4.6 Article

A chaotic image encryption algorithm based on 3-D bit-plane permutation

期刊

NEURAL COMPUTING & APPLICATIONS
卷 31, 期 11, 页码 7111-7130

出版社

SPRINGER LONDON LTD
DOI: 10.1007/s00521-018-3541-y

关键词

Color image encryption; Chaos; Bit-plane permutation; Security analyses

资金

  1. National Natural Science Foundation of China [41571417, U1604145]
  2. National Science Foundation of the United States [CNS-1253424, ECCS-1202225]
  3. Science and Technology Foundation of Henan Province of China [182102210027, 182102210238]
  4. China Postdoctoral Science Foundation [2016M602235, 2015M582182]
  5. Research Foundation of Henan University [xxjc20140006]

向作者/读者索取更多资源

There are two shortcomings existing in the current color image encryption. One is that high correlation between R, G, B components of the original image may be neglected, the other is that the encryption has little relationship with the plain image, and then it is vulnerable to be broken. In order to solve these two problems and present secure and effective image encryption scheme, we introduce a novel chaos-based image encryption algorithm for color images based on three-dimensional (3-D) bit-plane permutation. In the proposed algorithm, the color plain image is firstly converted to 24 bit planes by RGB splitting and bit plane decomposition, next three-dimensional bit-plane permutation is performed on bit planes, position sequences for permutation are obtained from the 3D Chen chaotic system, and then the three confused components are gotten. Secondly, three key matrices are generated by a 1D chaotic system and a multilevel discretization method, and finally, the color cipher image is obtained by diffusing the confused components using key matrices. The SHA 256 hash function value of the plain image is obtained and combined with the given parameters to calculate the parameters and initial values of the chaotic system, so that the proposed scheme highly depends on the plain image and it may effectively withstand known-plaintext and chosen-plaintext attacks. Simulation results and security analyses demonstrate that our algorithm not only has good encryption effect, but can also resist against common attacks, so it is reliable to be applied for image secure communications.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据