4.7 Article

A novel devaney chaotic map with uniform trajectory for color image encryption

Journal

APPLIED MATHEMATICAL MODELLING
Volume 120, Issue -, Pages 153-174

Publisher

ELSEVIER SCIENCE INC
DOI: 10.1016/j.apm.2023.03.038

Keywords

Devaney chaos; Uniform; Image encryption; Security analysis

Ask authors/readers for more resources

This paper proposes a novel Devaney chaotic map with uniform trajectories to solve the problems of weak chaotic behaviors and uneven trajectory distribution in existing systems. The chaotic map possesses the three principal features of the Devaney definition and preserves uniform trajectory distribution. Simulation experiments show that the proposed algorithm has advantages in efficiency and security. A color image encryption algorithm is designed using the Devaney chaotic map, improving the confusion and diffusion structure of existing algorithms. The algorithm demonstrates excellent ability to resist probabilistic attacks and differential attacks, avoiding decryption failure caused by tampering with the hash value during transmission.
The design of chaotic image encryption algorithms has become a hotspot. This paper first proposes a novel Devaney chaotic map with uniform trajectories to overcome the problems of weak chaotic behaviors and uneven trajectory distribution of the existing chaotic systems. We prove that our chaotic map possesses the three principal features of the Devaney definition and preserves uniform trajectory distribution through symbolic dynamics and the probability theory. In addition, simulation experiments show that our chaotic map has the advantages of fast efficiency and high security. Then, we design a color image encryption algorithm, which uses our Devaney chaotic map to generate digital chaotic pseudo-random sequences, and improves the confusion and diffusion structure of existing image encryption algorithms from the perspectives of pixels and planes. Although our algorithm does not use the hash value of plain images, it achieves excellent diffusion and confusion ability. Therefore, it avoids the failure of decryption caused by the tampering of hash value in the transmission process. Experimental results show that our image encryption algorithm can well resist probabilistic attacks and differential attacks.(c) 2023 Elsevier Inc. All rights reserved.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available