详细信息
Chaotic Image Encryption Using Piecewise-Logistic-Sine Map ( SCI-EXPANDED收录 EI收录)
文献类型:期刊文献
英文题名:Chaotic Image Encryption Using Piecewise-Logistic-Sine Map
作者:Shao, Shanwu[1];Li, Ji[1];Shao, Ping[2];Xu, Gang[3]
第一作者:Shao, Shanwu
通讯作者:Shao, P[1]
机构:[1]Guilin Univ Elect Technol, Sch Comp & Informat Secur, Guilin 541000, Peoples R China;[2]Zhaoqing Univ, Sch Comp Sci & Software, Zhaoqing 526000, Peoples R China;[3]Henan Univ Econ & Law, Sch Comp & Informat Engn, Zhengzhou 450000, Henan, Peoples R China
第一机构:Guilin Univ Elect Technol, Sch Comp & Informat Secur, Guilin 541000, Peoples R China
通讯机构:[1]corresponding author), Zhaoqing Univ, Sch Comp Sci & Software, Zhaoqing 526000, Peoples R China.
年份:2023
卷号:11
起止页码:27477-27488
外文期刊名:IEEE ACCESS
收录:;EI(收录号:20231413842652);Scopus(收录号:2-s2.0-85151364082);WOS:【SCI-EXPANDED(收录号:WOS:000966256200001)】;
基金:This work was supported in part by the Special Program of Key Fields for Ordinary Colleges and Universities in Guangdong Province under Grant 2021ZDZX1028, and in part by the Innovation Key Project of Guangxi Province under Grant AA22068059.
语种:英文
外文关键词:Encryption; Time complexity; Bifurcation; Security; Behavioral sciences; Logistics; Histograms; Piecewise chaotic map; image security; chaos-based encryption; image encryption
摘要:The classical one-dimension chaotic maps are not adequately secure, and some improved maps usually have a high time complexity. To address these problems, this paper presents a new Piecewise-Logistic-Sine map (PLSM). The bifurcation diagrams, Lyapunov exponent, and running time of the proposed PLSM are analyzed, and the outcomes show that it has better chaotic behavior with low time complexity. Furthermore, diffusion by certain rules is vulnerable to attack, so a PLSM-based image encryption scheme with random exclusive OR diffusion is proposed. Using a 256-bit secret key, the initial value and parameters of PLSM are calculated by the key distribution method. Then four chaotic sequences are generated by PLSM, they are used in three rounds of random exclusive OR diffusion. This scheme can spread a small change in the original image to all pixels, and the performance evaluation shows the security of this image encryption scheme.
参考文献:
正在载入数据...