. Finally, chaotic sequences are generated by iterative logical mapping to perform pixel replacement and ciphertext diffusion. The known plaintext attack can be effectively resisted because of the stochastic combination of diffusion scheme and chaotic sequence. It also has a significant effect on resisting differential attack. Take Lena image as an example, NPCR and UACI can reach 99.6063% and 33.4477%, respectively, which are very close to the ideal value. The encryption scheme has good key sensitivity and strong ability to resist statistical attacks, which shows that the algorithm has adequate security. |
| format | Article |
| id | doaj-art-274ce259f76e413d99e818f7e8370dc2 |
| institution | DOAJ |
| issn | 1943-0655 |
| language | English |
| publishDate | 2021-01-01 |
| publisher | IEEE |
| record_format | Article |
| series | IEEE Photonics Journal |
| spelling | doaj-art-274ce259f76e413d99e818f7e8370dc22025-08-20T02:41:49ZengIEEEIEEE Photonics Journal1943-06552021-01-0113111510.1109/JPHOT.2020.30442229291442A Novel Image Encryption Algorithm Based on Chaotic Sequences and Cross-Diffusion of BitsGeng Shengtao0Wu Tao1https://orcid.org/0000-0003-4454-730XWang Shida2Zhang Xuncai3https://orcid.org/0000-0002-2190-7651Niu Ying4https://orcid.org/0000-0001-6851-8605School of Electrical and Information Engineering, Zhengzhou University of Light Industry, Zhengzhou, ChinaSchool of Electrical and Information Engineering, Zhengzhou University of Light Industry, Zhengzhou, ChinaSchool of Electrical and Information Engineering, Zhengzhou University of Light Industry, Zhengzhou, ChinaSchool of Electrical and Information Engineering, Zhengzhou University of Light Industry, Zhengzhou, ChinaSchool of Architecture Environment Engineering, Zhengzhou University of Light Industry, Zhengzhou, ChinaTo protect image information security, we propose an encryption algorithm based on chaotic sequences and bits' cross-diffusion. First, two chaotic sequences are generated by two-dimensional logic-sine coupling mapping, and the original image is scrambled with the two sequences. Secondly, the scrambled image is transformed into a one-dimensional sequence, and the low-order bits between every two pixels are fused to change the detailed information of the image, improved the ability to resist differential attacks. Finally, chaotic sequences are generated by iterative logical mapping to perform pixel replacement and ciphertext diffusion. The known plaintext attack can be effectively resisted because of the stochastic combination of diffusion scheme and chaotic sequence. It also has a significant effect on resisting differential attack. Take Lena image as an example, NPCR and UACI can reach 99.6063% and 33.4477%, respectively, which are very close to the ideal value. The encryption scheme has good key sensitivity and strong ability to resist statistical attacks, which shows that the algorithm has adequate security.https://ieeexplore.ieee.org/document/9291442/Chaotic mappingcross-diffusion of bitsimage encryption |
| spellingShingle | Geng Shengtao Wu Tao Wang Shida Zhang Xuncai Niu Ying A Novel Image Encryption Algorithm Based on Chaotic Sequences and Cross-Diffusion of Bits IEEE Photonics Journal Chaotic mapping cross-diffusion of bits image encryption |
| title | A Novel Image Encryption Algorithm Based on Chaotic Sequences and Cross-Diffusion of Bits |
| title_full | A Novel Image Encryption Algorithm Based on Chaotic Sequences and Cross-Diffusion of Bits |
| title_fullStr | A Novel Image Encryption Algorithm Based on Chaotic Sequences and Cross-Diffusion of Bits |
| title_full_unstemmed | A Novel Image Encryption Algorithm Based on Chaotic Sequences and Cross-Diffusion of Bits |
| title_short | A Novel Image Encryption Algorithm Based on Chaotic Sequences and Cross-Diffusion of Bits |
| title_sort | novel image encryption algorithm based on chaotic sequences and cross diffusion of bits |
| topic | Chaotic mapping cross-diffusion of bits image encryption |
| url | https://ieeexplore.ieee.org/document/9291442/ |
| work_keys_str_mv | AT gengshengtao anovelimageencryptionalgorithmbasedonchaoticsequencesandcrossdiffusionofbits AT wutao anovelimageencryptionalgorithmbasedonchaoticsequencesandcrossdiffusionofbits AT wangshida anovelimageencryptionalgorithmbasedonchaoticsequencesandcrossdiffusionofbits AT zhangxuncai anovelimageencryptionalgorithmbasedonchaoticsequencesandcrossdiffusionofbits AT niuying anovelimageencryptionalgorithmbasedonchaoticsequencesandcrossdiffusionofbits AT gengshengtao novelimageencryptionalgorithmbasedonchaoticsequencesandcrossdiffusionofbits AT wutao novelimageencryptionalgorithmbasedonchaoticsequencesandcrossdiffusionofbits AT wangshida novelimageencryptionalgorithmbasedonchaoticsequencesandcrossdiffusionofbits AT zhangxuncai novelimageencryptionalgorithmbasedonchaoticsequencesandcrossdiffusionofbits AT niuying novelimageencryptionalgorithmbasedonchaoticsequencesandcrossdiffusionofbits |