Paper
19 July 2024 A novel image encryption system based on chaotic system and index mapping
Yuhang Rao
Author Affiliations +
Proceedings Volume 13213, International Conference on Image Processing and Artificial Intelligence (ICIPAl 2024); 132133N (2024) https://doi.org/10.1117/12.3035300
Event: International Conference on Image Processing and Artificial Intelligence (ICIPAl2024), 2024, Suzhou, China
Abstract
This paper presents the introduction of an innovative chaotic system termed ECNCM, which is based on two improved chaos models, improves the chaos of the model, and uses it as a new PRNG. Consequently, a novel image encryption technique has been crafted. The initial step involves generating a primary key, which is associated with the plaintext, using the SHA-256 hash of the plaintext image and additional relevant manipulations. Then a chaos matrix is generated based on the key, and the plaintext is encrypted through an index mapping algorithm. The image is scrambled for pixels, and finally the ciphertext image is obtained through encryption operations based on the chaotic array generated by ECNCM. The security of the algorithm is improved through the substitution-permutation network. The algorithm was tested and analyzed based on experiments. The experimental outcomes demonstrate that the algorithm provides notable effectiveness in encryption and strong security attributes, successfully protecting the data against common types of assaults, such as chosen plaintext attacks and noise injection attacks.
(2024) Published by SPIE. Downloading of the abstract is permitted for personal use only.
Yuhang Rao "A novel image encryption system based on chaotic system and index mapping", Proc. SPIE 13213, International Conference on Image Processing and Artificial Intelligence (ICIPAl 2024), 132133N (19 July 2024); https://doi.org/10.1117/12.3035300
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Image encryption

Image processing

Complex systems

Evolutionary algorithms

Diffusion

Computer security

Chaos

RELATED CONTENT


Back to Top