{"title":"A New Image Encryption Scheme Based on Hyperchaotic System and SHA-2","authors":"K. Wong, W. Yap, B. Goi, D. C. Wong","doi":"10.1145/3529570.3529594","DOIUrl":null,"url":null,"abstract":"This paper presents a new image encryption scheme by using a four-dimensional hyperchaotic system and adopting permutation-diffusion architecture. The initial conditions of the hyperchaotic system are modified by the 256-bit digest of the plain image to increase the sensitivity of the cipher to the plain image. An enhanced nonlinear equation is applied in the diffusion process for the better encryption result. The experiment results show that the proposed scheme has large key and subkey space, high key sensitivity, good information entropy, and capability to resist statistical and differential attacks.","PeriodicalId":430367,"journal":{"name":"Proceedings of the 6th International Conference on Digital Signal Processing","volume":"43 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 6th International Conference on Digital Signal Processing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3529570.3529594","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
This paper presents a new image encryption scheme by using a four-dimensional hyperchaotic system and adopting permutation-diffusion architecture. The initial conditions of the hyperchaotic system are modified by the 256-bit digest of the plain image to increase the sensitivity of the cipher to the plain image. An enhanced nonlinear equation is applied in the diffusion process for the better encryption result. The experiment results show that the proposed scheme has large key and subkey space, high key sensitivity, good information entropy, and capability to resist statistical and differential attacks.