4.7 Article

An efficient dual-layer cross-coupled chaotic map security-based multi-image encryption system

期刊

NONLINEAR DYNAMICS
卷 104, 期 3, 页码 2759-2805

出版社

SPRINGER
DOI: 10.1007/s11071-021-06409-z

关键词

Security; Multi-image encryption; Cross-coupling; Data hiding; Chaos; Hash algorithm

向作者/读者索取更多资源

This paper proposes an effective image encryption method using a two-layer cross-coupled chaotic map-based permutation-diffusion operation, which is more efficient and resistant to various common attacks compared to existing multi-image encryption algorithms.
This paper proposes an effective image encryption method to encrypt several images in one encryption process. The proposed encryption scheme differs from the current multiple image encryption schemes because of their two-layer cross-coupled chaotic map-based permutation-diffusion operation. Block-shuffling, left-right (L-R) flipping and then bit-XOR diffusion operations are carried out in the first layer using one set of cross-coupled chaotic map. Block-shuffling, up-down (U-D) flipping and then bit-XOR diffusion operations are performed with another set of cross-coupled chaotic maps in the second layer. The two different layers of permutation-diffusion make the proposed algorithm more efficient than the existing multi-image encryption algorithms. Moreover, the combination of block-based shuffling and flip operation decreases the algorithm's computational complexity, which means enhancing the time efficiency of the algorithm. In cross-coupling operation, the use of a single fixed-type one-dimensional chaotic map-piece-wise linear chaotic map (PWLCM) makes the algorithm efficient both in hardware and in software. PWLCM's initial values and system parameters (keys) are generated by means of the hash values of original images that resist the algorithm against the attacks of chosen-plaintext and known-plaintext. Results of simulation and comparative security analysis reveal that the suggested scheme is more effective in encryption and resists better against all widely used attacks.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据