4.7 Article

A novel devaney chaotic map with uniform trajectory for color image encryption

期刊

APPLIED MATHEMATICAL MODELLING
卷 120, 期 -, 页码 153-174

出版社

ELSEVIER SCIENCE INC
DOI: 10.1016/j.apm.2023.03.038

关键词

Devaney chaos; Uniform; Image encryption; Security analysis

向作者/读者索取更多资源

This paper proposes a novel Devaney chaotic map with uniform trajectories to solve the problems of weak chaotic behaviors and uneven trajectory distribution in existing systems. The chaotic map possesses the three principal features of the Devaney definition and preserves uniform trajectory distribution. Simulation experiments show that the proposed algorithm has advantages in efficiency and security. A color image encryption algorithm is designed using the Devaney chaotic map, improving the confusion and diffusion structure of existing algorithms. The algorithm demonstrates excellent ability to resist probabilistic attacks and differential attacks, avoiding decryption failure caused by tampering with the hash value during transmission.
The design of chaotic image encryption algorithms has become a hotspot. This paper first proposes a novel Devaney chaotic map with uniform trajectories to overcome the problems of weak chaotic behaviors and uneven trajectory distribution of the existing chaotic systems. We prove that our chaotic map possesses the three principal features of the Devaney definition and preserves uniform trajectory distribution through symbolic dynamics and the probability theory. In addition, simulation experiments show that our chaotic map has the advantages of fast efficiency and high security. Then, we design a color image encryption algorithm, which uses our Devaney chaotic map to generate digital chaotic pseudo-random sequences, and improves the confusion and diffusion structure of existing image encryption algorithms from the perspectives of pixels and planes. Although our algorithm does not use the hash value of plain images, it achieves excellent diffusion and confusion ability. Therefore, it avoids the failure of decryption caused by the tampering of hash value in the transmission process. Experimental results show that our image encryption algorithm can well resist probabilistic attacks and differential attacks.(c) 2023 Elsevier Inc. All rights reserved.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据