4.6 Article

Hyper-chaotic image encryption system based on N+2 ring Joseph algorithm and reversible cellular automata

期刊

出版社

SPRINGER
DOI: 10.1007/s11042-023-15119-0

关键词

Image encryption; N+2 ring Joseph algorithm; Hyper-chaotic system; Reversible cellular automata

向作者/读者索取更多资源

This paper proposes a hyperchaotic image encryption system based on the improved Joseph algorithm and reversible cellular automata. The encryption algorithm is highly sensitive to the original image and effectively hides pixel information, increasing the encryption performance and resistance against attacks. Simulation experiments and safety analysis demonstrate the algorithm's effectiveness in resisting various attacks.
Due to the complex characteristics of chaotic system, such as initial value sensitivity, periodicity and pseudo-randomness, chaotic sequences generated by chaotic system is very suitable for image data encryption after appropriate processing. This paper focuses on chaotic image encryption based on the improved Joseph algorithm, and proposes a hyperchaotic image encryption system based on N + 2 ring Joseph algorithm and reversible cellular automata. The initial value of the chaotic system is generated by the SHA-512 hash value of the original image, which makes the proposed encryption algorithm highly sensitive to the original image. In addition, the proposed N + 2 ring Joseph algorithm is formed by N chaotic sequences rolling forward like gears when scrambling each pixel position of the image. It greatly hides the pixel information of the original text, and increases the scrambling effect and the difficulty of being cracked. Furthermore, in the diffusion stage, we add the reversible cellular automata technology. On the basis of image shuffling, each pixel is further associated with other pixels, so that small changes of in pixel values can produce an avalanche effect. Finally, we conducted simulation experiments and safety analysis. The results illustrate that the encryption algorithm proposed in this paper has good encryption performance, and can effectively resist statistical attacks, differential attacks, known plaintext attacks, ciphertext only attacks, select plaintext attacks and select ciphertext attacks. In conclusion, it is a practical and secure image encryption algorithm.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据