Affiliation:
1. School of Information Science and Technology, Dalian Maritime University, Dalian 116026, China
Abstract
The complexity of chaotic systems, if used in information encryption, can determine the status of security. The paper proposes a novel image encryption scheme that uses chaotic maps and fuzzy numbers for the secure transmission of information. The encryption method combines logistic and sine maps to form the logistic sine map, as well as the fuzzy concept and the Hénon map to form the fuzzy Hénon map, in which these maps are used to generate secure secret keys, respectively. Additionally, a fuzzy triangular membership function is used to modify the initial conditions of the maps during the diffusion process. The encryption process involves scrambling the image pixels, summing adjacent row values, and XORing the result with randomly generated numbers from the chaotic maps. The proposed method is tested against various attacks, including statistical attack analysis, local entropy analysis, differential attack analysis, signal-to-noise ratio, signal-to-noise distortion ratio, mean error square, brute force attack analysis, and information entropy analysis, while the randomness number has been evaluated using the NIST test. This scheme also has a high key sensitivity, which means that a small change in the secret keys can result in a significant change in the encrypted image The results demonstrate the effectiveness of the proposed scheme in ensuring the secure transmission of information.
Funder
National Natural Science Foundation of China
Password Theory Project of the 13th Five-Year Plan National Cryptography Development Fund
Liaoning Province science and Technology Innovation Leading Talents Program Project
Key R&D Projects of Liaoning Province
Jinan City 20 University Funding Projects Introducing Innovation Team Program
Subject
Fluid Flow and Transfer Processes,Computer Science Applications,Process Chemistry and Technology,General Engineering,Instrumentation,General Materials Science
Reference41 articles.
1. Du, W. (2022). Computer Security: A Hands-on Approach, Syracuse. [3rd ed.].
2. A novel chaos-based bit-level permutation scheme for digital image encryption;Fu;Opt. Commun.,2011
3. 2D eπ-map for image encryption;Erkan;Inf. Sci.,2022
4. Barker, E., and Mouha, N. (2017). Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher, National Institute of Standards and Technology.
5. Dworkin, M.J. (2023). Advanced Encryption Standard (AES), National Institute of Standards and Technology.
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献