Multi-image Reorganization Encryption Based on S-L-F Cascade Chaos and Bit Scrambling

Authors

  • Xiaoming Song School of Mathematics and Computing Science, Guilin University of Electronic Technology, Guilin, Guangxi 541001, China
  • Daihan Xu School of computer science, Beijing University of Technology, Beijing, 100081, China
  • Guodong Li School of Mathematics and Computing Science, Guilin University of Electronic Technology, Guilin, Guangxi 541001, China
  • Wenxia Xu School of Mathematics and Computing Science, Guilin University of Electronic Technology, Guilin, Guangxi 541001, China

DOI:

https://doi.org/10.13052/jwe1540-9589.20410

Keywords:

S-L-F Cascade Chaos, bit-level scrambling, Multi-image Encryption, Logistic chaos, Sine-Sine mapping.

Abstract

Aiming at the problems of small value range of a single chaotic parameter, low sequence chaos, and transient effects, a composite chaotic system of cascaded Sine-Sine mapping, Logistic chaos and generalized third-order Fibonacci is proposed (S-L-F). The new system is highly sensitive to initial values, the maximum spectral entropy of the generated sequence can reach 0.95, and the value range of the parameter x is expanded to [0,4] compared with the traditional Logistic, indicating that the new system is suitable for generating pseudo-random sequences for image encryption. For the problem that the traditional multi-image encryption scheme can only encrypt images of the same type and size, the practicability is poor, and a multi-image encryption scheme based on image reorganization and biting is proposed. The algorithm recombines any number, different sizes and different types of images into a three-dimensional matrix, converts it into a binary matrix, performs bit-level scrambling and surface cyclic scrambling, and then restores the scrambling matrix to decimal, and the chaotic sequence performs exclusive-or diffusion, and completes simultaneous encryption at one time, which greatly improves the encryption efficiency and scope of application. The NPCR of the ciphertext image is 0.9961, and the UACI is 0.3345, which proves that the ciphertext image can effectively resist the difference attack. The information entropy is greater than 7.999, which can effectively resist attacks. It has certain application value in image information security. Experimental analysis shows that the algorithm has high security and strong practicability.

Downloads

Download data is not yet available.

Author Biographies

Xiaoming Song, School of Mathematics and Computing Science, Guilin University of Electronic Technology, Guilin, Guangxi 541001, China

Xiaoming Song is a graduate student. Become a student of the School of Mathematics and Computing Science of Guilin University of Electronic Technology in the fall of 2020. His work centers on chaos theory, discussing information and image encryption solutions based on chaos theory.

Daihan Xu, School of computer science, Beijing University of Technology, Beijing, 100081, China

Xiaoming Song is a graduate student. Become a student of the School of Mathematics and Computing Science of Guilin University of Electronic Technology in the fall of 2020. His work centers on chaos theory, discussing information and image encryption solutions based on chaos theory.

Guodong Li, School of Mathematics and Computing Science, Guilin University of Electronic Technology, Guilin, Guangxi 541001, China

Guodong Li is a professor at the School of Mathematics and Computational Science, Guilin University of Electronic Technology. He was a professor in the Department of Applied Mathematics of Xinjiang University of Finance and Economics. His current research interests include information security, image processing, and data mining.

Wenxia Xu, School of Mathematics and Computing Science, Guilin University of Electronic Technology, Guilin, Guangxi 541001, China

Wenxia Xu is an associate professor at the School of Mathematics and Computational Science, Guilin University of Electronic Technology. She was a professor in the Department of Applied Mathematics of Xinjiang University of Finance and Economics. Her current research interests include information security, image processing, and data mining.

References

MENG J. Image encryption with cross colour field algorithm and improved cascade chaos systems. IET Image Processing, 2020, 14: 973–981.

Yuan F, Li YX, Wang GY, A universal method of chaos cascade and its applications, Chaos: An Interdisciplinary Journal of Nonlinear Science 31, 021102 (2021).

Zhao L, Bao LY, Ding HW. S-T linear coupled cascade chaos spread spectrum code and its performance analysis. Telecommunication Engineering, 2021, 61(2):218–223. (in Chinese)

Jin Y, Yuan F, Li YX. Audio encryption method based on cascaded chaotic map. China Sciencepaper, 2020, 15(11):1247–1252+1276. (in Chinese)

Zhao F, Li C, Liu C, et al. Image Encryption Algorithm Based on Sine-Logistic Cascade Chaos, 2019 5th International Conference on Control, Automation and Robotics (ICCAR), 2019, pp. 224–228.

Zhu HG, Dai LW, Liu YT, Wu, LJ, et al. A three-dimensional bit-level image encryption algorithm with Rubik’s cube method. Mathematics and Computers in Simulation, 2021, 185: 754–770.

Li CL, Zhou Y, Li HM, et al. Image encryption scheme with bit-level scrambling and multiplication diffusion. Multimed Tools Appl (2021).

Jing S, Guo Y, Chen W. Meaningful ciphertext encryption algorithm based on bit scrambling, discrete wavelet transform and improved chaos. IET Image Process. 2021; 15:1053–1071.

MM, Liu Y, Gong LH. Image encryption algorithm based on chaos and quaternary system. Modern Electronics Technique, 2020, 43(23):49–53+57. (in Chinese)

Zhao HX, Xie SC, Zhang JZ, et al. Fast image encryption algorithm based on improved Henon map. Application Research of Computers, 2020, 37(12):3726–3730. (in Chinese).

Zhu SQ, Wang WH, Li JQ. Designing a class of quadratic polynomial chaotic maps and their pseudo random number generator. Computer Engineering and Applications, 2018, 54(09):84–88. (in Chinese).

Guo Y, Xu X, Jing SW, et al. Optical Image Encryption Based on Spiral Phase Transform and Generalized Fibonacci Chaos. Journal of Electronics & Information Technology, 2020, 42(04): 988–996. (in Chinese)

Xing YW, Mao ZZ. A new image encryption algorithm based on ladder transformation and DNA coding. Multimed Tools Appl (2021). https://doi.org/10.1007/s11042-020-10318-5

M. A. Ben Farah, A. Farah, T. Farah. An image encryption scheme based on a new hybrid chaotic map and optimized substitution box. Nonlinear Dynamics, 2020, 99(4): 3041–3064.

May RM. Simple mathematical models with very complicated dynamics. Nature. 1976, 261 (5560):459–467.

Xian YJ, Wang XY, Yan XP, et al. Image Encryption Based on Chaotic Sub-Block Scrambling and Chaotic Digit Selection Diffusion. Optics and Lasers in Engineering, 2020, 134:106202.

Cheng GF, Wang CH, Chen H. A novel color image encryption algorithm based on hyperchaotic system and permutation-diffusion architecture. Int. J. Bifurc. Chaos, 2019; 20(9):1950115.

Wu JH, Liao XF, Yang B. Image encryption using 2D hénon-sine map and dna approach. Signal Process, 2018; 153:11–23.

Chai XL, Gan ZH, Yang K, et al. An image encryption algorithm based on the memristive hyperchaotic system, cellular automata and DNA sequence operations. Signal Process Image Communication 2017; 52:6–19.

Li GD, Pu Y, Yang B, et al. Synchronization between different hyper chaotic systems and dimensions of cellular neural network and its design in audio encryption . Cluster Computing, 2018, 22: 7423–7434.

Li GD, Yang B, Pu Y, et al. Synchronization of Generalized Using to Image Encryption. International Journal of Pattern Recognition & Artificial Intelligence, 2017, 31(6).

Mao J, Wang HY, Chen Y. Image encryption algorithm based on dynamic key selection and multi-direction diffusion. Optical Technique, 2018, 44(03): 278–286. (in Chinese).

Khan JS, Ahmad J. Chaos based efficient selective image encryption. Multidimensional Systems and Signal Processing, 2019, 30(2):943–961.

Lin Q, Wang YJ, Wang Q. The image encryption scheme with optional dynamic state variables based on hyperchaotic system. Scientia Sinica (Technologica), 2016, 46(09): 910–918. (in Chinese)

Published

2021-07-08

Issue

Section

Articles