Journal of Systems Engineering and Electronics ›› 2022, Vol. 33 ›› Issue (3): 534-550.doi: 10.23919/JSEE.2022.000053
收稿日期:
2021-03-09
出版日期:
2022-06-18
发布日期:
2022-06-24
Lilian HUANG1,2(), Yi SUN1,2(), Jianhong XIANG1,2,*(), Linyu WANG1,2()
Received:
2021-03-09
Online:
2022-06-18
Published:
2022-06-24
Contact:
Jianhong XIANG
E-mail:lilian_huang@163.com;sun_yi@hrbeu.edu.cn;xiangjianhong@hrbeu.edu.cn;wanglinyu@hrbeu.edu.cn
About author:
Supported by:
. [J]. Journal of Systems Engineering and Electronics, 2022, 33(3): 534-550.
Lilian HUANG, Yi SUN, Jianhong XIANG, Linyu WANG. Image encryption based on a novel memristive chaotic system, Grain-128a algorithm and dynamic pixel masking[J]. Journal of Systems Engineering and Electronics, 2022, 33(3): 534-550.
"
Image | Information entropy | ||
R | G | B | |
Girl | 6.4200 | 6.4457 | 6.3807 |
Cipher of Girl | 7.9974 | 7.9975 | 7.9973 |
Baboon | 7.7067 | 7.4744 | 7.7522 |
Cipher of Baboon | 7.9994 | 7.9994 | 7.9992 |
Peppers | 7.3388 | 7.4963 | 7.0583 |
Cipher of Peppers | 7.9994 | 7.9994 | 7.9993 |
Lena | 7.2531 | 7.5940 | 6.9684 |
Cipher of Lena | 7.9993 | 7.9993 | 7.9994 |
Lena in [ | 7.9993 | 7.9993 | 7.9993 |
Lena in [ | 7.9994 | 7.9994 | 7.9993 |
Lena in [ | 7.9896 | 7.9885 | 7.9899 |
Lena in [ | 7.9972 | 7.9972 | 7.9975 |
"
Secret key | Value |
Key1 | |
Key2 | |
Key3 | |
"
Image | Correlation coefficient | ||||
H | V | D | A | ||
Baboon | R | 0.8670 | 0.9203 | 0.8609 | 0.8600 |
G | 0.7651 | 0.8739 | 0.7406 | 0.7362 | |
B | 0.8795 | 0.9084 | 0.8430 | 0.8458 | |
Cipher of Baboon | R | ?0.0009 | ?0.0015 | ?0.0019 | 0.0023 |
G | 0.0019 | 0.0040 | ?0.0001 | 0.0039 | |
B | ?0.0004 | 0.0027 | ?0.0079 | ?0.0017 | |
Peppers | R | 0.9693 | 0.9625 | 0.9620 | 0.9598 |
G | 0.9829 | 0.9743 | 0.9685 | 0.9689 | |
B | 0.9610 | 0.9670 | 0.9483 | 0.9452 | |
Cipher of Peppers | R | ?0.0003 | ?0.0028 | ?0.0058 | 0.0066 |
G | ?0.0025 | 0.0044 | ?0.0053 | ?0.0037 | |
B | 0.0053 | ?0.0027 | ?0.0017 | ?0.0028 | |
Lena | R | 0.9892 | 0.9817 | 0.9707 | 0.9780 |
G | 0.9834 | 0.9703 | 0.9580 | 0.9621 | |
B | 0.9600 | 0.9306 | 0.9147 | 0.9116 | |
Cipher of Lena | R | ?0.0005 | ?0.0072 | ?0.0049 | 0.0077 |
G | ?0.0025 | ?0.0055 | 0.0007 | 0.0046 | |
B | 0.0030 | ?0.0019 | ?0.0004 | 0.0068 | |
Lena in [ | R | 0.0128 | ?0.0031 | ?0.0033 | ? |
G | ?0.0170 | 0.0160 | ?0.0093 | ? | |
B | 0.0001 | ?0.0190 | ?0.0130 | ? | |
Lena in [ | R | 0.0001 | ?0.0064 | ?0.0214 | ? |
G | 0.0010 | ?0.0314 | ?0.0662 | ? | |
B | 0.0603 | 0.0005 | ?0.0019 | ? | |
Lena in [ | R | 0.0083 | ?0.0049 | ?0.0095 | ? |
G | ?0.0054 | 0.0100 | ?0.0017 | ? | |
B | ?0.0010 | 0.0124 | ?0.0042 | ? |
1 |
MATTHEWS R On the derivation of a “Chaotic” encryption algorithm. Cryptologia, 1989, 13 (1): 29- 42.
doi: 10.1080/0161-118991863745 |
2 |
FRIDRICH J Symmetric ciphers based on two-dimensional chaotic maps. International Journal of Bifurcation and Chaos, 1998, 8 (6): 1259- 1284.
doi: 10.1142/S021812749800098X |
3 |
SU Y G, TANG C, LI B Y, et al Single-lens Fourier-transform-based optical color image encryption using dual two-dimensional chaotic maps and the Fresnel transform. Applied Optics, 2017, 56 (3): 498- 505.
doi: 10.1364/AO.56.000498 |
4 |
KHAN M A, AHMAD J, JAVAID Q, et al An efficient and secure partial image encryption for wireless multimedia sensor networks using discrete wavelet transform, chaotic maps and substitution box. Journal of Modern Optics, 2017, 64 (5): 531- 540.
doi: 10.1080/09500340.2016.1246680 |
5 |
WANG X Y, XU D H A novel image encryption scheme based on Brownian motion and PWLCM chaotic system. Nonlinear Dynamics, 2014, 75, 345- 353.
doi: 10.1007/s11071-013-1070-x |
6 |
HUSSAIN I, SHAH T, GONDAL M A, et al A novel image encryption algorithm based on chaotic maps and GF(28) exponent transformation . Nonlinear Dynamics, 2013, 72, 399- 406.
doi: 10.1007/s11071-012-0723-5 |
7 |
ZHANG L M, SUN K H, LIU W H, et al A novel color image encryption scheme using fractional-order hyperchaotic system and DNA sequence operations. Chinese Physics B, 2017, 26 (10): 100504.
doi: 10.1088/1674-1056/26/10/100504 |
8 |
NASKAR P K, BHATTACHARYYA S, NANDY D, et al A robust image encryption scheme using chaotic tent map and cellular automata. Nonlinear Dynamics, 2020, 100 (3): 2877- 2898.
doi: 10.1007/s11071-020-05625-3 |
9 | NJITACKE Z T, ISAAC S D, NESTOR T, et al. Window of multistability and its control in a simple 3D Hopfield neural network: application to biomedical image encryption. Neural Computing and Applications, 2021, 33: 6733–6752. |
10 |
GONG L H, HE X T, CHENG S, et al Quantum image encryption algorithm based on quantum image XOR operations. International Journal of Theoretical Physics, 2016, 55, 3234- 3250.
doi: 10.1007/s10773-016-2954-6 |
11 |
NATIQ H, AL-SAIDI N M G, SAID M R M, et al A new hyperchaotic map and its application for image encryption. European Physical Journal Plus, 2018, 133 (1): 6.
doi: 10.1140/epjp/i2018-11834-2 |
12 |
WANG X Y, WANG Y, WANG S W, et al A novel pseudo-random coupled LP spatiotemporal chaos and its application in imageencryption. Chinese Physics B, 2018, 27 (11): 110502.
doi: 10.1088/1674-1056/27/11/110502 |
13 | LIU H J, ZHANG Y Q, KADIR A, et al. Image encryption using complex hyper chaotic system by injecting impulse into parameters. Applied Mathematics and Computation, 2019, 360(1): 83−93. |
14 |
STRUKOV D B, SNIDER G S, STEWART D R, et al The missing memristor found. Nature, 2008, 453 (7191): 80- 83.
doi: 10.1038/nature06932 |
15 |
PENG G Y, MIN F H Multistability analysis, circuit implementations and application in image encryption of a novel memristive chaotic circuit. Nonlinear Dynamics, 2017, 90 (3): 1607- 1625.
doi: 10.1007/s11071-017-3752-2 |
16 | LI C L, LI Z Y, FENG W, et al Dynamical behavior and image encryption application of a memristor-based circuit system. International Journal of Electronics and Communications, 2019, 110, 152861. |
17 |
CHUA L O, KANG S M Memristive devices and systems. Proccedings of the IEEE, 1976, 64 (2): 209- 223.
doi: 10.1109/PROC.1976.10092 |
18 | BAO B C, XU J P, ZHOU G H, et al. Chaotic memristive circuit: equivalent circuit realization and dynamical analysis. Chinese Physics B, 2011, 20(12): 120502. |
19 | AGREN M, HELL M, JOHANSSON T. Grain-128a: a new version of Grain-128 with optional authentication. International Journal of Wireless and Mobile Computing, 2011, 5(1): 48–59. |
20 | HELL M, JOHANSSON T, MEIER W. Grain– a stream cipher for constrained environments. International Journal of Wireless and Mobile Computing, 2006, 2(1): 86–93. |
21 | HELL M, JOHANSSON T, MAXIMOV A, et al A stream cipher proposal: Grain-128. Proc. of the IEEE International Symposium on Information Theory, 2006, 1614- 1618. |
22 |
CHAI X L, GAN Z H, LU Y, et al A novel color image encryption algorithm based on genetic recombination and the four-dimensional memristive hyperchaotic system. Chinese Physics B, 2016, 25 (10): 100503.
doi: 10.1088/1674-1056/25/10/100503 |
23 |
HASANZADEH E, YAGHOOBI M A novel color image encryption algorithm based on substitution box and hyper-chaotic system with fractal keys. Multimedia Tools and Applications, 2020, 79, 7279- 7297.
doi: 10.1007/s11042-019-08342-1 |
24 |
LIU H J, KADIR A, XU C B Color image encryption with cipher feedback and coupling chaotic map. International Journal of Bifurcation and Chaos, 2020, 30 (12): 2050173.
doi: 10.1142/S0218127420501734 |
25 | ZHOU J, ZHOU N R, GONG L H Fast color image encryption scheme based on 3D orthogonal Latin squares and matching matrix. Optics & Laser Technology, 2020, 131, 106437. |
No related articles found! |
阅读次数 | ||||||
全文 |
|
|||||
摘要 |
|
|||||