Bit level image encryption algorithm based on hyperchaotic system

Zhenlong Man, Yue Zhang, Ying Zhou, Xiaoli Lu, Zhaoquan Wang

Optoelectronics Letters ›› 2023, Vol. 19 ›› Issue (3) : 186-192.

Optoelectronics Letters ›› 2023, Vol. 19 ›› Issue (3) : 186-192. DOI: 10.1007/s11801-023-2161-7
Article

Bit level image encryption algorithm based on hyperchaotic system

Author information +
History +

Abstract

Because chaotic systems are unpredictable, ergodic and sensitive to initial values and parameters, they are often used in the field of encryption. To avoid the bad randomness of the random key generated by the low dimensional chaotic map system, a 5-dimensional multi-wing hyperchaotic system is adopted in this paper. The key stream generated by the chaotic system is related to the plaintext image. So it can effectively resist the attacks of selecting plaintext. The plaintext graph is decomposed into binary form by bit plane decomposition technique, and then these bit planes are divided into high and low groups. The designed control matrix is used to identify the specific scrambling mode, and each bit is permuted within and between groups. Finally, bit diffusion is used to change the pixel value of each pixel. Theoretical analysis and numerical simulation show that the algorithm has good encryption performance for image encryption.

Cite this article

Download citation ▾
Zhenlong Man, Yue Zhang, Ying Zhou, Xiaoli Lu, Zhaoquan Wang. Bit level image encryption algorithm based on hyperchaotic system. Optoelectronics Letters, 2023, 19(3): 186‒192 https://doi.org/10.1007/s11801-023-2161-7

References

[1]
WangJ, LiJ, DiX, et al.. Image encryption algorithm based on bit-level permutation and dynamic overlap diffusion[J]. IEEE access, 2020, 8: 160004-160024
CrossRef Google scholar
[2]
LiS, ChenG, CheungA, et al.. On the design of perceptual MPEG-video encryption algorithms[J]. IEEE transactions on circuits and systems for video technology, 2007, 17(2):214-223
CrossRef Google scholar
[3]
WangX Y, YangL, LiuR, et al.. A chaotic image encryption algorithm based on perceptron model[J]. Nonlinear dynamics, 2010, 62(3):615-621
CrossRef Google scholar
[4]
MatthewsR. On the derivation of a “chaotic” encryption algorithm[J]. Cryptologia, 1989, 13(1):29-42
CrossRef Google scholar
[5]
ZhuZ, ZhangW, WongK, et al.. A chaos-based symmetric image encryption scheme using a bit-level permutation[J]. Information sciences, 2011, 181(6):1171-1186
CrossRef Google scholar
[6]
ZhangL, WangY, ZhangD. Research on multiple-image encryption mechanism based on Radon transform and ghost imaging[J]. Optics communications, 2022, 504: 127494
CrossRef Google scholar
[7]
YuX, ChenH, XiaoJ, et al.. Incoherent optical image encryption based on coded aperture correlation holography[J]. Optics communications, 2022, 510: 127889
CrossRef Google scholar
[8]
ParameshachariB D, PandurangaH T. Medical image encryption using SCAN technique and chaotic tent map system[M], 2022, Singapore, Springer: 181-193
[9]
MancyL, VigilaS M C. Protection of encrypted medical image using consent based access control[J]. International journal of medical engineering and informatics, 2022, 14(1):43-51
CrossRef Google scholar
[10]
TuS, UrR S, WaqasM, et al.. Optimisation-based training of evolutionary convolution neural network for visual classification applications[J]. IET computer vision, 2020, 14(5):259-267
CrossRef Google scholar
[11]
ChenT H, LiK C. Multi-image encryption by circular random grids[J]. Information sciences, 2012, 189: 255-265
CrossRef Google scholar
[12]
RavichandranD, BanuS A, MurthyB K, et al.. An efficient medical image encryption using hybrid DNA computing and chaos in transform domain[J]. Medical & biological engineering & computing, 2021, 59(3):589-605
CrossRef Google scholar
[13]
ZhangJ, HuangZ, LiX, et al.. Quantum image encryption based on quantum image decomposition[J]. International journal of theoretical physics, 2021, 60(8):2930-2942
CrossRef Google scholar
[14]
LorenzE N. Deterministic nonperiodic flow[J]. Journal of atmospheric sciences, 1963, 20(2):130-141
CrossRef Google scholar
[15]
FridrichJ. Symmetric ciphers based on two-dimensional chaotic maps[J]. International journal of bifurcation and chaos, 1998, 8(06):1259-1284
CrossRef Google scholar
[16]
HuaZ, ZhouY, PunC M, et al.. 2D sine logistic modulation map for image encryption[J]. Information sciences, 2015, 297: 80-94
CrossRef Google scholar
[17]
ZHANG X, WANG L, CUI G, et al. Entropy-based block scrambling image encryption using DES structure and chaotic systems[J]. International journal of optics, 2019.
[18]
LinJ, ZhaoK, CaiX, et al.. An image encryption method based on logistic chaotic mapping and DNA coding[C], 2020, Wuhan, China. Washington, SPIE: 363-36911432
[19]
HuaZ, ZhouY. Image encryption using 2D logistic-adjusted-sine map[J]. Information sciences, 2016, 339: 237-253
CrossRef Google scholar
[20]
ChenS, J. Parameters identification and synchronization of chaotic systems based upon adaptive control[J]. Physics letters A, 2002, 299(4):353-358
CrossRef Google scholar
[21]
from the symbolic sequences generated by chaos system[J]. Chaos, solitons & fractals, 2004, 22(2): 359–366.
[22]
HuaZ, ZhouY, ChenC L P. A new series-wound framework for generating 1D chaotic maps[C], 2013, New York, IEEE: 118-123
[23]
ZareiA. Complex dynamics in a 5-D hyper-chaotic attractor with four-wing, one equilibrium and multiple chaotic attractors[J]. Nonlinear dynamics, 2015, 81(1):585-605
CrossRef Google scholar
[24]
ManZ, LiJ, DiX, et al.. Double image encryption algorithm based on neural network and chaos[J]. Chaos, solitons & fractals, 2021, 152: 111318
CrossRef Google scholar
[25]
ZhangY. A new unified image encryption algorithm based on a lifting transformation and chaos[J]. Information sciences, 2021, 547: 307-327
CrossRef Google scholar
[26]
GaoX, MouJ, XiongL, et al.. A fast and efficient multiple images encryption based on single-channel encryption and chaotic system[J]. Nonlinear dynamics, 2022, 108(1):613-636
CrossRef Google scholar
[27]
GUPTA M, SINGH V P, GUPTA K K, et al. An efficient image encryption technique based on two-level security for internet of things[J]. Multimedia tools and applications, 2022: 1–21.
[28]
WangX, TengL, QinX. A novel color image encryption algorithm based on chaos[J]. Signal processing, 2012, 92(4):1101-1108
CrossRef Google scholar

Accesses

Citations

Detail

Sections
Recommended

/