2021
DOI: 10.1155/2021/6679288
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Image Encryption Algorithm Based on the Delayed Maps and Permutation-Confusion-Diffusion Architecture

Abstract: To improve the dynamical behaviors of 1D chaotic maps, a new linear-delay-modulation method (LDM) is proposed. Derived from the Sine map, a delayed Sine map (DSM) is proposed based on the LDM. Then, we substitute the Sine map in the SIMM system with DSM and obtained a delayed SIMM system (DSIMM). Its chaotic performance is analyzed through the phase diagram, Lyapunov exponent spectrum, and complexity. The results show that the delayed chaotic map can generate more complex dynamical behaviors and more random se… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(7 citation statements)
references
References 45 publications
0
7
0
Order By: Relevance
“…Today, RSA is still one of the most popular public key cryptosystems. At the same time, the US National Bureau of Standards (NBS) recognized the important commercial use of cryptography, so it solicited and published the US data encryption standard DES in 1977 [16].…”
Section: Literature Reviewmentioning
confidence: 99%
“…Today, RSA is still one of the most popular public key cryptosystems. At the same time, the US National Bureau of Standards (NBS) recognized the important commercial use of cryptography, so it solicited and published the US data encryption standard DES in 1977 [16].…”
Section: Literature Reviewmentioning
confidence: 99%
“…The number of pixel change rates (NPCR) and unified average changing intensity (UACI) are two common indicators used to analyze the ability to resist differential attacks [31]. The NPCR and UACI can be defined as…”
Section: Differential Attack Analysismentioning
confidence: 99%
“…Then the same encryption scheme is performed on these two images, and the encryption algorithm can be summarized by analyzing the correlation and difference between the two encrypted images to achieve the purpose of deciphering. The number of pixel change rates (NPCR) and unified average changing intensity (UACI) are two common indicators used to analyze the ability to resist differential attacks [31]. The NPCR and UACI can be defined as NPCR=i=1Mj=1ND(i,j)M×N×100%,UACI=i=1Mj=1N||C1(i,j)C2(i,j)255×M×N×100%,Dfalse(i,jfalse)=left1,C1(i,j)C2(i,j)left0,C1(i,j)=C2(i,j).\begin{equation} \def\eqcellsep{&}\begin{array}{l} NPCR = \frac{{\sum_{i = 1}^M {\sum_{j = 1}^N {D(i,j)} } }}{{M \times N}} \times 100\% ,\\[18pt] UACI = \frac{{\sum_{i = 1}^M {\sum_{j = 1}^N {\left| {{C_1}(i,j) - {C_2}(i,j)} \right|} } }}{{255 \times M \times N}} \times 100\% ,\\[10pt] D(i,j) = \left\{ \def\eqcellsep{&}\begin{array}{l} 1,{C_1}(i,j) \ne {C_2}(i,j)\\[6pt] 0,{C_1}(i,j) = {C_2}(i,j) \end{array} \right.. \end{array} \end{equation}where C1(i,j)${C_1}(i,j)$ represents the value of the pixel in row i and column j after the original image is encrypted.…”
Section: Performance and Security Analysismentioning
confidence: 99%
“…e introduction of the sine map enhances the time of iteration of a chaotic system. Due to an increase in the time of iteration, the security of the image increases [24]. e main goal of this work is to make advanced venture in the regime of image encryption using chaotic maps.…”
Section: Introductionmentioning
confidence: 99%