光电子快报(英文版), 2023, 19 (3): 186, Published Online: Mar. 18, 2023  

Bit level image encryption algorithm based on hyperchaotic system

Author Affiliations
1 School of Electronic and Information Engineering, Liaoning Technical University, Huludao 125100, China
2 Advanced Interactive Technology and Application Laboratory, Computer Network Information Center, Chinese Academy of Sciences, Beijing 100190, China
Abstract
Because chaotic systems are unpredictable, ergodic and sensitive to initial values and parameters, they are often used in the field of encryption. To avoid the bad randomness of the random key generated by the low dimensional chaotic map system, a 5-dimensional multi-wing hyperchaotic system is adopted in this paper. The key stream generated by the chaotic system is related to the plaintext image. So it can effectively resist the attacks of selecting plaintext. The plaintext graph is decomposed into binary form by bit plane decomposition technique, and then these bit planes are divided into high and low groups. The designed control matrix is used to identify the specific scrambling mode, and each bit is permuted within and between groups. Finally, bit diffusion is used to change the pixel value of each pixel. Theoretical analysis and numerical simulation show that the algorithm has good encryption performance for image encryption.
References

[1] WANG J, LI J, DI X, et al. Image encryption algorithm based on bit-level permutation and dynamic overlap diffusion[J]. IEEE access, 2020, 8: 160004-160024.

[2] LI S, CHEN G, CHEUNG A, et al. On the design of perceptual MPEG-video encryption algorithms[J]. IEEE transactions on circuits and systems for video technology, 2007, 17(2): 214-223.

[3] WANG X Y, YANG L, LIU R, et al. A chaotic image encryption algorithm based on perceptron model[J]. Nonlinear dynamics, 2010, 62(3): 615-621.

[4] MATTHEWS R. On the derivation of a “chaotic” encryption algorithm[J]. Cryptologia, 1989, 13(1): 29-42.

[5] ZHU Z, ZHANG W, WONG K, et al. A chaos-based symmetric image encryption scheme using a bit-level permutation[J]. Information sciences, 2011, 181(6): 1171-1186.

[6] ZHANG L, WANG Y, ZHANG D. Research on multiple-image encryption mechanism based on Radon transform and ghost imaging[J]. Optics communications,2022, 504: 127494.

[7] YU X, CHEN H, XIAO J, et al. Incoherent optical image encryption based on coded aperture correlation holography[J]. Optics communications, 2022, 510: 127889.

[8] PARAMESHACHARI B D, PANDURANGA H T. Medical image encryption using SCAN technique and chaotic tent map system[M]//Recent advances in artificial intelligence and data engineering. Singapore: Springer, 2022: 181-193.

[9] MANCY L, VIGILA S M C. Protection of encrypted medical image using consent based access control[J]. International journal of medical engineering and informatics, 2022, 14(1): 43-51.

[10] TU S, UR REHMAN S, WAQAS M, et al. Optimisation-based training of evolutionary convolution neural network for visual classification applications[J]. IET computer vision, 2020, 14(5): 259-267.

[11] CHEN T H, LI K C. Multi-image encryption by circular random grids[J]. Information sciences, 2012, 189: 255-265.

[12] RAVICHANDRAN D, BANU S A, MURTHY B K, et al. An efficient medical image encryption using hybrid DNA computing and chaos in transform domain[J]. Medical & biological engineering & computing, 2021, 59(3): 589-605.

[13] ZHANG J, HUANG Z, LI X, et al. Quantum image encryption based on quantum image decomposition[J]. International journal of theoretical physics, 2021, 60(8): 2930-2942.

[14] LORENZ E N. Deterministic nonperiodic flow[J]. Journal of atmospheric sciences, 1963, 20(2): 130-141.

[15] FRIDRICH J. Symmetric ciphers based on two-dimensional chaotic maps[J]. International journal of bifurcation and chaos, 1998, 8(06): 1259-1284.

[16] HUA Z, ZHOU Y, PUN C M, et al. 2D sine logistic modulation map for image encryption[J]. Information sciences, 2015, 297: 80-94.

[17] ZHANG X, WANG L, CUI G, et al. Entropy-based block scrambling image encryption using DES structure and chaotic systems[J]. International journal of optics, 2019.

[18] LIN J, ZHAO K, CAI X, et al. An image encryption method based on logistic chaotic mapping and DNA coding[C]//MIPPR 2019: Remote Sensing Image Processing, Geographic Information Systems, and Other

[19] HUA Z, ZHOU Y. Image encryption using 2D logistic-adjusted-sine map[J]. Information sciences, 2016, 339: 237-253.

[20] CHEN S, Lü J. Parameters identification and synchronization of chaotic systems based upon adaptive control[J]. Physics letters A, 2002, 299(4): 353-358.

[21] from the symbolic sequences generated by chaos system[J]. Chaos, solitons & fractals, 2004, 22(2): 359-366.

[22] HUA Z, ZHOU Y, CHEN C L P. A new series-wound framework for generating 1D chaotic maps[C]//2013 IEEE Digital Signal Processing and Signal Processing Education Meeting (DSP/SPE), August 11-14, 2013, USA. New York: IEEE, 2013: 118-123.

[23] ZAREI A. Complex dynamics in a 5-D hyper-chaotic attractor with four-wing, one equilibrium and multiple chaotic attractors[J]. Nonlinear dynamics, 2015, 81(1): 585-605.

[24] MAN Z, LI J, DI X, et al. Double image encryption algorithm based on neural network and chaos[J]. Chaos, solitons & fractals, 2021, 152: 111318.

[25] ZHANG Y. A new unified image encryption algorithm based on a lifting transformation and chaos[J]. Information sciences, 2021, 547: 307-327.

[26] GAO X, MOU J, XIONG L, et al. A fast and efficient multiple images encryption based on single-channel encryption and chaotic system[J]. Nonlinear dynamics, 2022, 108(1): 613-636.

[27] GUPTA M, SINGH V P, GUPTA K K, et al. An efficient image encryption technique based on two-level security for internet of things[J]. Multimedia tools and applications, 2022: 1-21.

[28] WANG X, TENG L, QIN X. A novel color image encryption algorithm based on chaos[J]. Signal processing, 2012, 92(4): 1101-1108.

MAN Zhenlong, ZHANG Yue, ZHOU Ying, LU Xiaoli, WANG Zhaoquan. Bit level image encryption algorithm based on hyperchaotic system[J]. 光电子快报(英文版), 2023, 19(3): 186.

关于本站 Cookie 的使用提示

中国光学期刊网使用基于 cookie 的技术来更好地为您提供各项服务,点击此处了解我们的隐私策略。 如您需继续使用本网站,请您授权我们使用本地 cookie 来保存部分信息。
全站搜索
您最值得信赖的光电行业旗舰网络服务平台!