当前位置: X-MOL 学术Multimed. Tools Appl. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
A novel randomized bit-level two-dimensional hyperchaotic image encryption algorithm
Multimedia Tools and Applications ( IF 3.0 ) Pub Date : 2020-08-28 , DOI: 10.1007/s11042-020-09434-z
Ali Shakiba

In this paper, we designed a new hyperchaotic two-dimensional map with wide distribution and two large positive Lyapunov exponents. Then, we used it to construct a new randomized bit-level chaotic image encryption algorithm with the proposed hyperchaotic map as the source of randomization for permutation and diffusion. The input image is randomized by appending an extra random row and an additional random column to it. Then, the whole permutation and diffusion process are randomized by relating the parameters of the hyperchaotic mapping dependent on the hash value of the randomized image. In the permutation step, the randomized image is split into binary images, and then each binary image is randomly and independently permuted. Then, the permuted binary images are combined, and diffusion is applied to each pixel. Various security experiments are designed to assess the performance of the proposed encryption algorithm, including entropy analysis, histogram analysis, key-space analysis, the pixel-level and the bit-level correlation analysis, and differential attacks as well as key-sensitivity and randomization analysis. According to these experiments, the proposed algorithm shows an excellent security performance compared to several recent image encryption algorithms. Moreover, the proposed encryption algorithm is robust against data loss and noise attacks. Finally, the running time of the proposed algorithm is smaller compared to several recent algorithms.



中文翻译:

一种新颖的随机比特级二维超混沌图像加密算法

在本文中,我们设计了一个新的具有广泛分布和两个大正Lyapunov指数的超混沌二维映射。然后,我们用它构造了一种新的随机比特级混沌图像加密算法,该算法以拟议的超混沌图为置换和扩散的随机化源。通过在输入图像上附加一个额外的随机行和一个额外的随机列,可以对输入图像进行随机化处理。然后,通过依赖于随机图像的哈希值来关联超混沌映射的参数,来随机化整个排列和扩散过程。在置换步骤中,将随机图像分割成二进制图像,然后将每个二进制图像随机且独立地置换。然后,组合排列的二进制图像,并且将扩散应用于每个像素。设计了各种安全性实验来评估所提出的加密算法的性能,包括熵分析,直方图分析,密钥空间分析,像素级和位级相关性分析以及差分攻击以及密钥敏感性和随机化。分析。根据这些实验,与几种最新的图像加密算法相比,所提出的算法显示出出色的安全性能。此外,所提出的加密算法对于数据丢失和噪声攻击具有鲁棒性。最后,与几种最新算法相比,该算法的运行时间更短。差异攻击以及密钥敏感性和随机化分析。根据这些实验,与几种最新的图像加密算法相比,所提出的算法显示出出色的安全性能。此外,所提出的加密算法对于数据丢失和噪声攻击具有鲁棒性。最后,与几种最新算法相比,该算法的运行时间更短。差异攻击以及密钥敏感性和随机化分析。根据这些实验,与几种最新的图像加密算法相比,所提出的算法显示出出色的安全性能。此外,所提出的加密算法对于数据丢失和噪声攻击具有鲁棒性。最后,与几种最新算法相比,该算法的运行时间更短。

更新日期:2020-10-17
down
wechat
bug