4.7 Article

Fast image encryption algorithm based on multi-parameter fractal matrix and MPMCML system

Journal

CHAOS SOLITONS & FRACTALS
Volume 164, Issue -, Pages -

Publisher

PERGAMON-ELSEVIER SCIENCE LTD
DOI: 10.1016/j.chaos.2022.112742

Keywords

Image encryption; Multi -parameter fractal matrix; MPMCML system; Synchronous permutation -diffusion

Funding

  1. Innovation Capacity Construction Project of Jilin Province Development and Reform Commission
  2. National Key Research and Development Program of China
  3. Fundamental Research Funds for the Central Universities
  4. [2019C053-3]
  5. [2021FGWCXNLJSSZ10]
  6. [2020YFA0714103]

Ask authors/readers for more resources

This study proposes a synchronous permutation-diffusion image encryption algorithm based on a multi-parameter fractal matrix, which achieves differentiation of encryption results through the sensitivity of the multi-parameter fractal matrix, greatly improving the security and resistance ability of the algorithm.
This paper studies chaotic image encryption technology and fractal matrix theory, and proposes a synchronous permutation-diffusion encryption algorithm based on multi-parameter fractal matrix. First, this paper proposes a new Multiple Parameter Mixed Coupled Map Lattices system (MPMCML). Then, the concept of fractal matrix is introduced, and the construction process of multi-parameter fractal matrix is given. Finally, based on the multi -parameter fractal matrix, a new synchronous permutation-diffusion image encryption algorithm is proposed. Most importantly, the multi-parameter fractal matrix is very sensitive to the change of parameters, any slight change of parameters will produce a completely different fractal matrix, making the encryption result completely different. Compared with the methods of permutation before diffusion and diffusion before permutation, the synchronous permutation-diffusion method greatly improves the privacy of permutation and diffusion, and improves the anti-attack ability of the algorithm. By analyzing the encryption performance and the ability to resist various attacks, it can be determined that the proposed algorithm exhibits good security characteristics.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available