期刊
INFORMATION SCIENCES
卷 544, 期 -, 页码 1-24出版社
ELSEVIER SCIENCE INC
DOI: 10.1016/j.ins.2020.07.051
关键词
CCML; Chaotic performance; Bit-level image encryption; Confusion; Diffusion
资金
- National Natural Science Foundation of China [61672124]
- Password Theory Project of the 13th Five-Year Plan National Cryptography Development Fund [MMJJ20170203]
- Liaoning Province Science and Technology Innovation Leading Talents Program Project [XLYC1802013]
- Key R&D Projects of Liaoning Province [2019020105-JH2/103]
- Jinan City `20 universities' Funding Projects Introducing Innovation Team Program [2019GXRC031]
- Research Project of Chongqing Normal University [17XLB001, 16XYY21]
This paper proposes an improved chaotic map lattice model with wider chaotic regions and higher information entropy suitable for image encryption, achieved through changes in internal chaotic map and module operations. Experimental and theoretical analysis demonstrate the effectiveness of the proposed model.
In this paper, an improved cross coupled map lattice (CCML) which is derived from CCML is proposed. The experimental analysis of CCML shows that it exhibits weak or even lose chaotic behaviors in a large range of parameters. To enhance its chaotic performance, the new model changes the internal chaotic map of CCML from the logistics map to the tent map and introduces the module operations to limit the obtained value. The theoretical analysis and experimental results prove that the proposed model has a broad chaotic regime over an extensive range of system parameters, positive Lyapunov exponents, higher information entropies and lower mutual information values when compared to CCML, which are highly suitable for chaos-based image encryption. Moreover, this paper applies that model on a bit-level image encryption scheme. The algorithm consists of three main operations: the generation of secret keys, confusion and diffusion operations that can break the limitation of row and column. To confirm the novel algorithm's effectiveness and safety against the common types of attacks, many experiments are done and security analyses are discussed. It demonstrates the good chaos of the proposed model from the aspect of encryption performance. (C) 2020 Elsevier Inc. All rights reserved.
作者
我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。
推荐
暂无数据