4.6 Article

Hyper-chaotic image encryption system based on N+2 ring Joseph algorithm and reversible cellular automata

Journal

MULTIMEDIA TOOLS AND APPLICATIONS
Volume -, Issue -, Pages -

Publisher

SPRINGER
DOI: 10.1007/s11042-023-15119-0

Keywords

Image encryption; N+2 ring Joseph algorithm; Hyper-chaotic system; Reversible cellular automata

Ask authors/readers for more resources

This paper proposes a hyperchaotic image encryption system based on the improved Joseph algorithm and reversible cellular automata. The encryption algorithm is highly sensitive to the original image and effectively hides pixel information, increasing the encryption performance and resistance against attacks. Simulation experiments and safety analysis demonstrate the algorithm's effectiveness in resisting various attacks.
Due to the complex characteristics of chaotic system, such as initial value sensitivity, periodicity and pseudo-randomness, chaotic sequences generated by chaotic system is very suitable for image data encryption after appropriate processing. This paper focuses on chaotic image encryption based on the improved Joseph algorithm, and proposes a hyperchaotic image encryption system based on N + 2 ring Joseph algorithm and reversible cellular automata. The initial value of the chaotic system is generated by the SHA-512 hash value of the original image, which makes the proposed encryption algorithm highly sensitive to the original image. In addition, the proposed N + 2 ring Joseph algorithm is formed by N chaotic sequences rolling forward like gears when scrambling each pixel position of the image. It greatly hides the pixel information of the original text, and increases the scrambling effect and the difficulty of being cracked. Furthermore, in the diffusion stage, we add the reversible cellular automata technology. On the basis of image shuffling, each pixel is further associated with other pixels, so that small changes of in pixel values can produce an avalanche effect. Finally, we conducted simulation experiments and safety analysis. The results illustrate that the encryption algorithm proposed in this paper has good encryption performance, and can effectively resist statistical attacks, differential attacks, known plaintext attacks, ciphertext only attacks, select plaintext attacks and select ciphertext attacks. In conclusion, it is a practical and secure image encryption algorithm.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available