A novel lorenz-sine coupling chaotic system and its application on color image encryption

被引:12
|
作者
Zhang, Ning [1 ]
Liu, Jie [1 ,2 ]
Tong, Xiaojun [3 ]
Jiao, Wei [4 ]
Gan, Hongping [1 ]
机构
[1] Northwestern Polytech Univ, Sch Software, Xian 710000, Peoples R China
[2] Yangtze River Delta Res Inst NPU, Taicang 215400, Peoples R China
[3] Harbin Inst Technol, Sch Comp Sci & Technol, Weihai 264209, Peoples R China
[4] Harbin Univ Sci & Technol, Sch Rongcheng, Rongcheng, Peoples R China
基金
中国国家自然科学基金;
关键词
coupling chaotic system; sine function; multi-symmetry stranger attractor; color image encryption; DNA ENCRYPTION; ATTRACTORS; GENERATION; DIFFUSION; DYNAMICS;
D O I
10.1088/1402-4896/aceb9b
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
The chaos-based image encryption has been extensively studied for image security owing to its high efficiency. However, both the complexity of the chaotic system and the chaos-based image encryption method must be enhanced. A Lorenz-Sine coupling chaotic system with complex behavior and a novel image encryption scheme is presented in this work. By adding a nonlinear controller containing sinusoidal function to the Lorenz system, we obtain smooth chaotic attractors with a unique appearance. Analysis of the dynamical properties shows that it has a multi-symmetry stranger attractor and a large chaotic range. Based on the proposed chaotic system, a pseudorandom sequence generator is designed to generate keys with high randomness. Furthermore, an image encryption scheme using spiral-rotation and random permutation is presented. Cipher-feedback is employed to increase the avalanche effect. The encryption efficiency and the security analysis are simulated. The result shows that the correlation coefficient between the adjacent pixels of the proposed scheme achieves 10-4. The NPCR of the proposed scheme is larger than 0.9661 and the UACI falls within the theoretical value of UACI with a significance level of 0.05. Thus, the proposed scheme is more capable against differential attacks. Furthermore, it is more robust against noise attacks and cropping attacks.
引用
收藏
页数:20
相关论文
共 50 条
  • [31] A Novel Image Encryption Scheme Based on Walsh Compressed Quantum Spinning Chaotic Lorenz System
    Usman Arshad
    Syeda Iram Batool
    Muhammad Amin
    International Journal of Theoretical Physics, 2019, 58 : 3565 - 3588
  • [32] A novel 4D chaotic system coupling with dual-memristors and application in image encryption
    Wang, Qiao
    Sang, Haiwei
    Wang, Pei
    Yu, Xiong
    Yang, Zongyun
    SCIENTIFIC REPORTS, 2024, 14 (01):
  • [33] A Novel Color Image Encryption Approach Based on Multi-chaotic System
    Hong, Lianxi
    Li, Chuanmu
    2008 2ND INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY AND IDENTIFICATION, 2008, : 223 - 226
  • [34] CHAOTIC ENCRYPTION BASED ON LORENZ SYSTEM
    Wang Xing-Yuan
    Wang Xiao-Juan
    INTERNATIONAL JOURNAL OF MODERN PHYSICS B, 2012, 26 (32):
  • [35] Efficient image encryption method based on improved Lorenz chaotic system
    Kaur, M.
    Kumar, V.
    ELECTRONICS LETTERS, 2018, 54 (09) : 562 - 563
  • [36] A novel six-wing chaotic system with line equilibrium and its application in image encryption
    Li, Ping
    Xia, Lei
    Fan, Yigang
    Qian, Jin
    ANALOG INTEGRATED CIRCUITS AND SIGNAL PROCESSING, 2025, 122 (02)
  • [37] A new image encryption algorithm based on optimized Lorenz chaotic system
    Li, Tu
    Yan, Wang
    Chi, Zhang
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (13):
  • [38] Quantum image encryption based on Lorenz hyper-chaotic system
    Zhou, Ri-Gui
    Li, Ying-Bin
    INTERNATIONAL JOURNAL OF QUANTUM INFORMATION, 2020, 18 (05)
  • [39] Image Encryption Based on Embedded ARM System and Lorenz Chaotic Algorithm
    Zhang, Qi
    Sun, Hao-ran
    Ding, Qun
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND COMMUNICATION TECHNOLOGY (CNCT 2016), 2016, 54 : 419 - 424
  • [40] DCT Domain Image Encryption Algorithm based on Lorenz Chaotic System
    Yan, Xu
    MECHATRONICS ENGINEERING, COMPUTING AND INFORMATION TECHNOLOGY, 2014, 556-562 : 5168 - 5171