3.8 Article

A New Chaotic Image Encryption Algorithm Based on L-Shaped Method of Dynamic Block

期刊

SENSING AND IMAGING
卷 22, 期 1, 页码 -

出版社

SPRINGER
DOI: 10.1007/s11220-021-00357-z

关键词

Chaotic system; Image encryption; L-shaped scrambling; Dynamic diffusion

资金

  1. National Natural Science Foundation of China [61672124]
  2. Password Theory Project of the 13th Five-Year Plan National Cryptography Development Fund [MMJJ20170203]
  3. Liaoning Province Science and Technology Innovation Leading Talents Program Project [XLYC1802013]
  4. Key R&D Projects of Liaoning Province [2019020105-JH2/103]
  5. Jinan City '20 universities' Funding Projects Introducing Innovation Team Program [2019GXRC031]

向作者/读者索取更多资源

This paper proposes a new L-shaped method based on dynamic block, combined with one-dimensional and two-dimensional chaotic systems, for image scrambling and diffusion. Experimental results show that the algorithm has good encryption effect, high security, and can resist various attacks.
This paper proposes a new L-shaped method based on dynamic block, and combines it with one-dimensional chaotic system (Logistic map) and two-dimensional chaotic system (2D Logistic-adjusted-Sine map, 2D-LASM system) to generate chaotic sequence for image scrambling and diffusion. Firstly, the index of chaotic sequence is used to change the original position of image pixels value. Secondly, the image is dynamically divided into blocks according to the key, and scrambled within and between blocks. Each block is scrambled with L-shaped and Fisher-Yates method. Thirdly, in the diffusion stage, the pixel values are initially diffused at the bit-level based on the L-shaped method. Finally, four XOR diffusion formulas are designed, which are highly related to plaintext, and can be selected dynamically according to chaotic sequences. The image encryption algorithm is tested on grayscale image and color image respectively. The experimental results and security analysis show that the algorithm has good encryption effect, high security and can resist various attacks.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

3.8
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据