Abstract
In the paper, a novel color image encryption scheme is proposed by use of the three-dimensional chaotic maps and some data reconstruction techniques. In the diffusion process of the encryption algorithm, the three-dimensional chaotic Logistic map is introduced to changes the pixel value of the plain image. Meanwhile, in the confusion process, the three-dimensional chaotic Cat map is applied to deal with the position of the image pixels. Moreover, some data reconstruction techniques are employed for the better encryption result. Furthermore, the corresponding decryption algorithm is also given. The significant advantages of our method are the effectiveness and simplicity, and our proposed method breaks the correlation between image pixel layers, offers a large key space and against differential and statistical attacks effectively. Finally, the superiority of the proposed algorithm will be shown by the experimental results, security analysis, and the corresponding comparisons with literature.
Highlights
W ITH the high speed developing information technology in recent decades, network information security has attracted the attention of many scholars
In order to cope with challenge, scholars have been presented a large amount of encryption algorithms [3]
Ye et al [33] studied an asymmetric image encryption algorithm based on RSA cryptosystem and a fractional-order chaotic system, which uses different keys in the encryption and decryption process
Summary
W ITH the high speed developing information technology in recent decades, network information security has attracted the attention of many scholars. Ye et al [33] studied an asymmetric image encryption algorithm based on RSA cryptosystem and a fractional-order chaotic system, which uses different keys in the encryption and decryption process. Som et al [35] suggested a substitution and permutation scheme for color images by several chaotic maps and the pseudo random binary number generator, which employed the chaotic typical chaotic Cat map to carry out confusion process This method is useful in increasing the compute speed. An excellent algorithm should be vulnerable to the original image and reduce the correlations effectively In this scheme, a rapid and effective color image encryption method is presented combined with the Logistic map, the Cat map and some data reconstruction techniques.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.