4.7 Article

A New Full Chaos Coupled Mapping Lattice and Its Application in Privacy Image Encryption

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TCSI.2021.3133318

关键词

Lattices; Encryption; Heuristic algorithms; Chaos; Security; Orbits; Degradation; Image encryption; chaotic system; bit-level; edge detection; resistance to dynamic degradation

资金

  1. National Natural Science Foundation of China [61672124]
  2. Password Theory Project of the 13th Five-Year Plan National Cryptography Development Fund [MMJJ20170203]
  3. Liaoning Province Science and Technology Innovation Leading Talents Program [XLYC1802013]
  4. Key Research and Development Projects of Liaoning Province [2019020105-JH2/103]
  5. Jinan City 20 Universities Funding Projects Introducing Innovation Team Program [2019GXRC031]
  6. Research Fund of Guangxi Key Laboratory of Multi-Source Information Mining and Security [MIMS20-M-02]

向作者/读者索取更多资源

This paper presents a theoretical proof that chaotic systems resist dynamic degradation and introduces a novel system mixed coupled map lattice model (TWMCML) as a solution. The TWMCML evaluation shows its strong chaos characteristics, high sensitivity, broader parameter ranges, and wider chaos range, enhancing the security of chaotic sequences. By applying TWMCML to the encryption algorithm, a double protection of private images is achieved with enhanced resistance against conventional attacks.
Since chaotic cryptography has a long-term problem of dynamic degradation, this paper presents proof that chaotic systems resist dynamic degradation through theoretical analysis. Based on this proof, a novel one-dimensional two-parameter with a wide-range system mixed coupled map lattice model (TWMCML) is given. The evaluation of TWMCML shows that the system has the characteristics of strong chaos, high sensitivity, broader parameter ranges and wider chaos range, which helps to enhance the security of chaotic sequences. Based on the excellent performance of TWMCML, it is applied to the newly proposed encryption algorithm. The algorithm realizes double protection of private images under the premise of ensuring efficiency and safety. First, the important information of the image is extracted by edge detection technology. Then the important area is scrambled by the three-dimensional bit-level coupled XOR method. Finally, the global image is more fully confused by the dynamic index diffusion formula. The simulation experiment verified the effectiveness of the algorithm for grayscale and color images. Security tests show that the application of TWMCML makes the encryption algorithm have a better ability to overcome conventional attacks.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据