Chaotic image encryption based on finite field bidirectional diffusion and steganography

被引:0
|
作者
Liu, Xiang [1 ]
Ding, Dawei [1 ,2 ,3 ]
Yang, Zongli [1 ,2 ,3 ]
机构
[1] Anhui Univ, Sch Elect Informat Engn, Hefei, Peoples R China
[2] Yuexi Unmanned Aviat Ind Res Inst, Anqing, Peoples R China
[3] Anqing Civil Unmanned Aerial Test Zone, Anqing, Peoples R China
关键词
Image encryption; Steganography; Memristive HR neuron model; Finite field bidirectional diffusion; Least significant bit; CIRCUIT;
D O I
10.1109/ICIPMC62364.2024.10586715
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
This paper proposes an algorithm combining image encryption and steganography which provides double protection for images that need to be kept secret. First, a new Three-Dimensional (3-D) fractional-order memristive Hindmarsh-Rose (HR) neuron model is constructed. It has highly complex and unpredictable dynamic behavior, which can produce complex state transition phenomena such as period, period-doubling bifurcation, chaos and hyperchaos. Then, the finite-field bidirectional diffusion algorithm was used to perform nonrepetitive scrambling and bidirectional diffusion of the image. Finally, the Least Significant Bit (LSB) algorithm is used to hide the encrypted image in the carrier image that is normally transmitted. Experimental results show that the algorithm has a large key space, which is robust, has high computational time efficiency, and can resist various attacks.
引用
收藏
页码:218 / 222
页数:5
相关论文
共 50 条
  • [1] Chaotic image encryption based on spiral traversal and finite field bidirectional diffusion
    Huang, Lilian
    Chai, Bin
    Xiang, Jianhong
    Zhang, Zefeng
    Liu, Jin
    [J]. PHYSICA SCRIPTA, 2023, 98 (03)
  • [2] An image encryption algorithm based on the LSCMM chaotic map and bidirectional dynamic diffusion
    Rong Chen
    Xiaomeng Li
    Lin Teng
    Xingyuan Wang
    [J]. Multimedia Tools and Applications, 2024, 83 : 3681 - 3706
  • [3] An image encryption algorithm based on the LSCMM chaotic map and bidirectional dynamic diffusion
    Chen, Rong
    Li, Xiaomeng
    Teng, Lin
    Wang, Xingyuan
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 83 (2) : 3681 - 3706
  • [4] Multi image encryption and steganography based on synchronization of chaotic lasers
    Mukhopadhyay, Sumona
    Leung, Henry
    [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC 2013), 2013, : 4403 - 4408
  • [5] The Application of Chaotic Mapping Based on Finite Field Operation in Digital Image Encryption
    Liu Bing
    Chen Qiang
    [J]. PROCEEDINGS FIRST INTERNATIONAL CONFERENCE ON ELECTRONICS INSTRUMENTATION & INFORMATION SYSTEMS (EIIS 2017), 2017, : 658 - 662
  • [6] Chaotic coyote optimization algorithm for image encryption and steganography
    Tong, Huawei
    Li, Tianyou
    Xu, Youyun
    Su, Xinzhong
    Qiao, Guopeng
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2024, 83 (07) : 20861 - 20887
  • [7] Chaotic coyote optimization algorithm for image encryption and steganography
    Huawei Tong
    Tianyou Li
    Youyun Xu
    Xinzhong Su
    Guopeng Qiao
    [J]. Multimedia Tools and Applications, 2024, 83 : 20861 - 20887
  • [8] Outsourcing chaotic selective image encryption to the cloud with steganography
    Xiang, Tao
    Hu, Jia
    Sun, Jianglin
    [J]. DIGITAL SIGNAL PROCESSING, 2015, 43 : 28 - 37
  • [9] Substitution Steganography with Security Improved by Chaotic Image Encryption
    Oravec, Jakub
    Turan, Jan
    [J]. 2017 IEEE 14TH INTERNATIONAL SCIENTIFIC CONFERENCE ON INFORMATICS, 2017, : 284 - 288
  • [10] A Bidirectional Diffusion Based Image Encryption Scheme for Color Images
    Sreelakshmi, K.
    Ravi, Renjith, V
    [J]. 2020 7TH IEEE INTERNATIONAL CONFERENCE ON SMART STRUCTURES AND SYSTEMS (ICSSS 2020), 2020, : 118 - 123