×

zbMATH — the first resource for mathematics

A chaotic image encryption scheme based on Hénon-Chebyshev modulation map and genetic operations. (English) Zbl 1445.37076
MSC:
37N99 Applications of dynamical systems
94A60 Cryptography
Software:
TestU01
PDF BibTeX XML Cite
Full Text: DOI
References:
[1] Álvarez, G. & Li, S. [2006] “ Some basic cryptographic requirements for chaos-based cryptosystems,” Int. J. Bifurcation and Chaos16, 2129-2151. · Zbl 1192.94088
[2] Chai, X., Gan, Z., Yuan, K., Chen, Y. & Liu, X. [2019] “ A novel image encryption scheme based on DNA sequence operations and chaotic systems,” Neural Comput. Appl.31, 219-237.
[3] Chen, G., Mao, Y. & Chui, C. K. [2004] “ A symmetric image encryption scheme based on 3D chaotic cat maps,” Chaos Solit. Fract.21, 749-761. · Zbl 1049.94009
[4] Chen, J., Han, F., Qian, W., Yao, Y.-D. & Zhu, Z.-L. [2018a] “ Cryptanalysis and improvement in an image encryption scheme using combination of the 1D chaotic map,” Nonlin. Dyn.93, 2399-2413.
[5] Chen, J., Zhu, Z.-L., Zhang, L.-B., Zhang, Y. & Yang, B.-Q. [2018b] “ Exploiting self-adaptive permutation-diffusion and DNA random encoding for secure and efficient image encryption,” Sign. Process.142, 340-353.
[6] Diaconu, A.-V. [2016] “ Circular inter-intra pixels bit-level permutation and chaos-based image encryption,” Inform. Sci.355, 314-327.
[7] Fan, H., Li, M., Liu, D. & Zhang, E. [2018] “ Cryptanalysis of a colour image encryption using chaotic APFM nonlinear adaptive filter,” Sign. Process.143, 28-41.
[8] Hsiao, H.-I. & Lee, J. [2015] “ Color image encryption using chaotic nonlinear adaptive filter,” Sign. Process.117, 281-309.
[9] Hu, T., Liu, Y., Gong, L.-H., Guo, S.-F. & Yuan, H.-M. [2017] “ Chaotic image cryptosystem using DNA deletion and DNA insertion,” Sign. Process.134, 234-243.
[10] Hua, Z. & Zhou, Y. [2016] “ Image encryption using 2D logistic-adjusted-sine map,” Inform. Sci.339, 237-253.
[11] Hua, Z., Xu, B., Jin, F. & Huang, H. [2019a] “ Image encryption using Josephus problem and filtering diffusion,” IEEE Access7, 8660-8674.
[12] Hua, Z., Zhou, Y. & Huang, H. [2019b] “ Cosine-transform-based chaotic system for image encryption,” Inform. Sci.480, 403-419.
[13] Lan, R., He, J., Wang, S., Gu, T. & Luo, X. [2018] “ Integrated chaotic systems for image encryption,” Sign. Process.147, 133-145.
[14] L’Ecuyer, P. & Simard, R. [2007] “ TestU01: A C library for empirical testing of random number generators,” ACM Trans. Math. Softw.33, 22.
[15] Lee, W.-K., Phan, R. C.-W., Yap, W.-S. & Goi, B.-M. [2018] “ Spring: A novel parallel chaos-based image encryption scheme,” Nonlin. Dyn.92, 575-593.
[16] Li, C., Lin, D., Feng, B., Lü, J. & Hao, F. [2018a] “ Cryptanalysis of a chaotic image encryption algorithm based on information entropy,” IEEE Access6, 75834-75842.
[17] Li, C., Lin, D., Lü, J. & Hao, F. [2018b] “ Cryptanalyzing an image encryption algorithm based on autoblocking and electrocardiography,” IEEE MultiMedia25, 46-56.
[18] Li, B., Liao, X. & Jiang, Y. [2019a] “ A novel image encryption scheme based on improved random number generator and its implementation,” Nonlin. Dyn.95, 1781-1805. · Zbl 1432.68531
[19] Li, C., Feng, B., Li, S., Kurths, J. & Chen, G. [2019b] “Dynamic analysis of digital chaotic maps via state-mapping networks,” IEEE Trans. Circuits Syst.-I: Reg. Papers66, 2322-2335.
[20] Li, C., Zhang, Y. & Xie, E. Y. [2019c] “ When an attacker meets a cipher-image in 2018: A year in review,” J. Inform. Secur. Appl.48, 102361.
[21] Liang, J., Qin, Z., Xiao, S., Ou, L. & Lin, X. [2019] “ Efficient and secure decision tree classification for cloud-assisted online diagnosis services,” IEEE Trans. Depend. Secur. Comput.. https://doi.org/10.1109/TDSC.2019.2922958
[22] Liao, X., Li, X., Pen, J. & Chen, G. [2004] “ A digital secure image communication scheme based on the chaotic chebyshev map,” Int. J. Commun. Syst.17, 437-445.
[23] Liao, X., Li, K. & Yin, J. [2017] “ Separable data hiding in encrypted image based on compressive sensing and discrete fourier transform,” Multimed. Tools Appl.76, 20739-20753.
[24] Liu, H., Wen, F. & Kadir, A. [2019a] “ Construction of a new 2D Chebyshev-Sine map and its application to color image encryption,” Multimed. Tools Appl.78, 15997-16010.
[25] Liu, Y., Qin, Z. & Wu, J. [2019b] “ Cryptanalysis and enhancement of an image encryption scheme based on bit-plane extraction and multiple chaotic maps,” IEEE Access7, 74070-74080.
[26] Luo, Y., Liu, Y., Liu, J., Ouyang, X., Cao, Y. & Ding, X. [2019] “ ECM-IBS: A Chebyshev map-based broadcast authentication for wireless sensor networks,” Int. J. Bifurcation and Chaos29, 1950118-1-16. · Zbl 1430.94081
[27] Lv, X., Liao, X. & Yang, B. [2018] “ A novel pseudo-random number generator from coupled map lattice with time-varying delay,” Nonlin. Dyn.94, 325-341.
[28] Ou, L., Qin, Z., Liao, S., Hong, Y. & Jia, X. [2018] “ Releasing correlated trajectories: Towards high utility and optimal differential privacy,” IEEE Trans. Depend. Secur. Comput.. https://doi.org/10.1109/TDSC.2018.2853105
[29] Pak, C. & Huang, L. [2017] “ A new color image encryption using combination of the 1D chaotic map,” Sign. Process.138, 129-137.
[30] Panwar, K., Purwar, R. K. & Jain, A. [2019] “ Cryptanalysis and improvement of a color image encryption scheme based on DNA sequences and multiple 1D chaotic maps,” Int. J. Bifurcation and Chaos29, 1950103-1-24. · Zbl 1419.94009
[31] Qi, G. & Chen, G. [2006] “ Analysis and circuit implementation of a new 4D chaotic system,” Phys. Lett. A352, 386-397. · Zbl 1187.37050
[32] Qin, Z., Chen, F., Wang, Q., Liu, A. X. & Qin, Z. [2012] “ Towards high performance security policy evaluation,” J. Supercomput.59, 1577-1595.
[33] Sahari, M. L. & Boukemara, I. [2018] “ A pseudo-random numbers generator based on a novel 3D chaotic map with an application to color image encryption,” Nonlin. Dyn.94, 723-744.
[34] Seyedzadeh, S. M. & Mirzakuchaki, S. [2012] “ A fast color image encryption algorithm based on coupled two-dimensional piecewise chaotic map,” Sign. Process.92, 1202-1215.
[35] Ullah, A., Jamal, S. S. & Shah, T. [2018] “ A novel scheme for image encryption using substitution box and chaotic system,” Nonlin. Dyn.91, 359-370.
[36] Wang, X. & Zhang, H.-L. [2016] “ A novel image encryption algorithm based on genetic recombination and hyper-chaotic systems,” Nonlin. Dyn.83, 333-346.
[37] Wang, N., Li, C., Bao, H., Chen, M. & Bao, B. [2019] “Generating multi-scroll Chua’s attractors via simplified piecewise-linear Chua’s diode,” IEEE Trans. Circuits Syst.-I: Reg. Papers66, 1-14.
[38] Wu, Y., Noonan, J. P. & Agaian, S. [2011] “ NPCR and UACI randomness tests for image encryption,” J. Sel. Areas Telecommun. (JSAT)1, 31-38.
[39] Wu, J., Liao, X. & Yang, B. [2018a] “ Cryptanalysis and enhancements of image encryption based on three-dimensional bit matrix permutation,” Sign. Process.142, 292-300.
[40] Wu, J., Liao, X. & Yang, B. [2018b] “ Image encryption using 2D Hénon-Sine map and DNA approach,” Sign. Process.153, 11-23.
[41] Xie, E. Y., Li, C., Yu, S. & Lü, J. [2017] “ On the cryptanalysis of Fridrich’s chaotic image encryption scheme,” Sign. Process.132, 150-154.
[42] Yang, Q. & Bai, M. [2017] “ A new 5D hyperchaotic system based on modified generalized Lorenz system,” Nonlin. Dyn.88, 189-221. · Zbl 1373.34075
[43] Yap, W.-S., Phan, R. C.-W., Yau, W.-C. & Heng, S.-H. [2015] “ Cryptanalysis of a new image alternate encryption algorithm based on chaotic map,” Nonlin. Dyn.80, 1483-1491. · Zbl 1351.94073
[44] Ye, G. & Huang, X. [2017a] “ An efficient symmetric image encryption algorithm based on an intertwining logistic map,” Neurocomputing251, 45-53.
[45] Ye, G. & Huang, X. [2017b] “ Spatial image encryption algorithm based on chaotic map and pixel frequency,” Sci. China Inform. Sci.61, 058104.
[46] Yin, H., Qin, Z., Ou, L. & Li, K. [2017] “ A query privacy-enhanced and secure search scheme over encrypted data in cloud computing,” J. Comput. Syst. Sci.90, 14-27. · Zbl 1374.68194
[47] Yin, Q. & Wang, C. [2018] “ A new chaotic image encryption scheme using breadth-first search and dynamic diffusion,” Int. J. Bifurcation and Chaos28, 1850047-1-13. · Zbl 1391.94111
[48] Zhang, X., Zhao, Z. & Wang, J. [2014] “ Chaotic image encryption based on circular substitution box and key stream buffer,” Sign. Process.: Image Commun.29, 902-913.
[49] Zhu, C. [2012] “ A novel image encryption scheme based on improved hyperchaotic sequences,” Opt. Commun.285, 29-37.
[50] Zhu, H., Qi, W., Ge, J. & Liu, Y. [2018] “ Analyzing Devaney chaos of a sine-cosine compound function system,” Int. J. Bifurcation and Chaos28, 1850176-1-13. · Zbl 1410.37043
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. It attempts to reflect the references listed in the original paper as accurately as possible without claiming the completeness or perfect precision of the matching.