期刊
MULTIMEDIA TOOLS AND APPLICATIONS
卷 81, 期 22, 页码 32005-32031出版社
SPRINGER
DOI: 10.1007/s11042-022-12853-9
关键词
Spherical chaotic systems; Dynamical properties; Image encryption; DCT transform; Security
类别
资金
- Natural Science Foundation of Guangxi province
- Guilin University of Electronic Technology Fund [C21YJM00QX99]
- Innovation Project of GUET Graduate Education [2021YCXS119, 2022YCX139]
- Data Analysis and Computing Laboratory of Guangxi University Key Laboratory
This paper proposes an image encryption algorithm based on multi-attractor coexistence-spherical chaotic systems. By analyzing the dynamics of the spherical chaotic system, the algorithm ensures the generation of a high complexity mask block with optimal parameters. Experimental results and security analyses demonstrate that the algorithm has a large key space, can effectively resist various attacks, and has good encryption effect and efficiency.
In recent years, chaotic systems have been widely used in several engineering fields. In this paper, an image encryption algorithm for multi-attractor coexistence-spherical chaotic systems is proposed. Various dynamics of the spherical chaotic system are analyzed in detail to ensure that the system can produce a high complexity mask block with optimal parameters. The encryption algorithm consists of three main phases, image reconstruction, confusion and diffusion. In the reconstruction phase, the two-dimensional (2D) discrete cosine transform (DCT) is used to compress and reconstruct the image efficiently and eliminate image redundancy. In the obfuscation phase, use Logistic map to shuffle the image pixels of arbitrary size. In the diffusion stage, a mask sequence with high complexity is randomly selected based on the image information and the encryption date, and the scrambled image is subjected to add-and-take mode and cyclic shift diffusion operations. The experimental results and several security analyses show that the algorithm has a large enough key space. The ciphertext adjacent pixel correlation is almost zero. The number of pixel change rate (NPCR) is 99.6123% and the uniform average change intensity (UACI) is 33.4638%, which basically close to the theoretical values. The encryption speed is 30.327 ms and execution time is 69.151Mbps. The key sensitivity is strong, and the algorithm can effectively resist known plaintext and selective plaintext attacks, as well as shear and noise attacks. The encryption scheme has good encryption effect in terms of security and efficiency, and is very suitable for practical application.
作者
我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。
推荐
暂无数据