An Image Encryption Scheme Combining 2D Cascaded Logistic Map and Permutation-Substitution Operations

IF 1.9 Q2 MATHEMATICS, INTERDISCIPLINARY APPLICATIONS Computation Pub Date : 2023-09-05 DOI:10.3390/computation11090178
D. Setiadi, Nova Rijati
{"title":"An Image Encryption Scheme Combining 2D Cascaded Logistic Map and Permutation-Substitution Operations","authors":"D. Setiadi, Nova Rijati","doi":"10.3390/computation11090178","DOIUrl":null,"url":null,"abstract":"Confusion, diffusion, and encryption keys affect the quality of image encryption. This research proposes combining bit- and pixel-level permutation and substitution methods based on three advanced chaotic logistic map methods. The three chaotic methods are the 2D Logistic-adjusted-Sine map (2D-LASM), the 2D Logistic-sine-coupling map (2D-LSCM), and the 2D Logistic ICMIC cascade map (2D-LICM). The encryption method’s design consists of six stages of encryption, involving permutation operations based on chaotic order, substitution based on modulus and bitXOR, and hash functions. Hash functions are employed to enhance key space and key sensitivity quality. Several testing tools are utilized to assess encryption performance, including histogram and chi-square analysis, information entropy, correlation of adjacent pixels, differential analysis, key sensitivity and key space analysis, data loss and noise attacks, NIST randomness tests, and TestU01. Compared to using a single 2D logistic map, the amalgamation of bit-level and pixel-level encryption and the utilization of three 2D cascade logistic maps has improved encryption security performance. This method successfully passes the NIST, TestU01, and chi-square tests. Furthermore, it outperforms the previous method regarding correlation, information entropy, NPCR, and UACI tests.","PeriodicalId":52148,"journal":{"name":"Computation","volume":" ","pages":""},"PeriodicalIF":1.9000,"publicationDate":"2023-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computation","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.3390/computation11090178","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"MATHEMATICS, INTERDISCIPLINARY APPLICATIONS","Score":null,"Total":0}
引用次数: 2

Abstract

Confusion, diffusion, and encryption keys affect the quality of image encryption. This research proposes combining bit- and pixel-level permutation and substitution methods based on three advanced chaotic logistic map methods. The three chaotic methods are the 2D Logistic-adjusted-Sine map (2D-LASM), the 2D Logistic-sine-coupling map (2D-LSCM), and the 2D Logistic ICMIC cascade map (2D-LICM). The encryption method’s design consists of six stages of encryption, involving permutation operations based on chaotic order, substitution based on modulus and bitXOR, and hash functions. Hash functions are employed to enhance key space and key sensitivity quality. Several testing tools are utilized to assess encryption performance, including histogram and chi-square analysis, information entropy, correlation of adjacent pixels, differential analysis, key sensitivity and key space analysis, data loss and noise attacks, NIST randomness tests, and TestU01. Compared to using a single 2D logistic map, the amalgamation of bit-level and pixel-level encryption and the utilization of three 2D cascade logistic maps has improved encryption security performance. This method successfully passes the NIST, TestU01, and chi-square tests. Furthermore, it outperforms the previous method regarding correlation, information entropy, NPCR, and UACI tests.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
一种结合二维级联Logistic映射和置换置换运算的图像加密方案
混淆、扩散和加密密钥会影响图像加密的质量。本研究在三种先进的混沌逻辑图方法的基础上,提出了结合比特和像素级排列和替换方法。这三种混沌方法分别是二维逻辑调整正弦映射(2D-LASM)、二维逻辑正弦耦合映射(2D_LSCM)和二维逻辑ICMIC级联映射(2D-LICM)。加密方法的设计包括六个加密阶段,包括基于混沌顺序的置换运算、基于模数和位XOR的替换以及哈希函数。采用哈希函数来增强密钥空间和密钥敏感度质量。使用多种测试工具来评估加密性能,包括直方图和卡方分析、信息熵、相邻像素的相关性、差分分析、密钥敏感性和密钥空间分析、数据丢失和噪声攻击、NIST随机性测试和TestU01。与使用单个2D逻辑图相比,比特级和像素级加密的融合以及三个2D级联逻辑图的使用提高了加密安全性能。该方法成功通过了NIST、TestU01和卡方测试。此外,它在相关性、信息熵、NPCR和UACI测试方面优于以前的方法。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
Computation
Computation Mathematics-Applied Mathematics
CiteScore
3.50
自引率
4.50%
发文量
201
审稿时长
8 weeks
期刊介绍: Computation a journal of computational science and engineering. Topics: computational biology, including, but not limited to: bioinformatics mathematical modeling, simulation and prediction of nucleic acid (DNA/RNA) and protein sequences, structure and functions mathematical modeling of pathways and genetic interactions neuroscience computation including neural modeling, brain theory and neural networks computational chemistry, including, but not limited to: new theories and methodology including their applications in molecular dynamics computation of electronic structure density functional theory designing and characterization of materials with computation method computation in engineering, including, but not limited to: new theories, methodology and the application of computational fluid dynamics (CFD) optimisation techniques and/or application of optimisation to multidisciplinary systems system identification and reduced order modelling of engineering systems parallel algorithms and high performance computing in engineering.
期刊最新文献
Analytical and Numerical Investigation of Two-Dimensional Heat Transfer with Periodic Boundary Conditions Enhancement of Machine-Learning-Based Flash Calculations near Criticality Using a Resampling Approach Corporate Bankruptcy Prediction Models: A Comparative Study for the Construction Sector in Greece Analysis of Effectiveness of Combined Surface Treatment Methods for Structural Parts with Holes to Enhance Their Fatigue Life A New Mixed Fractional Derivative with Applications in Computational Biology
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1