4.6 Article

Secure image encryption scheme based on a new robust chaotic map and strong S-box

Journal

MATHEMATICS AND COMPUTERS IN SIMULATION
Volume 207, Issue -, Pages 322-346

Publisher

ELSEVIER
DOI: 10.1016/j.matcom.2022.12.025

Keywords

Image encryption; Chaos-based cryptography; Robust chaotic map; S-box

Ask authors/readers for more resources

This paper proposes a one-dimensional piece-wise quadratic polynomial chaotic map (PWQPCM) system and constructs a secure image encryption algorithm based on the system. The system has better chaotic characteristics and dynamic performance, suitable for cryptographic applications. The encryption algorithm combines pixel segmentation encryption, S-box substitution, and diffusion encryption methods, and has good performance and flexible adjustment of security strength. Simulation experiments and security analysis verify the excellent performance of the encryption system, demonstrating its potential for real-time image security communication.
Because the characteristics of chaotic systems are very consistent with the requirements of cryptosystem, chaotic systems are widely used in the encryption of big data, especially the chaos based image encryption is particularly feasible. In this paper, a one-dimensional (1D) piece-wise quadratic polynomial chaotic map (PWQPCM) is proposed to obtain a new system model with better chaotic characteristics. Compared with some existing 1D chaotic systems, the proposed PWQPCM system has better dynamic performance. In particular, it exhibits robust chaotic behavior over a larger continuous parameter range, which is more suitable for cryptographic applications. In addition, a strong S-box construction method and a secure image encryption algorithm based on PWQPCM model are proposed. In this encryption algorithm, a new method of pixel segmentation encryption, S-box substitution and diffusion encryption is combined. The cryptosystem proposed in this paper has the advantages of good performance against data loss, low time cost and flexible adjustment of security strength. Simulation experiments and security analysis verified the above good performance of the encryption system, showing its good application potential in real-time image security communication.(c) 2022 International Association for Mathematics and Computers in Simulation (IMACS). Published by Elsevier B.V. All rights reserved.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available