scispace - formally typeset
Search or ask a question
Journal ArticleDOI

A New Image Encryption Algorithm Based on Modified Optically Injected Semiconductor Laser Chaotic System

Xuejun Li1, Bo Li1, Bo Sun1, Zhisen Wang1, Caiyin Wang1, Jun Mou1 
01 Jan 2021-IEEE Access (Institute of Electrical and Electronics Engineers (IEEE))-Vol. 9, pp 131542-131551
TL;DR: Li et al. as discussed by the authors proposed a new image encryption scheme based on an optical injection semiconductor laser chaotic system, which mainly consists of two processes of scrambling and diffusion, which can effectively resist various common attacks on image encryption systems.
Abstract: Compared with general chaotic systems, laser chaotic systems have more complex dynamic behaviors and extremely high sensitivity to parameters and initial values. So far, there are few studies on the application of laser chaotic systems to image encryption. Therefore, this paper proposes a new image encryption scheme based on an optical injection semiconductor laser chaotic system. The encryption scheme mainly includes two processes of scrambling and diffusion. The scrambling process converts the pseudo-random sequences generated by the laser chaotic system into chaotic matrixes and scrambling each pixel through a random point scrambling algorithm. In the diffusion process, the chaotic sequences generated by the laser chaotic system are quantized into random numbers and applied to the improved gravitational model algorithm to achieve the effect of pixel diffusion. The experimental results and security analyses indicate that the proposed algorithm has good image encryption performance and can effectively resist various common attacks on image encryption systems.

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI
TL;DR: Wang et al. as discussed by the authors proposed a selective region medical image encryption algorithm based on cascade chaos, which consists of two stages: region of interest (ROI) encryption and full image encryption.
Abstract: Aiming at the problem that medical image information is easy to be stolen, tampered and maliciously destroyed in the transmission process, a selective region medical image encryption algorithm based on cascade chaos is proposed. The encryption algorithm consists of two stages: region of interest (ROI) encryption and full image encryption. First, the Cubic map is cascaded with an improved Cosine map. Through the analysis of dynamic characteristics, the cascade map has better chaotic performance than the traditional chaotic systems. The key sequence is generated by the cascade map and the image. Then edge detection is performed on the image to determine ROI. ROI is divided into multiple image blocks, and a new gradient algorithm is used to label the sub-blocks containing important information. A modified two-dimensional Joseph traversal method is used to scramble the positions of pixels in each sub-block, and further modify their pixel values with a round of diffusion. Finally, we use a block V-shape scrambling method to scramble the entire image. The final encrypted image is obtained through a round of bidirectional diffusion of all pixels using chaotic sequences. Simulation results and security analysis show that the algorithm has large key space and sufficient security. It can effectively resist various malicious attacks.
References
More filters
Journal ArticleDOI
TL;DR: Methods are shown how to adapt invertible two-dimensional chaotic maps on a torus or on a square to create new symmetric block encryption schemes to encrypt an N×N image.
Abstract: In this paper, methods are shown how to adapt invertible two-dimensional chaotic maps on a torus or on a square to create new symmetric block encryption schemes. A chaotic map is first generalized by introducing parameters and then discretized to a finite square lattice of points which represent pixels or some other data items. Although the discretized map is a permutation and thus cannot be chaotic, it shares certain properties with its continuous counterpart as long as the number of iterations remains small. The discretized map is further extended to three dimensions and composed with a simple diffusion mechanism. As a result, a symmetric block product encryption scheme is obtained. To encrypt an N×N image, the ciphering map is iteratively applied to the image. The construction of the cipher and its security is explained with the two-dimensional Baker map. It is shown that the permutations induced by the Baker map behave as typical random permutations. Computer simulations indicate that the cipher has g...

1,654 citations

Journal ArticleDOI
TL;DR: A new two-dimensional Sine Logistic modulation map (2D-SLMM) which is derived from the Logistic and Sine maps is introduced which has the wider chaotic range, better ergodicity, hyperchaotic property and relatively low implementation cost.

585 citations

Journal ArticleDOI
TL;DR: A new block image encryption scheme based on hybrid chaotic maps and dynamic random growth technique, which can completely eliminate the cyclical phenomenon and resist chosen plaintext attack is proposed.

379 citations

Journal ArticleDOI
TL;DR: The proposed cryptosystem decreases the volume of data to be transmitted and simplifies the keys distribution simultaneously as a nonlinear encryption system with acceptable compression and security performance.
Abstract: Most image encryption algorithms based on low-dimensional chaos systems bear security risks and suffer encryption data expansion when adopting nonlinear transformation directly. To overcome these weaknesses and reduce the possible transmission burden, an efficient image compression–encryption scheme based on hyper-chaotic system and 2D compressive sensing is proposed. The original image is measured by the measurement matrices in two directions to achieve compression and encryption simultaneously, and then the resulting image is re-encrypted by the cycle shift operation controlled by a hyper-chaotic system. Cycle shift operation can change the values of the pixels efficiently. The proposed cryptosystem decreases the volume of data to be transmitted and simplifies the keys distribution simultaneously as a nonlinear encryption system. Simulation results verify the validity and the reliability of the proposed algorithm with acceptable compression and security performance.

311 citations

Journal ArticleDOI
TL;DR: Simulate test and comparative analysis show that the proposed image cryptosystem has the characteristics of large key space, fast encryption/decryption speed, high sensitivity, good statistical properties of cipher-text, and etc.

197 citations