4.6 Article

A New Color Image Encryption Scheme Using CML and a Fractional-Order Chaotic System

期刊

PLOS ONE
卷 10, 期 3, 页码 -

出版社

PUBLIC LIBRARY SCIENCE
DOI: 10.1371/journal.pone.0119660

关键词

-

资金

  1. National Natural Science Foundation of China [61004006]
  2. China Postdoctoral Science Foundation [2013M530181]
  3. Natural Science Foundation of Henan Province, China [13230010254]
  4. Program for Science & Technology Innovation Talents in Universities of Henan Province, China [14HASTIT042]
  5. Foundation for University Young Key Teacher Program of Henan Province, China [2011GGJS-025]
  6. Shanghai Postdoctoral Scientific Program [13R21410600]
  7. Science & Technology Project Plan of Archives Bureau of Henan Province [2012-X-62]
  8. Natural Science Foundation of Educational Committee of Henan Province, China [13A520082]

向作者/读者索取更多资源

The chaos-based image cryptosystems have been widely investigated in recent years to provide real-time encryption and transmission. In this paper, a novel color image encryption algorithm by using coupled-map lattices (CML) and a fractional-order chaotic system is proposed to enhance the security and robustness of the encryption algorithms with a permutation-diffusion structure. To make the encryption procedure more confusing and complex, an image division-shuffling process is put forward, where the plain-image is first divided into four sub-images, and then the position of the pixels in the whole image is shuffled. In order to generate initial conditions and parameters of two chaotic systems, a 280-bit long external secret key is employed. The key space analysis, various statistical analysis, information entropy analysis, differential analysis and key sensitivity analysis are introduced to test the security of the new image encryption algorithm. The cryptosystem speed is analyzed and tested as well. Experimental results confirm that, in comparison to other image encryption schemes, the new algorithm has higher security and is fast for practical image encryption. Moreover, an extensive tolerance analysis of some common image processing operations such as noise adding, cropping, JPEG compression, rotation, brightening and darkening, has been performed on the proposed image encryption technique. Corresponding results reveal that the proposed image encryption method has good robustness against some image processing operations and geometric attacks.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据