Chaotic Image Encryption Design Using Tompkins-Paige Algorithm

被引:37
|
作者
Borujeni, Shahram Etemadi [1 ,2 ]
Eshghi, Mohammad [1 ]
机构
[1] Shahid Beheshti Univ, Fac Comp & Elect Engn, Dept Comp Engn, Tehran 1983963113, Iran
[2] Univ Isfahan, Fac Engn, Dept Comp Engn, Esfahan 8174673441, Iran
关键词
D O I
10.1155/2009/762652
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
In this paper, we have presented a new permutation-substitution image encryption architecture using chaotic maps and Tompkins-Paige algorithm. The proposed encryption system includes two major parts, chaotic pixels permutation and chaotic pixels substitution. A logistic map is used to generate a bit sequence, which is used to generate pseudorandom numbers in Tompkins-Paige algorithm, in 2D permutation phase. Pixel substitution phase includes two process, the tent pseudorandom image (TPRI) generator and modulo addition operation. All parts of the proposed chaotic encryption system are simulated. Uniformity of the histogram of the proposed encrypted image is justified using the chi-square test, which is less than chi(2) (255, 0.05). The vertical, horizontal, and diagonal correlation coefficients, as well as their average and RMS values for the proposed encrypted image are calculated that is about 13% less than previous researches. To quantify the difference between the encrypted image and the corresponding plain-image, three measures are used. These are MAE, NPCR, and UACI, which are improved in our proposed system considerably. NPCR of our proposed system is exactly the ideal value of this criterion. The key space of our proposed method is large enough to protect the system against any Brute-force and statistical attacks. Copyright (C) 2009 S. Etemadi Borujeni and M. Eshghi.
引用
收藏
页数:22
相关论文
共 50 条
  • [1] ORD-SMITHS PSEUDO-LEXICOGRAPHICAL PERMUTATION PROCEDURE IS THE TOMPKINS-PAIGE ALGORITHM
    ROHL, JS
    [J]. COMPUTER JOURNAL, 1991, 34 (06): : 569 - 570
  • [2] Image encryption algorithm using chaotic Chebyshev generator
    Huang, Xiaoling
    [J]. NONLINEAR DYNAMICS, 2012, 67 (04) : 2411 - 2417
  • [3] An image encryption algorithm using the combination of chaotic maps
    Arab, Alireza A.
    Rostami, Mohammad Javad B.
    Ghavami, Behnam
    [J]. OPTIK, 2022, 261
  • [4] Image encryption algorithm using chaotic Chebyshev generator
    Xiaoling Huang
    [J]. Nonlinear Dynamics, 2012, 67 : 2411 - 2417
  • [5] Image Encryption Algorithm Using Chaotic Sequences and Flipping
    Takkar, Priyanka
    Girdhar, Ashish
    Singh, V. P.
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND AUTOMATION (ICCCA), 2017, : 1188 - 1191
  • [6] Design of Image Encryption Algorithm Based on Different Chaotic Mapping
    Mokhtar, Mohamed A.
    Sadek, Nayra M.
    Mohamed, Amira G.
    [J]. 2017 34TH NATIONAL RADIO SCIENCE CONFERENCE (NRSC), 2017, : 197 - 204
  • [7] Breaking a chaotic image encryption algorithm
    Noshadian, Saeed
    Ebrahimzade, Ata
    Kazemitabar, Seyed Javad
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (35-36) : 25635 - 25655
  • [8] Chaotic Algorithm for Standard Image Encryption
    Rao, Surya Bhupal
    Basha, S. Rahamat
    [J]. JOURNAL OF MECHANICS OF CONTINUA AND MATHEMATICAL SCIENCES, 2019, : 125 - 137
  • [9] A new chaotic algorithm for image encryption
    Gao, HJ
    Zhang, YS
    Liang, SY
    Li, DQ
    [J]. CHAOS SOLITONS & FRACTALS, 2006, 29 (02) : 393 - 399
  • [10] A new chaotic algorithm for image encryption
    Zhang, Xin
    Chen, Weibin
    [J]. 2008 INTERNATIONAL CONFERENCE ON AUDIO, LANGUAGE AND IMAGE PROCESSING, VOLS 1 AND 2, PROCEEDINGS, 2008, : 889 - 892