A new feedback image encryption scheme based on perturbation with dynamical compound chaotic sequence cipher generator

2009 ◽  
Vol 282 (14) ◽  
pp. 2722-2728 ◽  
Author(s):  
Xiaojun Tong ◽  
Minggen Cui ◽  
Zhu Wang
2009 ◽  
Vol 27 (8) ◽  
pp. 1035-1039 ◽  
Author(s):  
Chengqing Li ◽  
Shujun Li ◽  
Guanrong Chen ◽  
Wolfgang A. Halang

IEEE Access ◽  
2019 ◽  
Vol 7 ◽  
pp. 30344-30360 ◽  
Author(s):  
Shang Ma ◽  
Yan Zhang ◽  
Zeguo Yang ◽  
Jianhao Hu ◽  
Xin Lei

2019 ◽  
Vol 33 (27) ◽  
pp. 1950326 ◽  
Author(s):  
Xingyuan Wang ◽  
Shujuan Lin ◽  
Yong Li

This paper proposes an image encryption scheme based on cat mapping and matrix magic transformation (MMT) replacement method. First, the secure hash algorithm SHA-512 is used to generate 12 sets of keys, which are used for the initial values of the system and the required values of the algorithm for cat mapping and 2D-Logistic-adjusted-Sine map (LASM). Secondly, the plaintext image is scrambled by the cat mapping. Then, the matrix after the cat map replacement is again scrambled by the MMT replacement method to generate the permutation matrix. Finally, the permutation matrix is used for the bitxor operation with the chaotic sequence matrix generated by the 2D LASM system to realize the diffusion process of the scrambled image. Experimental results and security analysis show that the encryption algorithm has good performance and can resist various typical attacks.


Author(s):  
Guodong Li ◽  
Bing Yang ◽  
Yue Pu ◽  
Wenxia Xu

The problem of the secure transmission of digital image has paid more and more attention to the network and this paper designs a special image encryption scheme. Image encryption scheme is designed based on the hyper chaos of generalized five-order Henon mapping and five-order cellular neural network (CNN) system. Firstly, the chaotic sequence [Formula: see text], which is regarded as the initial conditions of CNN system, is generated by the five-order generalized Henon mapping. Then another chaotic sequence [Formula: see text] is produced by the CNN system. At last, the cipher image is generated by the transformation of random sequence [Formula: see text] and the original image. Toward the end, the paper makes the simulation experiment and draws a conclusion that the algorithm of image encryption has strong attack resistance, good safety, and suitable to spread in the network through analyzing the statistical characteristics of the image information entropy, correlation and histogram as well as the key space and the sensitivity.


2014 ◽  
Vol 40 (3) ◽  
pp. 931-941 ◽  
Author(s):  
Xuanping Zhang ◽  
Liping Shao ◽  
Zhongmeng Zhao ◽  
Zhigang Liang

2014 ◽  
Vol 1049-1050 ◽  
pp. 1371-1374
Author(s):  
Rui Song Ye ◽  
Ming Ye ◽  
Hao Qi Yao ◽  
Wen Hao Ye

A novel image encryption scheme comprising of one permutation process and one diffusion process is proposed. In the permutation process, the image sized is expanded to one sized by dividing the plain-image into two parts: one consisting of the higher 4bits and one consisting of the lower 4bits. The permutation operations are done row-by-row and column-by-column to increase the speed. The chaotic generalized Arnold map is utilized to generate chaotic sequence, which is quantized to shuffle the expanded image. The chaotic sequence for permutation process is dependent on plain-image and cipher keys, resulting in good key sensitivity and plain-image sensitivity. To achieve more avalanche effect and larger key space, Chinese Remainder Theorem is applied to diffuse the shuffled image. The key sensitivity and key space of the proposed image encryption have been analyzed as well. The experimental results suggest that the proposed image encryption scheme can be used for secure image and video communication applications.


Sign in / Sign up

Export Citation Format

Share Document