New Image Encryption Scheme Using Chaotic Maps

M. Khan
{"title":"New Image Encryption Scheme Using Chaotic Maps","authors":"M. Khan","doi":"10.1145/3387168.3389111","DOIUrl":null,"url":null,"abstract":"Data on the Internet is always vulnerable to different types of attacks due to the public nature of the Internet, which is the only source of communication all over the world. To protect sensitive information, many encryption techniques like Gingerbreadman chaotic map and S8 permutation-based image encryption scheme are proposed. However, due to security issues in these techniques, 3D Logistic map based confusion and diffusion processes are employed which solve those security problems.3D Logistic map was used to eliminate the strong correlation between the plain text image pixels. A random matrix is created in the diffusion stage via a 3D Logistic map and XORed with the scrambled image. The final ciphertext image is extracted using existing Gingerbread-man chaotic map based S-Box. The proposed scheme is analyzed experimentally and statistically using key space analysis, information entropy analysis, and differential analysis. Results are also validated via the Number of Pixel Rate Change (NPRC) to ensure the security and robustness of the proposed scheme.","PeriodicalId":346739,"journal":{"name":"Proceedings of the 3rd International Conference on Vision, Image and Signal Processing","volume":"34 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 3rd International Conference on Vision, Image and Signal Processing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3387168.3389111","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

Data on the Internet is always vulnerable to different types of attacks due to the public nature of the Internet, which is the only source of communication all over the world. To protect sensitive information, many encryption techniques like Gingerbreadman chaotic map and S8 permutation-based image encryption scheme are proposed. However, due to security issues in these techniques, 3D Logistic map based confusion and diffusion processes are employed which solve those security problems.3D Logistic map was used to eliminate the strong correlation between the plain text image pixels. A random matrix is created in the diffusion stage via a 3D Logistic map and XORed with the scrambled image. The final ciphertext image is extracted using existing Gingerbread-man chaotic map based S-Box. The proposed scheme is analyzed experimentally and statistically using key space analysis, information entropy analysis, and differential analysis. Results are also validated via the Number of Pixel Rate Change (NPRC) to ensure the security and robustness of the proposed scheme.
基于混沌映射的新图像加密方案
互联网是世界上唯一的通信来源,由于互联网的公共性质,互联网上的数据总是容易受到不同类型的攻击。为了保护敏感信息,人们提出了许多加密技术,如Gingerbreadman混沌映射和基于S8排列的图像加密方案。然而,由于这些技术存在安全问题,采用了基于混沌和扩散过程的三维物流图来解决这些安全问题。采用三维Logistic图消除纯文本图像像素之间的强相关性。在扩散阶段通过三维逻辑映射创建一个随机矩阵,并与打乱后的图像进行xor。利用现有的基于姜饼人混沌图的S-Box提取最终的密文图像。利用键空间分析、信息熵分析和差分分析对该方案进行了实验和统计分析。结果还通过像素率变化数(NPRC)进行验证,以确保所提方案的安全性和鲁棒性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信