{"title":"Analysis of Lorenz-chaos and exclusive-OR based image encryption scheme","authors":"I. Saini, Phool Singh, A. K. Yadav","doi":"10.1504/IJSCCPS.2017.10009739","DOIUrl":null,"url":null,"abstract":"In this paper, analysis of Lorenz-chaos and exclusive-OR based image encryption scheme has been presented. The Lorenz system is used in shuffling the positions of image pixels in the spatial-domain and gray values of pixels are altered with exclusive-OR operation. The encryption scheme has been validated for grayscale images using MATLAB 7.14 and is sensitive to the encryption parameters of the Lorenz system. The experimental results establish that the key-space is large enough to resist brute-force attack, and demonstrate the scheme's resistance to noise and occlusion attacks. Statistical and correlation analysis of adjacent pixels are also performed.","PeriodicalId":220482,"journal":{"name":"Int. J. Soc. Comput. Cyber Phys. Syst.","volume":"20 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"14","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Int. J. Soc. Comput. Cyber Phys. Syst.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1504/IJSCCPS.2017.10009739","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 14
Abstract
In this paper, analysis of Lorenz-chaos and exclusive-OR based image encryption scheme has been presented. The Lorenz system is used in shuffling the positions of image pixels in the spatial-domain and gray values of pixels are altered with exclusive-OR operation. The encryption scheme has been validated for grayscale images using MATLAB 7.14 and is sensitive to the encryption parameters of the Lorenz system. The experimental results establish that the key-space is large enough to resist brute-force attack, and demonstrate the scheme's resistance to noise and occlusion attacks. Statistical and correlation analysis of adjacent pixels are also performed.