Computer Science ›› 2022, Vol. 49 ›› Issue (1): 353-358.doi: 10.11896/jsjkx.201000041

• Information Security • Previous Articles    

Color Image Encryption Algorithm Based on Logistic-Sine-Cosine Mapping

ZHANG Sai-nan, LI Qian-mu   

  1. School of Computer Science and Engineering,Nanjing University of Science and Technology,Nanjing 210094,Chin
  • Received:2020-10-09 Revised:2021-01-21 Online:2022-01-15 Published:2022-01-18
  • About author:ZHANG Sai-nan,born in 1997,postgraduate.Her main research interests include image encryption and privacy protection.
    LI Qian-mu,born in 1979,Ph.D,professor,Ph.D supervisor.His main research interests include information security,computing system management,and data mining.
  • Supported by:
    National Key Research and Development Program(2020YFB1804604),2020 Industrial Internet Innovation Project of the Ministry of Industry and Information Technology and Jiangsu Province Key Research and Development Program(BE2016904).

Abstract: The rapid development of technology has brought convenience for shooting and sharing images.However,with the ra-pid increase of image data,security problems such as leakage and tampering have frequently occurred.The application of image encryption technology is imminent.Especially the encryption of color images is in urgent need of improvement and development.The traditional encryption technology is mainly for data stream encryption,which is low in efficiency and large in calculation,ha-ving certain limitations.Based on the transformation domain encryption,the image is transformed from the spatial domain to the frequency domain for encryption,and then transformed to the spatial domain,which is a lossy encryption.Encryption based on chaos has a large key space,simple implementation,and fast encryption speed.However,multiple chaotic systems are generally required to enhance the security of encryption.For this reason,a simple and secure spatial encryption algorithm for the RGB three-channel color image is designed in this paper.The Logistic-Sine-Cosine mapping generates safer chaotic sequences.These chaotic sequences are used for four rounds of scrambling and spreading pixels.After a series of security analysis experiments,the security and effectiveness of the color image encryption algorithm based on Logistic-Sine-Cosine mapping have been verified.

Key words: Image encryption, Logistic-Sine-Cosine mapping, RGB color image, Row column channel scrambling, Three-channel pixel

CLC Number: 

  • TP309.7
[1]ZHANG Q,DING Q.Digital Image Encryption Based on Ad-vanced Encryption Standard (AES)[C]//Proceedings of Fifth International Conference on Instrumentation and Measurement,Computer,Communication and Control (IMCCC).Qinhuang-dao:IEEE Press,2015:1218-1221.
[2]WEN C C,WANG Q,CHEN Q,et al.A new JPEG color image encryption algorithm[J].System Engineering and Electronic Technology,2012,34(6):1283-1287.
[3]WEN C C,WANG Q,MIAO X N,et al.Overview of DigitalImage Encryption[J].Computer Science,2012,39(12):6-9.
[4]TIAN J F,PENG J J,ZUO X Y,et al.Image Encryption Algorithm Based on Cyclic Shift and Multiple Chaotic Maps[J].Computer Science,2020,47(10):327-331.
[5]BAN D H,LV X,WANG X Y.Efficient Image Encryption Algo-rithm Based on 1D Chaotic Map[J].Computer Science,2020,47(4):278-284.
[6]FAN Y J,SUN X H,YAN X D,et al.An image scrambling encryption algorithm based on mixed chaotic sequence[J].Journal of Image and Graphics,2006(3):93-99.
[7]CHAI X,FU X,GAN Z,et al.A color image cryptosystem based on dynamic DNA encryption and chaos[J].Signal Processing,2019,155:44-62.
[8]HONG K,JUNG K.Partial Encryption of Digital ContentsUsing Face Detection Algorithm[C]//Proceedings of the 9th Pacific Rim International Conference on Artificial Intelligence.Berlin:Springer-Verlag,2006:632-640.
[9]JUAN M V O,JIMENEZ C J,CESAR O T M.Optical ImageEncryption System Using Several Tilted Planes[J].Photonics,2019,6(4):116.
[10]SHYU S J.Image encryption by random grids[J].Pattern Re-cognition,2007,40(3):1014-1031.
[11]SHYU S J.Image encryption by multiple random grids[J].Pattern Recognition,2009,42(7):1582-1596.
[12]WEN C C,WANG Q,HUANG F M,et al.Adaptive encryption algorithm for JPEG color images[J].Journal of Computer Aided Design and Graphics,2012,24(4):500-505.
[13]WEI X,GUO L,ZHANG Q,et al.A novel color image encryption algorithm based on DNA sequence operation and hyper-chao-tic system[J].Journal of Systems & Software,2014,85(2):290-299.
[14]PARVAZ R,ZAREBNIA M.A combination chaotic system and application in color image encryption[J].Optics & Laser Technology,2018,101:30-41.
[15]HUA Z,ZHOU Y,HUANG H.Cosine-transform-based chaotic system for image encryption[J].Information Sciences,2019,480:403-419.
[16]ALVAREZ G,LI S.Some basic cryptographic requirements for chaos-based cryptosystems[J].International Journal of Bifurcation and Chaos,2006,16(8):2129-2151.
[17]CASTRO J C H,SIERRA J M,SEZNEC A,et al.The strict ava-lanche criterion randomness test[J].Mathematics and Compu-ters in Simulation,2005,68(1):1-7.
[18]CHAI X,FU X,GAN Z,et al.A color image cryptosystem based on dynamic DNA encryption and chaos[J].Signal Processing,2019,155:44-62.
[19]REHMAN A U,LIAO X,ASHRAF R,et al.A color image encryption technique using exclusive-OR with DNA complementary rules based on chaos theory and SHA-2[J].Optik,2018,159:348-367.
[20]WANG X,ZHANG H,BAO X.Color image encryption scheme using CML and DNA sequence operations[J].Biosystems,2016,144:18-26.
[21]KADIR A,AILI M,SATTAR M.Color image encryptionscheme using coupled hyper chaotic system with multiple impulse injections[J].Optik,2017,129:231-238.
[1] ZHOU Lian-bing, ZHOU Xiang-zhen, CUI Xue-rong. Compressed Image Encryption Scheme Based on Dual Two Dimensional Chaotic Map [J]. Computer Science, 2022, 49(8): 344-349.
[2] BAN Duo-han, LV Xin, WANG Xin-yuan. Efficient Image Encryption Algorithm Based on 1D Chaotic Map [J]. Computer Science, 2020, 47(4): 278-284.
[3] YU Feng,GONG Xin-hui,WANG Shi-hong. Cryptanalysis of Medical Image Encryption Algorithm Using High-speed Scrambling and Pixel Adaptive Diffusion [J]. Computer Science, 2020, 47(2): 276-280.
[4] TIAN Jun-feng, PENG Jing-jing, ZUO Xian-yu, GE Qiang, FAN Ming-hu. Image Encryption Algorithm Based on Cyclic Shift and Multiple Chaotic Maps [J]. Computer Science, 2020, 47(10): 327-331.
[5] WANG Li-juan, LI Guo-dong, LV Dong-mei. Chaotic System Image Encryption Algorithm Based on Dynamic Parameter Control [J]. Computer Science, 2019, 46(11A): 469-472.
[6] HAN Xue-juan, LI Guo-dong, WANG Si-xiu. Cryptographic Algorithm Based on Combination of Logistic and Hyperchaos [J]. Computer Science, 2019, 46(11A): 477-482.
[7] ZHAO Fang-zheng, LI Cheng-hai, LIU Chen, SONG Ya-fei. Security Analysis and Optimization of Hyper-chaotic Color Image Encryption Algorithm [J]. Computer Science, 2019, 46(11A): 483-487.
[8] ZHU Shu-qin, WANG Wen-hong and LI Jun-qing. Chosen Plaintext Attack on Chaotic Image Encryption Algorithm Based on Perceptron Model [J]. Computer Science, 2018, 45(4): 178-181.
[9] WANG Le-le, LI Guo-dong. Double Chaotic Image Encryption Algorithm Based on Run-length Sequence [J]. Computer Science, 2018, 45(11A): 361-366.
[10] ZANG Rui, YU Yang. Composite Image Encryption Algorithm Based on Involutory Matrix [J]. Computer Science, 2018, 45(11A): 389-392.
[11] WANG Le-le, LI Guo-dong. Double Chaotic Image Encryption Algorithm Based on Fractional Transform [J]. Computer Science, 2018, 45(11A): 393-397.
[12] ZHU Shu-qin, WANG Wen-hong and SUN Zhong-gui. Chosen Plaintext Attack on Image Encryption Algorithm Based on Bit Scrambling and Hyperchaos [J]. Computer Science, 2017, 44(11): 273-278.
[13] ZHU Shu-qin, LI Jun-qing and GE Guang-ying. New Image Encryption Algorithm Based on New Four-dimensional Discrete-time Chaotic Map [J]. Computer Science, 2017, 44(1): 188-193.
[14] ZHU Shu-qin, LI Jun-qing and GE Guang-ying. Fast Image Encryption Algorithm Based on Novel Five Dimensional Discrete Chaos [J]. Computer Science, 2016, 43(Z11): 411-416.
[15] CHAI Hong-yu and ZANG Hong-yan. Image Encryption Scheme Based on Generalized Chaotic Synchronization Systems [J]. Computer Science, 2016, 43(8): 100-104.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!