Computer Science ›› 2020, Vol. 47 ›› Issue (10): 327-331.doi: 10.11896/jsjkx.190800003

• Information Security • Previous Articles     Next Articles

Image Encryption Algorithm Based on Cyclic Shift and Multiple Chaotic Maps

TIAN Jun-feng1,2, PENG Jing-jing1, ZUO Xian-yu1,2,3, GE Qiang1,2,3, FAN Ming-hu1,2   

  1. 1 College of Computer and Information Engineering,Henan University,Kaifeng,Henan 475004,China
    2 Key Laboratory of Big Data Analysis and Processing of Henan Province,Henan University,Kaifeng,Henan 475004,China
    3 Institute of Data and Knowledge Engineering,Henan University,Kaifeng,Henan 475004,China
  • Received:2019-08-01 Revised:2019-10-20 Online:2020-10-15 Published:2020-10-16
  • About author:TIAN Jun-feng,born in 1980,Ph.D,lecturer.His main research interests include digital image processing and image encryption.
    FAN Ming-hu,born in 1974,Ph.D,lecturer.His main research interests include remote sensing image and information space processing.
  • Supported by:
    National Key Research and Development Program of China (2017YFD0301105),National Natural Science Foundation of China(U1604145,U1704122) and Special Research and Development and Promotion Project of Henan Province (182102210242,182102110065,192102210096)

Abstract: The encryption algorithm implemented by a single chaotic system has a simple structure and is easy to be attacked,using multiple chaotic systems to encrypt is an effective measure to improve the security of the encryption system.A new image encryption algorithm based on cyclic shift and multiple chaotic maps was proposed,and cyclic shift operation can change the va-lues of the pixels efficiently.First,using piece-wise linear chaotic map (PWLCM) and Logistic map to generate different chaotic sequences,generating index matrix and cyclic shift number according to the different chaotic sequences.Then,the plaintext image is replaced on the basis of index matrix.The left cyclic shift operation is performed on the replacement image in turn according to the cyclic shift number.Finally,the image after cyclic shift is scrambled and diffused by Logistic chaotic sequence and PWLCM chaotic sequence.Ultimately,an encrypted image is obtained.Tests and analyses of image histogram,information entropy,diffe-rential attack and correlation were carried out.Theoretical analysis and simulation results show that this algorithm has high secu-rity,a desirable ability to resist different kinds of attacks and can be used to implement an image encryption system.

Key words: Chaotic encryption, Cyclic shift, Image encryption, Index matrix, Multiple chaotic maps

CLC Number: 

  • TP391
[1]LIAN S,SUN J,WANG Z.A block cipher based on a suitable use of the chaotic standard map[J].Chaos Soliton Fract,2005,26(1):117-129.
[2]MATTHEWS R.On the derivation of chaotic encryption algorithm[J].Cryptologia,1989,13(1):29-42.
[3]CHAI X L,GAN Z H.New Bit-level Self-adaptive Color Image Encryption Algorithm Based on Hyperchaotic System[J].Computer Science,2016,43(4):134-139.
[4]CAI J,CHEN X,XIANG X D.Substitution permutation net-work structured image encryption algorithm based on chaotic map[J].Computer Science,2014,41(9):158-164.
[5]LIU L F,MIAO S X.A new image encryption algorithm based on logistic chaotic map with varying parameter[J].Springer Plus,2016,5(1):1-12.
[6]NASIR Q,ABDLRUDHA H H.High security nested PWLCM chaotic map bit-level permutation based image encryption[J].International Journal of Communications,Network and System Sciences,2012,5(9):548-556.
[7]XU L,LI Z,LI J,et al.A novel bit-level image encryption algorithm based on chaotic maps[J].Optics and Lasers inEnginee-ring,2016,78:17-25.
[8]LI C,LI S,KWOK-TUNG L.Breaking a modified substitution-diffusion image cipher based on chaotic standard and logistic maps[J].Commun.Nonlinear Sci.Numer.Simul.,2011,16:837-843.
[9]LI C.Cracking a hierarchical chaotic image encryption algorithm based on permutation[J].Signal Process,2016,118:203-210.
[10]WANG X Y,ZHU X Q,WU X J,et al.Image encryption algorithm based on multiple mixed hash functions and cyclic shift[J].Optics and Lasers in Engineering,2018,107:370-379.
[11]HUA Z Y,ZHOU Y C,PUN C M,et al.2D sine Logistic modulation map for image encryption[J].Information Sciences,2015,297(10):80-94.
[12]HUA Z Y,ZHOU Y C,HUANG H J.Cosine-transform-based chaotic system for image encryption[J].Information Sciences,2019,480:403-419.
[13]ZHU S Q,LI J Q,GE G Y.New image encryption algorithm Based on new four-dimensional discrete-time chaotic map[J].Computer Science,2017,44(1):188-193.
[14]XU B,SUN Y W,LI Y,et al.Improved Encryption Algorithm Based on High-dimension Chaotic System[J].Journal of Jilin University(Information Science Edition),2012,30(1):12-17.
[15]CHENG D S,TAN X,XU Z L,et al.Dimensional Hyper-chaotic System and Bit Decomposition[J].Journal of University of Electronic Science and Technology of China,2018,47(6):906-912.
[1] WANG Kun-shu, ZHANG Ze-hui, GAO Tie-gang. Reversible Hidden Algorithm for Remote Sensing Images Based on Hachimoji DNA and QR Decomposition [J]. Computer Science, 2022, 49(8): 127-135.
[2] ZHOU Lian-bing, ZHOU Xiang-zhen, CUI Xue-rong. Compressed Image Encryption Scheme Based on Dual Two Dimensional Chaotic Map [J]. Computer Science, 2022, 49(8): 344-349.
[3] ZHANG Sai-nan, LI Qian-mu. Color Image Encryption Algorithm Based on Logistic-Sine-Cosine Mapping [J]. Computer Science, 2022, 49(1): 353-358.
[4] BAN Duo-han, LV Xin, WANG Xin-yuan. Efficient Image Encryption Algorithm Based on 1D Chaotic Map [J]. Computer Science, 2020, 47(4): 278-284.
[5] YU Feng,GONG Xin-hui,WANG Shi-hong. Cryptanalysis of Medical Image Encryption Algorithm Using High-speed Scrambling and Pixel Adaptive Diffusion [J]. Computer Science, 2020, 47(2): 276-280.
[6] WANG Li-juan, LI Guo-dong, LV Dong-mei. Chaotic System Image Encryption Algorithm Based on Dynamic Parameter Control [J]. Computer Science, 2019, 46(11A): 469-472.
[7] HAN Xue-juan, LI Guo-dong, WANG Si-xiu. Cryptographic Algorithm Based on Combination of Logistic and Hyperchaos [J]. Computer Science, 2019, 46(11A): 477-482.
[8] ZHAO Fang-zheng, LI Cheng-hai, LIU Chen, SONG Ya-fei. Security Analysis and Optimization of Hyper-chaotic Color Image Encryption Algorithm [J]. Computer Science, 2019, 46(11A): 483-487.
[9] ZHU Shu-qin, WANG Wen-hong and LI Jun-qing. Chosen Plaintext Attack on Chaotic Image Encryption Algorithm Based on Perceptron Model [J]. Computer Science, 2018, 45(4): 178-181.
[10] WANG Le-le, LI Guo-dong. Double Chaotic Image Encryption Algorithm Based on Run-length Sequence [J]. Computer Science, 2018, 45(11A): 361-366.
[11] ZANG Rui, YU Yang. Composite Image Encryption Algorithm Based on Involutory Matrix [J]. Computer Science, 2018, 45(11A): 389-392.
[12] WANG Le-le, LI Guo-dong. Double Chaotic Image Encryption Algorithm Based on Fractional Transform [J]. Computer Science, 2018, 45(11A): 393-397.
[13] ZHU Shu-qin and LI Jun-qing. Image Encryption Scheme Based on Chaos with Parameter Perturbation [J]. Computer Science, 2017, 44(Z6): 356-360.
[14] ZHU Shu-qin, WANG Wen-hong and SUN Zhong-gui. Chosen Plaintext Attack on Image Encryption Algorithm Based on Bit Scrambling and Hyperchaos [J]. Computer Science, 2017, 44(11): 273-278.
[15] ZHU Shu-qin, LI Jun-qing and GE Guang-ying. New Image Encryption Algorithm Based on New Four-dimensional Discrete-time Chaotic Map [J]. Computer Science, 2017, 44(1): 188-193.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!