2019
DOI: 10.1109/access.2019.2937767
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Plaintext-Related Image Encryption Algorithm Based on Stochastic Signal Insertion and Block Swapping

Abstract: Image encryption is an important method for protecting private data during communication. This paper proposes a novel hyperchaotic image encryption algorithm based on stochastic signal insertion and block permutation. First, the 5D hyperchaotic system is applied to generate pseudorandom number sequences. The SHA-256 hash function and secret keys are used to produce the initial values of the cryptosystem. The hash values can effectively enhance the sensitivity to plain image. To enlarge the key space and change… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 9 publications
(13 citation statements)
references
References 50 publications
(58 reference statements)
0
13
0
Order By: Relevance
“…Chi-square analysis can also be used to measure the histogram uniformity. The chi-square definition is described as follows [27], [38]: where and denote the observed and expected frequencies, respectively. The ideal theoretical value for 2 is 293.25 for 255 degrees of freedom and a significance level of 0.05.…”
Section: A Histogram Analysismentioning
confidence: 99%
See 2 more Smart Citations
“…Chi-square analysis can also be used to measure the histogram uniformity. The chi-square definition is described as follows [27], [38]: where and denote the observed and expected frequencies, respectively. The ideal theoretical value for 2 is 293.25 for 255 degrees of freedom and a significance level of 0.05.…”
Section: A Histogram Analysismentioning
confidence: 99%
“…This subsection is devoted to explaining the immunity of the proposed approach to specific kinds of important attacks. Occlusion is the first attack on the images, which greatly affects the decrypted image at the receptor [27], [28], [44]. Different sized blocks are removed from the Peppers encrypted image (Fig.…”
Section: J Immunity To Attacks Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…Suryanto [33] 392.00 MATLAB 8.5, Intel (R) core(TM) i7-5500U CPU @2.4 GH, RAM 8 GB Windows 10, 64 bit. Tong [14] 181.00 Unspecified The speed of the encryption and decryption processes is influenced by the complexity of the cryptographic algorithm used [44]. In general, the lower the complexity of the algorithm is, the faster the encryption and decryption processes.…”
Section: Encryption and Decryption Speedsmentioning
confidence: 99%
“…Liu and Kadir [ 22 ] proposed color image encryption using bit-level permutations and a high-dimensional chaotic system. Sun et al [ 23 , 24 ] proposed a novel hyperchaotic image encryption method. Since a 5-D hyperchaotic system [ 25 ] has three positive Lyapunov exponents and generates more complex dynamic behavior than a low-dimensional system, we also adopt a 5-D hyperchaotic system to generate chaotic sequences in this paper.…”
Section: Introductionmentioning
confidence: 99%