We develop a two-dimensional enhanced hyperchaotic Henon map (2D-EHHM) to overcome the problems of small chaotic range and poor security when the 2-D traditional Henon map is implemented in cryptosystems. The performance evaluations show that the 2D-EHHM has wider chaotic range, higher chaotic complexity, better ergodicity, and hyperchaotic behavior compared with certain existing chaotic maps. Based on the 2D-EHHM, we further design an efficient image encryption algorithm consisting of a multiple block substitution stage (MBSS) and a bidirectional-dynamic diffusion stage (BDDS). In the MBSS, a plain image is divided into several nonoverlapping multiple blocks to carry out permutation operation. In the BDDS, the scrambled image is redivided into nonoverlapping sub-blocks of the same size to be diffused dynamically in the forward and backward directions. Moreover, the SHA 512 function is employed to obtain a 512-bit plain image hash value treated as a raw key. A variable-length secret key (at least 128 bits), which is dynamically selected from the raw key and regarded as a valid key, is utilized to generate the initial values for the chaotic system. Simulation results and security analysis show that the proposed algorithm can resist various cryptanalytic attacks and can be applied to real-time data transmission.
A color image encryption algorithm is proposed based on the position index and chaos theory. First, the plain image is decomposed into its constituent red, green, and blue channels, each of which is resized to form one-dimensional arrays. Then, a permutation mechanism based on the position index values is introduced to effectively decrease the correlation between adjacent pixels by dynamically swapping the pixels of the three components. The Tent–Sine system is employed as a pseudorandom sequence generator to provide chaotic sequences in which the initial values and parameters are calculated from the Secure Hash Algorithm (SHA)-256 hash of the plain image. As a result, the algorithm is sensitive to the plain image. In addition, in contrast to the traditional ciphertext feedback mode, each pixel is modified based on the order of the position index sequences. The results of experimental simulations and extensive cryptanalyses indicate that the algorithm satisfactorily resists various typical attacks.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.