Paper
16 February 2022 An effective image encryption algorithm based on a novel chaotic map
Weikang Ding, Qinglian Yang, Dongdong Zhao, Shi Yan
Author Affiliations +
Proceedings Volume 12083, Thirteenth International Conference on Graphics and Image Processing (ICGIP 2021); 120831T (2022) https://doi.org/10.1117/12.2623378
Event: Thirteenth International Conference on Graphics and Image Processing (ICGIP 2021), 2021, Kunming, China
Abstract
Cryptography based on the properties such as unpredictability and initial state sensitivity of chaotic systems is a strategy to improve the security of image encryption algorithms. In this paper, a Logistic Coupled with Sine (LCS) chaotic map is proposed, and it turns out that the proposed map has more complex behaviors than existing chaotic maps in terms of performance analyses. Furthermore, as a potential application, an efficient and effective image encryption algorithm is proposed based on the keystreams generated by this LCS map. In the encryption algorithm, for a given plain image, it is split by the parity of indices of image rows first, and then a new confusion-diffusion strategy is proposed to scramble and diffuse thoroughly the elements of these two divided parts of the image. The security analyses indicate that the proposed encryption algorithm has excellent statistical properties, high security and efficiency for image encryption.
© (2022) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Weikang Ding, Qinglian Yang, Dongdong Zhao, and Shi Yan "An effective image encryption algorithm based on a novel chaotic map", Proc. SPIE 12083, Thirteenth International Conference on Graphics and Image Processing (ICGIP 2021), 120831T (16 February 2022); https://doi.org/10.1117/12.2623378
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Image encryption

Liquid crystals

Computer security

Diffusion

Digital imaging

Complex systems

Network security

Back to Top