4.7 Article

Spatiotemporal chaos in improved cross coupled map lattice and its application in a bit-level image encryption scheme

期刊

INFORMATION SCIENCES
卷 544, 期 -, 页码 1-24

出版社

ELSEVIER SCIENCE INC
DOI: 10.1016/j.ins.2020.07.051

关键词

CCML; Chaotic performance; Bit-level image encryption; Confusion; Diffusion

资金

  1. National Natural Science Foundation of China [61672124]
  2. Password Theory Project of the 13th Five-Year Plan National Cryptography Development Fund [MMJJ20170203]
  3. Liaoning Province Science and Technology Innovation Leading Talents Program Project [XLYC1802013]
  4. Key R&D Projects of Liaoning Province [2019020105-JH2/103]
  5. Jinan City `20 universities' Funding Projects Introducing Innovation Team Program [2019GXRC031]
  6. Research Project of Chongqing Normal University [17XLB001, 16XYY21]

向作者/读者索取更多资源

This paper proposes an improved chaotic map lattice model with wider chaotic regions and higher information entropy suitable for image encryption, achieved through changes in internal chaotic map and module operations. Experimental and theoretical analysis demonstrate the effectiveness of the proposed model.
In this paper, an improved cross coupled map lattice (CCML) which is derived from CCML is proposed. The experimental analysis of CCML shows that it exhibits weak or even lose chaotic behaviors in a large range of parameters. To enhance its chaotic performance, the new model changes the internal chaotic map of CCML from the logistics map to the tent map and introduces the module operations to limit the obtained value. The theoretical analysis and experimental results prove that the proposed model has a broad chaotic regime over an extensive range of system parameters, positive Lyapunov exponents, higher information entropies and lower mutual information values when compared to CCML, which are highly suitable for chaos-based image encryption. Moreover, this paper applies that model on a bit-level image encryption scheme. The algorithm consists of three main operations: the generation of secret keys, confusion and diffusion operations that can break the limitation of row and column. To confirm the novel algorithm's effectiveness and safety against the common types of attacks, many experiments are done and security analyses are discussed. It demonstrates the good chaos of the proposed model from the aspect of encryption performance. (C) 2020 Elsevier Inc. All rights reserved.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据