Abstract

In the paper, a novel color image encryption scheme is proposed by use of the three-dimensional chaotic maps and some data reconstruction techniques. In the diffusion process of the encryption algorithm, the three-dimensional chaotic Logistic map is introduced to changes the pixel value of the plain image. Meanwhile, in the confusion process, the three-dimensional chaotic Cat map is applied to deal with the position of the image pixels. Moreover, some data reconstruction techniques are employed for the better encryption result. Furthermore, the corresponding decryption algorithm is also given. The significant advantages of our method are the effectiveness and simplicity, and our proposed method breaks the correlation between image pixel layers, offers a large key space and against differential and statistical attacks effectively. Finally, the superiority of the proposed algorithm will be shown by the experimental results, security analysis, and the corresponding comparisons with literature.

Highlights

  • W ITH the high speed developing information technology in recent decades, network information security has attracted the attention of many scholars

  • In order to cope with challenge, scholars have been presented a large amount of encryption algorithms [3]

  • Ye et al [33] studied an asymmetric image encryption algorithm based on RSA cryptosystem and a fractional-order chaotic system, which uses different keys in the encryption and decryption process

Read more

Summary

INTRODUCTION

W ITH the high speed developing information technology in recent decades, network information security has attracted the attention of many scholars. Ye et al [33] studied an asymmetric image encryption algorithm based on RSA cryptosystem and a fractional-order chaotic system, which uses different keys in the encryption and decryption process. Som et al [35] suggested a substitution and permutation scheme for color images by several chaotic maps and the pseudo random binary number generator, which employed the chaotic typical chaotic Cat map to carry out confusion process This method is useful in increasing the compute speed. An excellent algorithm should be vulnerable to the original image and reduce the correlations effectively In this scheme, a rapid and effective color image encryption method is presented combined with the Logistic map, the Cat map and some data reconstruction techniques.

LOGISTIC MAPS
IMAGE ENCRYPTION SCHEME
IMAGE DECRYPTION ALGORITHM
EXPERIMENTAL RESULTS
KEY SPACE
Results
DIFFERENTIAL ATTACK
CLASSICAL ATTACK ANALYSIS
CONCLUSION

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.