Abstract
In this paper, a new chaotic image encryption scheme is proposed, which uses the combination of stream cipher and block cipher to spread and then uses the Logistic mapping matrix to perform the block sort transformation to complete the confusion. The specific method is as follows: First, perform the triple XOR operation, non-linear S-box transformation and linear cyclic shift transformation on the key. Second, the triple XOR operation of the transformed key and the plaintext and Logistic mapping sequence are used to obtain the semi-ciphertext. And set the obtained semi-ciphertext and plaintext as key components of the next round of encryption. Finally, the transformation of sorting and partition of the Logistic mapping matrix are used to confuse the semi-ciphertext. The experimental results show that the proposed algorithm improves the encryption efficiency, has good security and can resist common attacks.
Acknowledgments
This research is supported by the National Natural Science Foundation of China: [Grant Numbers 61672124, 61370145 and 61173183], the Password Theory Project of the 13th Five-Year Plan National Cryptography Development Fund: [Grant Number MMJJ20170203).
References
[1] G. Z H, F. Huang and W. Guan, Chaos-based image encryption algorithm, Phys. Lett. A. 346 (1–3) (2005), 153–157.10.1016/j.physleta.2005.08.006Search in Google Scholar
[2] C. Wang, X. Wang, Z. Xia et al. Ternary radial harmonic Fourier moments based robust stereo image zero-watermarking algorithm. Information Science. 470 (2019), 109–120.10.1016/j.ins.2018.08.028Search in Google Scholar
[3] Y. Wang, W. K W, X. Liao, et al. A new chaos-based fast image encryption algorithm, Appl. Soft. Comput. 11 (1) (2011), 514–522.10.1016/j.asoc.2009.12.011Search in Google Scholar
[4] C. Çokal and E. Solak, Cryptanalysis of a chaos-based image encryption algorithm, Phys. Lett. A. 373 (15) (2009), 1357–1360.10.1016/j.physleta.2009.02.030Search in Google Scholar
[5] X. Wang, C. Liu and H. Zhang, An effective and fast image encryption algorithm based on chaos and interweaving of ranks, Nonlinear Dyn. 84 (3) (2016), 1595–1607.10.1007/s11071-015-2590-3Search in Google Scholar
[6] X. Wang and X. Wang, Design of chaotic pseudo-random bit generator and its applications in stream-cipher cryptography, Int. J. Mod. Phys. C. 19 (05) (2008), 813–820.10.1142/S0129183108012479Search in Google Scholar
[7] D. Chakraborty, C. Mancillas-L Pez and P. Sarkar, STES: A stream cipher based low cost scheme for securing stored data, IEEE Trans. Comput. 64 (9) (2015), 2691–2707.10.1109/TC.2014.2366739Search in Google Scholar
[8] C. Fu, C. J J, H. Zou, et al. A chaos-based digital image encryption scheme with an improved diffusion strategy, Opt. Express. 20 (3) (2012), 2363–2378.10.1364/OE.20.002363Search in Google Scholar PubMed
[9] F. J S A E, E. J Y, S. S L, et al. A fast chaotic block cipher for image encryption, Commun. Nonlinear. Sci. Numer. Simul. 19 (3) (2014), 578–588.10.1016/j.cnsns.2013.07.016Search in Google Scholar
[10] A. Jolfaei and A. Mirghadri, Image encryption using chaos and block cipher, Comput. Inf. Sci. 4 (1) (2010), 172–185.10.5539/cis.v4n1p172Search in Google Scholar
[11] X. Mou. Chaotic encryption scheme for real-time digital video. Proceedings of SPIE-The International Society for Optical Engineering, 2002, 4666: 149–160Search in Google Scholar
[12] D. Yang, X. Liao, Y. Wang, et al. A novel chaotic block cryptosystem based on iterating map with output-feedbac, Chaos Solitons Fractals. 41 (1) (2009), 505–510.10.1016/j.chaos.2008.02.017Search in Google Scholar
[13] M. Matsui, Advances in Cryptology-EUROCRYPT’93, Norway, Springer Berlin Heidelberg, 1994.Search in Google Scholar
[14] P. N K, V. Patidar and K. K. Sud, Image encryption using chaotic Logistic map, Image Vision Comput. 24 (9) (2006), 926–934.10.1016/j.imavis.2006.02.021Search in Google Scholar
[15] W. C F and Q. Ding, SM4 key scheme algorithm based on chaotic system, Acta Phys. Sin. 62 (2) (2017), 020504.10.7498/aps.66.020504Search in Google Scholar
[16] S. U. N. A J and W. U. Jun-Feng, The S-box of AES encryption algorithm and its MATLAB implementation, Inf. Technol. 11 (2008), 67–73.Search in Google Scholar
[17] G. Tang, S., . L. H. Wang, et al. Chaos-based cryptograph incorporated with S-box algebraic operation, Phys. Lett. A. 318 (4–5) (2003), 388–398.10.1016/j.physleta.2003.09.042Search in Google Scholar
[18] I. Hussain, A. N A and T. Shah, Stego optical encryption based on chaotic S-box transformation, Opt. Laser Technol. 61 (3) (2014), 50–56.10.1016/j.optlastec.2014.01.018Search in Google Scholar
[19] D. Canright, A very compact S-Box for AES, Lect. Notes Comput. Sci. 3659 (2005), 441–455.10.1007/11545262_32Search in Google Scholar
[20] H. Liu, X. Wang and A. Kadir, Chaos-based color image encryption using one-time keys and choquet fuzzy integral, Int. J. Nonlinear Sci. 15 (1) (2014), 1–10.10.1515/ijnsns-2011-0001Search in Google Scholar
[21] S. Behnia, A. Akhshani, H. Mahmodi, et al. A novel algorithm for image encryption based on mixture of chaotic maps, Chaos Solitons Fractals. 35 (2) (2008), 408–419.10.1016/j.chaos.2006.05.011Search in Google Scholar
[22] X. Wang, X. Wang, J. Zhao, et al. Chaotic encryption algorithm based on alternant of stream cipher and block cipher, Nonlinear Dyn. 63 (4) (2010), 587–597.10.1007/s11071-010-9821-4Search in Google Scholar
[23] L. Xu, Z. Li, J. Li, et al. A novel bit-level image encryption algorithm based on chaotic map, Opt. Laser Eng. 78 (21) (2012), 17–25.10.1016/j.optlaseng.2015.09.007Search in Google Scholar
[24] X. Wang and X. Bao, A novel image block cryptosystem based ona spatiotemporal chaotic system and a chaotic neural network, Chin. Phys. B. 22 (5) (2013), 232–240.10.1088/1674-1056/22/5/050508Search in Google Scholar
[25] X. Wei, L. Guo, Q. Zhang, et al. A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system, J Syst. Software. 85 (2) (2012), 290–299.10.1016/j.jss.2011.08.017Search in Google Scholar
[26] A. L. Rukhin, J. Soto, J. R. Nechvatal, et al. A statistical test suite for random and pseudorandom number generators for cryptographic applications, Nist Spec. Publ. Special Publication (2010), 800–822. Revision 1a.10.6028/NIST.SP.800-22Search in Google Scholar
© 2019 Walter de Gruyter GmbH, Berlin/Boston
Articles in the same Issue
- Frontmatter
- Original Research Articles
- Directed Transport in Symmetrically Periodic Potentials Induced by Cross-Correlation among Colored Gaussian Noises
- Effect of Fractional Damping in Double-Well Duffing–Vander Pol Oscillator Driven by Different Sinusoidal Forces
- Dynamical Behaviors of a Fractional-Order Predator–Prey Model with Holling Type IV Functional Response and Its Discretization
- Fourth-Order Spatial and Second-Order Temporal Accurate Compact Scheme for Cahn–Hilliard Equation
- Unit Root Testing in the Presence of Mean Reverting Jumps: Evidence from US T-Bond Yields
- Thermal Analysis of Longitudinal Fin with Temperature-Dependent Properties and Internal heat Generation by a Novel Intelligent Computational Approach Using Optimized Chebyshev Polynomials
- A Stream/Block Combination Image Encryption Algorithm Using Logistic Matrix to Scramble
- Dynamic Analysis of a Composite Structure under Random Excitation Based on the Spectral Element Method
- Sixth-Kind Chebyshev Spectral Approach for Solving Fractional Differential Equations
- Representation of Solutions and Finite Time Stability for Delay Differential Systems with Impulsive Effects
- Numerical Study of the Dynamics of Particles Motion with Different Sizes from Coal-Based Thermal Power Plant
Articles in the same Issue
- Frontmatter
- Original Research Articles
- Directed Transport in Symmetrically Periodic Potentials Induced by Cross-Correlation among Colored Gaussian Noises
- Effect of Fractional Damping in Double-Well Duffing–Vander Pol Oscillator Driven by Different Sinusoidal Forces
- Dynamical Behaviors of a Fractional-Order Predator–Prey Model with Holling Type IV Functional Response and Its Discretization
- Fourth-Order Spatial and Second-Order Temporal Accurate Compact Scheme for Cahn–Hilliard Equation
- Unit Root Testing in the Presence of Mean Reverting Jumps: Evidence from US T-Bond Yields
- Thermal Analysis of Longitudinal Fin with Temperature-Dependent Properties and Internal heat Generation by a Novel Intelligent Computational Approach Using Optimized Chebyshev Polynomials
- A Stream/Block Combination Image Encryption Algorithm Using Logistic Matrix to Scramble
- Dynamic Analysis of a Composite Structure under Random Excitation Based on the Spectral Element Method
- Sixth-Kind Chebyshev Spectral Approach for Solving Fractional Differential Equations
- Representation of Solutions and Finite Time Stability for Delay Differential Systems with Impulsive Effects
- Numerical Study of the Dynamics of Particles Motion with Different Sizes from Coal-Based Thermal Power Plant