3.8 Article

A New Chaotic Image Encryption Algorithm Based on L-Shaped Method of Dynamic Block

Journal

SENSING AND IMAGING
Volume 22, Issue 1, Pages -

Publisher

SPRINGER
DOI: 10.1007/s11220-021-00357-z

Keywords

Chaotic system; Image encryption; L-shaped scrambling; Dynamic diffusion

Funding

  1. National Natural Science Foundation of China [61672124]
  2. Password Theory Project of the 13th Five-Year Plan National Cryptography Development Fund [MMJJ20170203]
  3. Liaoning Province Science and Technology Innovation Leading Talents Program Project [XLYC1802013]
  4. Key R&D Projects of Liaoning Province [2019020105-JH2/103]
  5. Jinan City '20 universities' Funding Projects Introducing Innovation Team Program [2019GXRC031]

Ask authors/readers for more resources

This paper proposes a new L-shaped method based on dynamic block, combined with one-dimensional and two-dimensional chaotic systems, for image scrambling and diffusion. Experimental results show that the algorithm has good encryption effect, high security, and can resist various attacks.
This paper proposes a new L-shaped method based on dynamic block, and combines it with one-dimensional chaotic system (Logistic map) and two-dimensional chaotic system (2D Logistic-adjusted-Sine map, 2D-LASM system) to generate chaotic sequence for image scrambling and diffusion. Firstly, the index of chaotic sequence is used to change the original position of image pixels value. Secondly, the image is dynamically divided into blocks according to the key, and scrambled within and between blocks. Each block is scrambled with L-shaped and Fisher-Yates method. Thirdly, in the diffusion stage, the pixel values are initially diffused at the bit-level based on the L-shaped method. Finally, four XOR diffusion formulas are designed, which are highly related to plaintext, and can be selected dynamically according to chaotic sequences. The image encryption algorithm is tested on grayscale image and color image respectively. The experimental results and security analysis show that the algorithm has good encryption effect, high security and can resist various attacks.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

3.8
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available