A new chaos-based image cipher using a hash function

被引:3
|
作者
Fu C. [1 ]
Bian O. [2 ]
Jiang H.-Y. [3 ]
Ge L.-H. [4 ]
Ma H.-F. [5 ]
机构
[1] School of Computer Science and Engineering, Northeastern University, NO. 3-11, Wenhua Road, Heping District, Shenyang
[2] General Hospital of Shenyang Military Command, NO. 83, Wenhua Road, Shenhe District, Shenyang
[3] Software College, Northeastern University, Key Laboratory of Medical Image Computing of Ministry of Education, NO. 3-11, Wenhua Road, Heping District, Shenyang
[4] Anshan Central Hospital, NO. 77, Nanzhonghua Road, Tiedong District, Anshan
[5] TeraRecon, 4000 East 3rd Avenue, Suite200, Foster, 94404, CA
基金
中国国家自然科学基金;
关键词
Cat map; Image cipher; Lorenz system; Murmur hash;
D O I
10.2991/ijndc.2017.5.1.4
中图分类号
学科分类号
摘要
This paper presents a new chaos-based image cipher using a plaintext-related permutation. The cat map and Lorenz system are employed to shuffle the positions of image pixels and generate the diffusion keystream, respectively. The control parameters of the cat map, i.e. the permutation key, are determined by the Murmur2 hash value of the original image. Owing to the avalanche property of hash functions, completely different shuffled images will be produced even if there is a tiny difference between the original ones, and it helps accelerate the diffusion process. Experimental results indicate that the proposed scheme requires only one and two cipher cycles to achieve an acceptable and a satisfactory diffusion properties, respectively, whereas two and three cipher cycles are needed by typical schemes to achieve the same properties. Thorough security analysis is carried out, and the results demonstrate the satisfactory security of the proposed scheme. © 2017, the Authors. Published by Atlantis Press.
引用
收藏
页码:37 / 44
页数:7
相关论文
共 50 条
  • [21] Constructing chaos-based hash function via parallel impulse perturbation
    Liu, Hongjun
    Wang, Xingyuan
    Kadir, Abdurahman
    SOFT COMPUTING, 2021, 25 (16) : 11077 - 11086
  • [22] A chaos-based hash function with both modification detection and localization capabilities
    Xiao, Di
    Shih, Frank Y.
    Liao, Xiaofeng
    COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2010, 15 (09) : 2254 - 2261
  • [23] A Chaos-Based Authenticated Cipher with Associated Data
    Teh, Je Sen
    Samsudin, Azman
    SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [24] An improved chaos-based stream cipher algorithm
    Fu, Chong
    Zhu, Zhi-liang
    ICNC 2007: THIRD INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION, VOL 3, PROCEEDINGS, 2007, : 179 - +
  • [25] Chaos-Based Stream Cipher for Gigabit Ethernet
    Perez-Resa, A.
    Garcia-Bosque, M.
    Sanchez-Azqueta, C.
    Celma, S.
    2018 IEEE 9TH LATIN AMERICAN SYMPOSIUM ON CIRCUITS & SYSTEMS (LASCAS), 2018, : 94 - 97
  • [26] Linear cryptanalysis for a chaos-based stream cipher
    Yin, Ruming
    Yuan, Jian
    Yang, Qiuhua
    Shan, Xiuming
    Wang, Xiqin
    World Academy of Science, Engineering and Technology, 2009, 36 : 801 - 806
  • [27] A Chaos-based Block Cipher with Feistel Structure
    Peng, Jun
    Lei, Liang
    Han, Qi
    Jia, Rong
    2014 IEEE 13TH INTERNATIONAL CONFERENCE ON COGNITIVE INFORMATICS & COGNITIVE COMPUTING (ICCI-CC), 2014, : 343 - 348
  • [28] Enhanced design and hardware implementation of a chaos-based block cipher for image protection
    Madani, Mahdi
    El Assad, Safwan
    Dridi, Fethi
    Lozi, Rene
    JOURNAL OF DIFFERENCE EQUATIONS AND APPLICATIONS, 2023, 29 (9-12) : 1408 - 1428
  • [29] An Efficient Chaos-Based Feedback Stream Cipher (ECBFSC) for Image Encryption and Decryption
    Ahmed, Hossam El-Din H.
    Kalash, Hamdy M.
    Allah, Osama S. Farag
    INFORMATICA-JOURNAL OF COMPUTING AND INFORMATICS, 2007, 31 (01): : 121 - 129
  • [30] A New Chaos-Based Image Encryption Algorithm
    Xu, Ming
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2018, 15 (03) : 493 - 498