4.7 Article

A New Full Chaos Coupled Mapping Lattice and Its Application in Privacy Image Encryption

Journal

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TCSI.2021.3133318

Keywords

Lattices; Encryption; Heuristic algorithms; Chaos; Security; Orbits; Degradation; Image encryption; chaotic system; bit-level; edge detection; resistance to dynamic degradation

Funding

  1. National Natural Science Foundation of China [61672124]
  2. Password Theory Project of the 13th Five-Year Plan National Cryptography Development Fund [MMJJ20170203]
  3. Liaoning Province Science and Technology Innovation Leading Talents Program [XLYC1802013]
  4. Key Research and Development Projects of Liaoning Province [2019020105-JH2/103]
  5. Jinan City 20 Universities Funding Projects Introducing Innovation Team Program [2019GXRC031]
  6. Research Fund of Guangxi Key Laboratory of Multi-Source Information Mining and Security [MIMS20-M-02]

Ask authors/readers for more resources

This paper presents a theoretical proof that chaotic systems resist dynamic degradation and introduces a novel system mixed coupled map lattice model (TWMCML) as a solution. The TWMCML evaluation shows its strong chaos characteristics, high sensitivity, broader parameter ranges, and wider chaos range, enhancing the security of chaotic sequences. By applying TWMCML to the encryption algorithm, a double protection of private images is achieved with enhanced resistance against conventional attacks.
Since chaotic cryptography has a long-term problem of dynamic degradation, this paper presents proof that chaotic systems resist dynamic degradation through theoretical analysis. Based on this proof, a novel one-dimensional two-parameter with a wide-range system mixed coupled map lattice model (TWMCML) is given. The evaluation of TWMCML shows that the system has the characteristics of strong chaos, high sensitivity, broader parameter ranges and wider chaos range, which helps to enhance the security of chaotic sequences. Based on the excellent performance of TWMCML, it is applied to the newly proposed encryption algorithm. The algorithm realizes double protection of private images under the premise of ensuring efficiency and safety. First, the important information of the image is extracted by edge detection technology. Then the important area is scrambled by the three-dimensional bit-level coupled XOR method. Finally, the global image is more fully confused by the dynamic index diffusion formula. The simulation experiment verified the effectiveness of the algorithm for grayscale and color images. Security tests show that the application of TWMCML makes the encryption algorithm have a better ability to overcome conventional attacks.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available