4.7 Article

Cosine-transform-based chaotic system for image encryption

期刊

INFORMATION SCIENCES
卷 480, 期 -, 页码 403-419

出版社

ELSEVIER SCIENCE INC
DOI: 10.1016/j.ins.2018.12.048

关键词

Chaotic system; Chaos-based encryption; Cryptography; Image privacy; Image encryption; Security analysis

资金

  1. National Key Research and Development Program of China [2018YFB1003800, 2018YFB1003805, 2016YFB0800804]
  2. Shenzhen Science and Technology Program [JCYJ20170307150704051, JCYJ20170811160212033]
  3. National Natural Science Foundation of China [61701137]
  4. Macau Science and Technology Development Fund [FDCT/189/2017/A3]
  5. Research Committee at the University of Macau [MYRG2016-00123-FST, MYRG2018-00136-FST]

向作者/读者索取更多资源

Chaos is known as a natural candidate for cryptography applications owing to its properties such as unpredictability and initial state sensitivity. However, certain chaos-based cryptosystems have been proven to exhibit various security defects because their used chaotic maps do not have complex dynamical behaviors. To address this problem, this paper introduces a cosine-transform-based chaotic system (CTBCS). Using two chaotic maps as seed maps, the CTBCS can produce chaotic maps with complex dynamical behaviors. For illustration, we produce three chaotic maps using the CTBCS and analyze their chaos complexity. Using one of the generated chaotic maps, we further propose an image encryption scheme. The encryption scheme uses high-efficiency scrambling to separate adjacent pixels and employs random order substitution to spread a small change in the plain-image to all pixels of the cipher-image. The performance evaluation demonstrates that the chaotic maps generated by the CTBCS exhibit substantially more complicated chaotic behaviors than the existing ones. The simulation results indicate the reliability of the proposed image encryption scheme. Moreover, the security analysis demonstrates that the proposed image encryption scheme provides a higher level of security than several advanced image encryption schemes. (C) 2018 The Authors. Published by Elsevier Inc.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据