2020
DOI: 10.1142/s0218127420500601
|View full text |Cite
|
Sign up to set email alerts
|

An Image Encryption Algorithm Based on Random Walk and Hyperchaotic Systems

Abstract: In this paper, we propose an image encryption algorithm based on random walk and two hyperchaotic systems. The random walk method is adopted to scramble the position of pixels within a block. Furthermore, the permutation operation between blocks is presented to enhance the scramble effect. Thus, high correlation among pixels of original image is broken by permutation. Moreover, the chosen plaintext attack is used to test the anti-attack ability of the proposed algorithm. By analyzing experimental results and c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
37
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 69 publications
(37 citation statements)
references
References 49 publications
0
37
0
Order By: Relevance
“…The study of chaos-based image encryption has been a recent focus [35][36][37]. Generally, systems with multiple wings or multistability have become potential candidates for chaos applications compared to chaotic systems with fewer wings or stability due to their complex dynamical properties.…”
Section: Application In Image Encryptionmentioning
confidence: 99%
See 1 more Smart Citation
“…The study of chaos-based image encryption has been a recent focus [35][36][37]. Generally, systems with multiple wings or multistability have become potential candidates for chaos applications compared to chaotic systems with fewer wings or stability due to their complex dynamical properties.…”
Section: Application In Image Encryptionmentioning
confidence: 99%
“…To demonstrate the efficiency of the presented image encryption scheme, numerical simulation experiments were performed by Matlab R2017a. And some classic metrics like histogram, correlation coefficient, information entropy, and key sensitivity were measured [5,13,[35][36][37]. In all experiments, the "Lena 256×256" image is employed as the test image, as shown in Fig.…”
Section: B Experiments and Performance Analysesmentioning
confidence: 99%
“…Input: P 1 , P 2 , C Output: Recover the plaintext image P from the given ciphertext image C (1) C 1 � Encryption(P 1 ) (2) According to equation (11), ED � C 1 (3) C 2 � Encryption(P 2 ) (4) According to equation (11) and ED, S 2 ′ � bitxor(C 2 , ED) (5) S 2 ← S 2 ′ (6) for i � 1 to M do (7) for j � 1 to N do (8) for k � 1 to 1 do (9) [m 1 , n 1 ] � find(S 2 (: , : , 1) �� 1) (10) [m 2 , n 2 ] � find(S 2 (: , : , 1) �� 2) (11) end for (12) end for (13)…”
Section: Complexitymentioning
confidence: 99%
“…With the rapid development of network technology, the security and privacy protection problems of multimedia information have become a hot subject. In order to promote the security of information transmission, scholars have proposed a large amount of image encryption algorithms based on different mechanisms and theories, such as chaotic map [1][2][3][4][5][6][7][8][9][10][11][12][13], neural network [14], DNA [15][16][17][18], and so on. e security performance of the image encryption algorithms mainly depends on statistical test indicators, such as key space, histogram, key sensitivity analysis, information entropy, differential attack, and so on.…”
Section: Introductionmentioning
confidence: 99%
“…Nonlinear characteristics exist in systems with various research directions, such as chaotic circuit [1][2][3][4][5][6][7][8][9][10][11][12][13][14][15], neural network [16][17][18][19][20][21], image encryption [22][23][24][25]. Natural ventilation also has nonlinear characteristics.…”
Section: Introductionmentioning
confidence: 99%