A Novel Image Encryption Scheme Based on Clifford Attractor and Noisy Logistic Map for Secure Transferring Images in Navy

Mohadeseh Kanafchian , Behrouz Fathi-Vajargah
{"title":"A Novel Image Encryption Scheme Based on Clifford Attractor and Noisy Logistic Map for Secure Transferring Images in Navy","authors":"Mohadeseh Kanafchian ,&nbsp;Behrouz Fathi-Vajargah","doi":"10.1016/j.enavi.2017.05.007","DOIUrl":null,"url":null,"abstract":"<div><p>Cryptography is a science to maintain the security of the message by changing data or information into a different form, so the message cannot be recognized. Today, many algorithms have been proposed for image encryption, but the chaotic encryption methods have a good combination of speed and high security. In recent years, the chaos based cryptographic algorithms have suggested some new and efficient ways to develop secure image encryption techniques. The chaos-based encryption schemes are composed of two steps: chaotic confusion and pixel diffusion. In the chaotic confusion stage, a combination of the chaotic maps is used to realize the confusion of all pixels.</p><p>In this paper, we first give a brief introduction into chaotic image encryption and then we investigate some important properties and behaviour of the logistic map. The logistic map, aperiodic trajectory, or random-like fluctuation, could not be obtained with some choice of initial condition. Therefore, a noisy logistic map with an additive system noise is introduced. The proposed scheme is based on the extended map of the Clifford strange attractor, where each dimension has a specific role in the encryption process. Two dimensions are used for pixel permutation and the third dimension is used for pixel diffusion. In order to optimize the Clifford encryption system we increase the space key by using the noisy logistic map and a novel encryption scheme based on the Clifford attractor and the noisy logistic map for secure transfer images is proposed. This algorithm consists of two parts: the noisy logistic map shuffle of the pixel position and the pixel value. We use times for shuffling the pixel position and value then we generate the new pixel position and value by the Clifford system. To illustrate the efficiency of the proposed scheme, various types of security analysis are tested. It can be concluded that the proposed image encryption system is a suitable choice for practical applications.</p></div>","PeriodicalId":100696,"journal":{"name":"International Journal of e-Navigation and Maritime Economy","volume":"6 ","pages":"Pages 53-63"},"PeriodicalIF":0.0000,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/j.enavi.2017.05.007","citationCount":"19","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of e-Navigation and Maritime Economy","FirstCategoryId":"1085","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2405535217300074","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 19

Abstract

Cryptography is a science to maintain the security of the message by changing data or information into a different form, so the message cannot be recognized. Today, many algorithms have been proposed for image encryption, but the chaotic encryption methods have a good combination of speed and high security. In recent years, the chaos based cryptographic algorithms have suggested some new and efficient ways to develop secure image encryption techniques. The chaos-based encryption schemes are composed of two steps: chaotic confusion and pixel diffusion. In the chaotic confusion stage, a combination of the chaotic maps is used to realize the confusion of all pixels.

In this paper, we first give a brief introduction into chaotic image encryption and then we investigate some important properties and behaviour of the logistic map. The logistic map, aperiodic trajectory, or random-like fluctuation, could not be obtained with some choice of initial condition. Therefore, a noisy logistic map with an additive system noise is introduced. The proposed scheme is based on the extended map of the Clifford strange attractor, where each dimension has a specific role in the encryption process. Two dimensions are used for pixel permutation and the third dimension is used for pixel diffusion. In order to optimize the Clifford encryption system we increase the space key by using the noisy logistic map and a novel encryption scheme based on the Clifford attractor and the noisy logistic map for secure transfer images is proposed. This algorithm consists of two parts: the noisy logistic map shuffle of the pixel position and the pixel value. We use times for shuffling the pixel position and value then we generate the new pixel position and value by the Clifford system. To illustrate the efficiency of the proposed scheme, various types of security analysis are tested. It can be concluded that the proposed image encryption system is a suitable choice for practical applications.

查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
一种基于Clifford吸引子和噪声Logistic映射的海军图像安全传输加密方案
密码学是一门通过将数据或信息更改为不同的形式来维护消息安全性的科学,因此消息无法被识别。目前,已经提出了许多图像加密算法,但混沌加密方法具有速度快、安全性高等优点。近年来,基于混沌的加密算法为图像安全加密技术的发展提供了一些新的、有效的途径。基于混沌的加密方案由混沌混淆和像素扩散两个步骤组成。在混沌混淆阶段,使用混沌映射的组合来实现所有像素的混淆。本文首先简要介绍了混沌图像加密,然后研究了逻辑映射的一些重要性质和行为。逻辑图、非周期轨迹或随机波动在一定初始条件下是无法得到的。因此,引入了一种带有附加系统噪声的有噪声逻辑映射。该方案基于Clifford奇异吸引子的扩展映射,其中每个维度在加密过程中都有特定的作用。二维用于像素排列,三维用于像素扩散。为了优化Clifford加密系统,我们利用噪声逻辑映射增加空间密钥,并提出了一种基于Clifford吸引子和噪声逻辑映射的安全传输图像加密方案。该算法由两个部分组成:像素位置的噪声逻辑映射洗牌和像素值的洗牌。我们使用时间对像素位置和值进行洗牌,然后通过Clifford系统生成新的像素位置和值。为了说明该方案的有效性,对各种类型的安全分析进行了测试。结果表明,所提出的图像加密系统在实际应用中是一种合适的选择。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Analysis of on-board Job Taking and Separation of Korean Merchant Seafarers Resource Sharing in the Logistics of the Offshore Wind Farm Installation Process based on a Simulation Study Design of Course-Keeping Controller for a Ship Based on Backstepping and Neural Networks Azimuth method for ship position in celestial navigation Evaluating Wave Random Path Using Multilevel Monte Carlo
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1