首页 | 本学科首页   官方微博 | 高级检索  
     检索      


Novel image encryption algorithm based on cycle shift and chaotic system
Institution:1. Faculty of Electronic Information and Electrical Engineering, Dalian University of Technology, Dalian 116024, China;2. City Institute, Dalian University of Technology, Dalian 116600, China;1. School of Information Science and Engineering, Northeastern University, China;2. Software College, Northeastern University, China;1. Department of Electronic Information Engineering, Nanchang University, Nanchang 330031, China;2. Jiangxi Province Key Laboratory of Image Processing and Pattern Recognition, Nanchang Hangkong University, Nanchang 330063, China;3. Information Security Center, Beijing University of Posts and Telecommunications, Beijing 100876, China;4. School of Computer and Information Engineering, Jiangxi Agricultural University, Nanchang 330045, China;1. Faculty of Electronic Information and Electrical Engineering, Dalian University of Technology, Dalian 116024, China;2. City Institute, Dalian University of Technology, Dalian 116600, China;1. Faculty of Electronic Information and Electrical Engineering, Dalian University of Technology, Dalian 116024, China;2. City Institute, Dalian University of Technology, Dalian 116600, China;1. Faculty of Electronic Information and Electrical Engineering, Dalian University of Technology, Dalian 116024, China;2. City Institute, Dalian University of Technology, Dalian 116600, China
Abstract:In this paper, a novel image encryption algorithm is proposed. The cycle shift in bits of pixels and the chaotic system are employed for the encryption of the proposed scheme. For cycle shift operations, random integers with the same size of the original image are produced to scramble the plaintext image. Moreover, the scrambled image effects the initial values of the chaotic system for the further encryption process, which increases the sensitivity of plaintext images of the scheme. The scrambled image is encrypted into the ciphered image by the keys which are produced by the chaotic system. The simulation experiments and theoretical analyses indicate that the proposed scheme is superior and able to resist exhaustive attack and statistical attack.
Keywords:Image encryption  Cycle shift  Chaotic system
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号