Abstract

The classic scrambling-diffusion structure for image encryption is vulnerable to be attacked. The scrambling and diffusion process can be cracked separately due to the two processes are independent. In this paper, we proposed a novel color image encryption algorithm which can overcome the problem. In the proposed algorithm, firstly, the first diffusion is performed simultaneously with the first scrambling which can resist the attacker to separately crack the scrambling or diffusion. Then, the second diffusion matrix generated from the Hopfield chaotic neural network (HCNN) which is related to the plaintext is performed which can not only resist common chosen-plaintext attack, but also improved the key sensitivity. Finally, a second scrambling is performed on some special pixels to further improve the security. Experiments and security analysis indicate that the proposed algorithm has an excellent performance in image encryption and various attacks.

Highlights

  • In the development of information technology, information security is receiving increasing attention

  • The second diffusion matrix generated from the Hopfield chaotic neural network, which makes full use of the nonlinearity and associative memory of the Hopfield neural network, which can generate a random matrix with greater randomness to make the design of an image encryption scheme to have a greater space–time complexity than conventional chaotic mapping and improves the security of the encrypted algorithm

  • RELATED WORK Since the proposed encryption algorithm uses chaotic mapping and the Hopfield chaotic neural network, we introduce the related knowledge

Read more

Summary

INTRODUCTION

In the development of information technology, information security is receiving increasing attention. The image is diffused by performing a bitwise OR operation on consecutive pixels, which is followed by a coordinate transformation of the image with the help of chaotic mapping This method enhances the encryption security by combining the scrambling and diffusion algorithms. Secret keys are the same, the key-streams are different when different plaintext images are encrypted, so that it can effectively resist the known plaintext attack and chosen plaintext attack As another novel design of this encryption algorithm, a chaotic sequence is used to perform the second scrambling on some of the pixels to further improve the security of our proposed encryption algorithm.

RELATED WORK
THE 3D-HOPFIELD CHAOTIC NEURAL NETWORK
DECODING OF THE PROPOSED ALGORITHM
RESISTANCE TO PLAINTEXT ATTACK
KEY SPACE ANALYSIS
HISTOGRAM TEST ANALYSIS
LOCAL SHANNON ENTROPY ANALYSIS
CONCLUSION

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.