A novel design of multiple image encryption using perturbed chaotic map

被引:18
|
作者
Thang Manh Hoang [1 ,2 ]
机构
[1] Hanoi Univ Sci & Technol, Sch Elect & Elect Engn, 1 Dai Co Viet, Hanoi, Vietnam
[2] Hanoi Univ Sci & Technol, Vietnam Japan Int Inst Sci Technol, 1 Dai Co Viet, Hanoi, Vietnam
关键词
Digital perturbed chaos; Perturbed chaotic map; Chaos-based image encryption; Multiple image encryption (MIE); BLOCK CIPHER; ALGORITHM; SCHEME; STEGANOGRAPHY; PERMUTATION; TRANSFORM; RETRIEVAL; SECRET; DOMAIN; DCT;
D O I
10.1007/s11042-022-12139-0
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
For recent decades, the increasing volume of multimedia data has been witnessed, and the data is required technical methods to assure the security for storage and transmission. Chaos-based encryption is one of promising approaches to keep large volume of data confidential. Most of chaos-based algorithms were proposed for single image encryption. Recently, several schemes were proposed for multiple image encryption, and all of them are designed to work in a single round of encryption. In addition, the dynamics of chaotic maps therein are stationary, so it does not provide advantage of uncertainty of chaotic orbits for the security. Moreover, a chaotic map being realized in digital platforms can produce a large number of bits, and so far those bits have not been used efficiently to encrypt larger volume of data. In this paper, a novel design of chaos-based multiple image encryption is proposed using the permutation-diffusion architecture for the first time. Any chaotic map can be employed for the proposed design. Chaotic dynamics are non-stationary by means of perturbation on state variables and control parameters in bit level. Amounts of perturbation are constructed from the coordinate of pixels and the content of plain images respectively in the pixel permutation and diffusion processes, so the proposed design provides the property of authentication. Values of chaotic state variables are represented in fixed-point number, and bits generated by chaotic maps are thoroughly exploited to encrypt multiple images at the same time. The specific example will demonstrate the effectiveness of the proposed design by means of the statistical and security analyses. The simulation results will show its resistance from the attacking method of differential analysis, and those are also compared with those of other existing algorithms.
引用
收藏
页码:26535 / 26589
页数:55
相关论文
共 50 条
  • [1] A novel design of multiple image encryption using perturbed chaotic map
    Thang Manh Hoang
    [J]. Multimedia Tools and Applications, 2022, 81 : 26535 - 26589
  • [2] Design of an image encryption scheme based on a multiple chaotic map
    Tong, Xiao-Jun
    [J]. COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2013, 18 (07) : 1725 - 1733
  • [3] Multiple stage image encryption using chaotic logistic map
    Brindha, M.
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTELLIGENT SUSTAINABLE SYSTEMS (ICISS 2017), 2017, : 1239 - 1243
  • [4] A Novel Partial Image Encryption using Chaotic Logistic Map
    Hazarika, Nitumoni
    Saikia, Monjul
    [J]. 2014 INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND INTEGRATED NETWORKS (SPIN), 2014, : 231 - 236
  • [5] A Novel Piecewise Chaotic Map for Image Encryption
    Charalampidis, Nikolaos
    Volos, Christos
    Moysis, Lazaros
    Nistazakis, Hector E.
    Stouboulos, Ioannis
    [J]. 2022 11TH INTERNATIONAL CONFERENCE ON MODERN CIRCUITS AND SYSTEMS TECHNOLOGIES (MOCAST), 2022,
  • [6] Perturbed Chaotic Map with Varying Number of Iterations and Application in Image Encryption
    Thang Manh Hoang
    [J]. IEEE ICCE 2020: 2020 IEEE EIGHTH INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND ELECTRONICS (ICCE), 2021, : 413 - 418
  • [7] Image encryption using chaotic logistic map
    Pareek, N. K.
    Patidar, Vinod
    Sud, K. K.
    [J]. IMAGE AND VISION COMPUTING, 2006, 24 (09) : 926 - 934
  • [8] Image encryption using spatial chaotic map
    Sun, Fuyan
    Lue, Zongwang
    [J]. INTERNATIONAL CONFERENCE ON IMAGE PROCESSING AND PATTERN RECOGNITION IN INDUSTRIAL ENGINEERING, 2010, 7820
  • [9] A novel chaotic map application in image encryption algorithm
    Li, Lizong
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2024, 252
  • [10] An image encryption algorithm based on the perturbed high-dimensional chaotic map
    Xiao Jun Tong
    Zhu Wang
    Miao Zhang
    Yang Liu
    Hui Xu
    Jing Ma
    [J]. Nonlinear Dynamics, 2015, 80 : 1493 - 1508