Jump to ContentJump to Main Navigation
Show Summary Details
More options …

International Journal of Nonlinear Sciences and Numerical Simulation

Editor-in-Chief: Birnir, Björn

Editorial Board: Angheluta-Bauer, Luiza / Chen, Xi / Chou, Tom / Grauer, Rainer / Marzocchella, Antonio / Rangarajan, Govindan / Trivisa, Konstantina / Weikard, Rudi / Yang, Xu


IMPACT FACTOR 2017: 1.162

CiteScore 2017: 1.41

SCImago Journal Rank (SJR) 2017: 0.382
Source Normalized Impact per Paper (SNIP) 2017: 0.636

Mathematical Citation Quotient (MCQ) 2017: 0.12

Online
ISSN
2191-0294
See all formats and pricing
More options …
Volume 20, Issue 2

Issues

A Stream/Block Combination Image Encryption Algorithm Using Logistic Matrix to Scramble

Xing-Yuan Wang
  • Corresponding author
  • School of Information Science and Technology, Dalian Maritime University, Dalian 116026, China; School of Electronic & Information Engineering, Dalian University of Technology, Dalian 116024, China
  • Email
  • Other articles by this author:
  • De Gruyter OnlineGoogle Scholar
/ Zhi-Ming Li
Published Online: 2019-01-26 | DOI: https://doi.org/10.1515/ijnsns-2018-0027

Abstract

In this paper, a new chaotic image encryption scheme is proposed, which uses the combination of stream cipher and block cipher to spread and then uses the Logistic mapping matrix to perform the block sort transformation to complete the confusion. The specific method is as follows: First, perform the triple XOR operation, non-linear S-box transformation and linear cyclic shift transformation on the key. Second, the triple XOR operation of the transformed key and the plaintext and Logistic mapping sequence are used to obtain the semi-ciphertext. And set the obtained semi-ciphertext and plaintext as key components of the next round of encryption. Finally, the transformation of sorting and partition of the Logistic mapping matrix are used to confuse the semi-ciphertext. The experimental results show that the proposed algorithm improves the encryption efficiency, has good security and can resist common attacks.

Keywords: Logistic mapping; block confusion; stream cipher; block cipher; image encryption

MSC 2010: 93C10; 68P25

References

  • [1]

    G. Z H, F. Huang and W. Guan, Chaos-based image encryption algorithm, Phys. Lett. A. 346 (1–3) (2005), 153–157.CrossrefWeb of ScienceGoogle Scholar

  • [2]

    C. Wang, X. Wang, Z. Xia et al. Ternary radial harmonic Fourier moments based robust stereo image zero-watermarking algorithm. Information Science. 470 (2019), 109–120.Google Scholar

  • [3]

    Y. Wang, W. K W, X. Liao, et al. A new chaos-based fast image encryption algorithm, Appl. Soft. Comput. 11 (1) (2011), 514–522.Web of ScienceCrossrefGoogle Scholar

  • [4]

    C. Çokal and E. Solak, Cryptanalysis of a chaos-based image encryption algorithm, Phys. Lett. A. 373 (15) (2009), 1357–1360.CrossrefWeb of ScienceGoogle Scholar

  • [5]

    X. Wang, C. Liu and H. Zhang, An effective and fast image encryption algorithm based on chaos and interweaving of ranks, Nonlinear Dyn. 84 (3) (2016), 1595–1607.CrossrefWeb of ScienceGoogle Scholar

  • [6]

    X. Wang and X. Wang, Design of chaotic pseudo-random bit generator and its applications in stream-cipher cryptography, Int. J. Mod. Phys. C. 19 (05) (2008), 813–820.Web of ScienceCrossrefGoogle Scholar

  • [7]

    D. Chakraborty, C. Mancillas-L Pez and P. Sarkar, STES: A stream cipher based low cost scheme for securing stored data, IEEE Trans. Comput. 64 (9) (2015), 2691–2707.CrossrefWeb of ScienceGoogle Scholar

  • [8]

    C. Fu, C. J J, H. Zou, et al. A chaos-based digital image encryption scheme with an improved diffusion strategy, Opt. Express. 20 (3) (2012), 2363–2378.CrossrefWeb of ScienceGoogle Scholar

  • [9]

    F. J S A E, E. J Y, S. S L, et al. A fast chaotic block cipher for image encryption, Commun. Nonlinear. Sci. Numer. Simul. 19 (3) (2014), 578–588.CrossrefGoogle Scholar

  • [10]

    A. Jolfaei and A. Mirghadri, Image encryption using chaos and block cipher, Comput. Inf. Sci. 4 (1) (2010), 172–185.Google Scholar

  • [11]

    X. Mou. Chaotic encryption scheme for real-time digital video. Proceedings of SPIE-The International Society for Optical Engineering, 2002, 4666: 149–160Google Scholar

  • [12]

    D. Yang, X. Liao, Y. Wang, et al. A novel chaotic block cryptosystem based on iterating map with output-feedbac, Chaos Solitons Fractals. 41 (1) (2009), 505–510.CrossrefGoogle Scholar

  • [13]

    M. Matsui, Advances in Cryptology-EUROCRYPT’93, Norway, Springer Berlin Heidelberg, 1994.Google Scholar

  • [14]

    P. N K, V. Patidar and K. K. Sud, Image encryption using chaotic Logistic map, Image Vision Comput. 24 (9) (2006), 926–934.CrossrefGoogle Scholar

  • [15]

    W. C F and Q. Ding, SM4 key scheme algorithm based on chaotic system, Acta Phys. Sin. 62 (2) (2017), 020504.Web of ScienceGoogle Scholar

  • [16]

    S. U. N. A J and W. U. Jun-Feng, The S-box of AES encryption algorithm and its MATLAB implementation, Inf. Technol. 11 (2008), 67–73.Google Scholar

  • [17]

    G. Tang, S., . L. H. Wang, et al. Chaos-based cryptograph incorporated with S-box algebraic operation, Phys. Lett. A. 318 (4–5) (2003), 388–398.CrossrefGoogle Scholar

  • [18]

    I. Hussain, A. N A and T. Shah, Stego optical encryption based on chaotic S-box transformation, Opt. Laser Technol. 61 (3) (2014), 50–56.CrossrefWeb of ScienceGoogle Scholar

  • [19]

    D. Canright, A very compact S-Box for AES, Lect. Notes Comput. Sci. 3659 (2005), 441–455.CrossrefGoogle Scholar

  • [20]

    H. Liu, X. Wang and A. Kadir, Chaos-based color image encryption using one-time keys and choquet fuzzy integral, Int. J. Nonlinear Sci. 15 (1) (2014), 1–10.CrossrefWeb of ScienceGoogle Scholar

  • [21]

    S. Behnia, A. Akhshani, H. Mahmodi, et al. A novel algorithm for image encryption based on mixture of chaotic maps, Chaos Solitons Fractals. 35 (2) (2008), 408–419.Web of ScienceCrossrefGoogle Scholar

  • [22]

    X. Wang, X. Wang, J. Zhao, et al. Chaotic encryption algorithm based on alternant of stream cipher and block cipher, Nonlinear Dyn. 63 (4) (2010), 587–597.Web of ScienceGoogle Scholar

  • [23]

    L. Xu, Z. Li, J. Li, et al. A novel bit-level image encryption algorithm based on chaotic map, Opt. Laser Eng. 78 (21) (2012), 17–25.Google Scholar

  • [24]

    X. Wang and X. Bao, A novel image block cryptosystem based ona spatiotemporal chaotic system and a chaotic neural network, Chin. Phys. B. 22 (5) (2013), 232–240.Google Scholar

  • [25]

    X. Wei, L. Guo, Q. Zhang, et al. A novel color image encryption algorithm based on DNA sequence operation and hyper-chaotic system, J Syst. Software. 85 (2) (2012), 290–299.CrossrefWeb of ScienceGoogle Scholar

  • [26]

    A. L. Rukhin, J. Soto, J. R. Nechvatal, et al. A statistical test suite for random and pseudorandom number generators for cryptographic applications, Nist Spec. Publ. Special Publication (2010), 800–822. Revision 1a.Google Scholar

About the article

Received: 2018-01-27

Accepted: 2019-01-12

Published Online: 2019-01-26

Published in Print: 2019-04-26


Citation Information: International Journal of Nonlinear Sciences and Numerical Simulation, Volume 20, Issue 2, Pages 167–177, ISSN (Online) 2191-0294, ISSN (Print) 1565-1339, DOI: https://doi.org/10.1515/ijnsns-2018-0027.

Export Citation

© 2019 Walter de Gruyter GmbH, Berlin/Boston.Get Permission

Comments (0)

Please log in or register to comment.
Log in