4.7 Article

Fractal sorting matrix and its application on chaotic image encryption

Journal

INFORMATION SCIENCES
Volume 547, Issue -, Pages 1154-1169

Publisher

ELSEVIER SCIENCE INC
DOI: 10.1016/j.ins.2020.09.055

Keywords

Fractal sorting matrix; Global chaotic pixel diffusion; Chaotic image encryption; Self-similar

Funding

  1. National Natural Science Foundation of China [61672124]
  2. Password Theory Project of the 13th Five-Year Plan National Cryptography Development Fund [MMJJ20170203]
  3. Liaoning Province Science and Technology Innovation Leading Talents Program Project [XLYC1802013]
  4. Key R&D Projects of Liaoning Province [2019020105-JH2/103]
  5. Jinan City '20 Universities' Funding Projects Introducing Innovation Team Program [2019GXRC031]

Ask authors/readers for more resources

This article introduces a fractal sorting matrix (FSM) and a new global pixel diffusion method based on this matrix cluster for image encryption. Experimental results show that the algorithm is more efficient, secure, and demonstrates better resistance against various attacks compared to other methods.
This article creatively proposes a class of sorting matrices with fractal characteristics, named the fractal sorting matrix (FSM), and introduces its iterative calculation method. The FSM is irregular, self-similar and infinitely iterative. Notably, scrambling images or information based on this new cluster of matrices can effectively improve encryption algorithm security. Then, the article presents a new method of global pixel diffusion with two chaotic sequences, which offers good security and high encryption efficiency. Based on the FSM and global chaotic pixel diffusion, this paper constructs a more efficient and secure chaotic image encryption algorithm than other approaches. According to experimental comparison, the proposed algorithm is faster and has a higher pass rate associated with the local Shannon entropy. The data in the antidifferential attack test are closer to the theoretical values and smaller in data fluctuation, and the images obtained from the cropping and noise attacks are clearer. Therefore, the proposed algorithm shows better security and resistance to various attacks. (C) 2020 Elsevier Inc. All rights reserved.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available