Journal
CHAOS SOLITONS & FRACTALS
Volume 164, Issue -, Pages -Publisher
PERGAMON-ELSEVIER SCIENCE LTD
DOI: 10.1016/j.chaos.2022.112742
Keywords
Image encryption; Multi -parameter fractal matrix; MPMCML system; Synchronous permutation -diffusion
Categories
Funding
- Innovation Capacity Construction Project of Jilin Province Development and Reform Commission
- National Key Research and Development Program of China
- Fundamental Research Funds for the Central Universities
- [2019C053-3]
- [2021FGWCXNLJSSZ10]
- [2020YFA0714103]
Ask authors/readers for more resources
This study proposes a synchronous permutation-diffusion image encryption algorithm based on a multi-parameter fractal matrix, which achieves differentiation of encryption results through the sensitivity of the multi-parameter fractal matrix, greatly improving the security and resistance ability of the algorithm.
This paper studies chaotic image encryption technology and fractal matrix theory, and proposes a synchronous permutation-diffusion encryption algorithm based on multi-parameter fractal matrix. First, this paper proposes a new Multiple Parameter Mixed Coupled Map Lattices system (MPMCML). Then, the concept of fractal matrix is introduced, and the construction process of multi-parameter fractal matrix is given. Finally, based on the multi -parameter fractal matrix, a new synchronous permutation-diffusion image encryption algorithm is proposed. Most importantly, the multi-parameter fractal matrix is very sensitive to the change of parameters, any slight change of parameters will produce a completely different fractal matrix, making the encryption result completely different. Compared with the methods of permutation before diffusion and diffusion before permutation, the synchronous permutation-diffusion method greatly improves the privacy of permutation and diffusion, and improves the anti-attack ability of the algorithm. By analyzing the encryption performance and the ability to resist various attacks, it can be determined that the proposed algorithm exhibits good security characteristics.
Authors
I am an author on this paper
Click your name to claim this paper and add it to your profile.
Reviews
Recommended
No Data Available