Journal ArticleDOI
A fast parallel batch image encryption algorithm using intrinsic properties of chaos
TLDR
Wang et al. as discussed by the authors proposed a fast and more secure algorithm for protecting batch images by employing chaotic intrinsic properties, reversible steganography, and parallel computing, which can achieve superior results with high efficiency.Abstract:
In real-world applications, the ability to encrypt a large quantity of images is highly desirable. A branch of works resort chaotic encryption to encrypt images but mostly aim at one image for one-time encryption. Besides, encryption algorithms that can support processing batch images are strongly needed for acceleration in the scenario of massive data. To this end, we propose a fast and more secure algorithm for protecting batch images by employing chaotic intrinsic properties, reversible steganography, and parallel computing. First, our algorithm assigns batch images evenly to each thread, in which Cipher Block Chaining (CBC) mode is applied among neighboring images for encryption. Later, the identifier number of each thread and its CBC indexes are encrypted and embedded into the corresponding cipher-images using reversible steganography, which enhances the security of existing chaotic encryption. Besides, keystreams are associated with the plaintext for the goal of resisting chosen-plaintext attack. The experimental results and security analyses show that our algorithm can achieve superior results with high efficiency. read more
Citations
More filters
Journal ArticleDOI
AEA-NCS: An audio encryption algorithm based on a nested chaotic system
TL;DR: In this article , a 2D-Logistic-nested-infinite collapse (2D-LNIC) is proposed by combining an infinite collapse map (1D-ICM) and a logistic map.
Journal ArticleDOI
A parallel image encryption algorithm using intra bitplane scrambling
TL;DR: Wang et al. as mentioned in this paper proposed a parallel image encryption algorithm using intra bitplane scrambling, where four threads are utilized to encrypt the images in bit-level during the permutation, where each thread scrambles two bitplanes.
Proceedings ArticleDOI
A Color Image Encryption Algorithm Based on Chaotic Map and Discrete Wavelet Transform
TL;DR: Wang et al. as discussed by the authors proposed a chaotic logistic map-based image encryption technique for multidimensional color images, where instead of encrypting the whole color picture after preprocessing, encrypt each component independently (R, G, and B) to add extra unpredictability to the cipher text image.
Journal ArticleDOI
The circuit realization of a fifth‐order multi‐wing chaotic system and its application in image encryption
TL;DR: In this article , a new fifth-order eight-wing chaotic system is proposed on the basis of a five-dimensional four-wing system, and the resulting new system is used as a basis for introducing a method that can control both the number of wings of the system and the direction of the change in the numbers of wings.
References
More filters
Journal ArticleDOI
Reversible data embedding using a difference expansion
TL;DR: The redundancy in digital images is explored to achieve very high embedding capacity, and keep the distortion low, in a novel reversible data-embedding method for digital images.
Journal ArticleDOI
Yet another chaotic attractor
Guanrong Chen,Tetsushi Ueta +1 more
TL;DR: In this paper, the authors reported the finding of a chaotic at tractor in a simple three-dimensional autonomous system, which resembles some familiar features from both the Lorenz and Rossler at tractors.
Journal ArticleDOI
Symmetric Ciphers Based on Two-Dimensional Chaotic Maps
TL;DR: Methods are shown how to adapt invertible two-dimensional chaotic maps on a torus or on a square to create new symmetric block encryption schemes to encrypt an N×N image.
Journal ArticleDOI
Some basic cryptographic requirements for chaos-based cryptosystems
Gonzalo Alvarez,Shujun Li +1 more
TL;DR: The suggested guidelines address three main issues: implementation, key management and security analysis, aiming at assisting designers of new cryptosystems to present their work in a more systematic and rigorous way to fulfill some basic cryptographic requirements.
Journal ArticleDOI
On the derivation of a “Chaotic” encryption algorithm
TL;DR: This paper derives a “chaotic” function, and shows that it may be suitable for cryptographic use, in particular as a replacement for the one-time pad system.