A Novel Delay Linear Coupling Logistics Map Model for Color Image Encryption
Autor: | Benshun Yin, Tongfeng Zhang, Yide Ma, Shouliang Li, Ding Weikang |
---|---|
Jazyk: | angličtina |
Rok vydání: | 2018 |
Předmět: |
delay and linearly coupled Logistic chaotic map
Computer science chaos Chaotic General Physics and Astronomy lcsh:Astrophysics 02 engineering and technology Lyapunov exponent Encryption 01 natural sciences Article Image (mathematics) Scrambling symbols.namesake 0103 physical sciences lcsh:QB460-466 0202 electrical engineering electronic engineering information engineering Chosen-plaintext attack 010306 general physics lcsh:Science Computer Science::Cryptography and Security business.industry Key space 020206 networking & telecommunications image encryption lcsh:QC1-999 Key (cryptography) symbols lcsh:Q business Algorithm lcsh:Physics |
Zdroj: | Entropy, Vol 20, Iss 6, p 463 (2018) Entropy Volume 20 Issue 6 |
ISSN: | 1099-4300 |
Popis: | With the popularity of the Internet, the transmission of images has become more frequent. It is of great significance to study efficient and secure image encryption algorithms. Based on traditional Logistic maps and consideration of delay, we propose a new one-dimensional (1D) delay and linearly coupled Logistic chaotic map (DLCL) in this paper. Time delay is a common phenomenon in various complex systems in nature, and it will greatly change the dynamic characteristics of the system. The map is analyzed in terms of trajectory, Lyapunov exponent (LE) and Permutation entropy (PE). The results show that this map has wide chaotic range, better ergodicity and larger maximum LE in comparison with some existing chaotic maps. A new method of color image encryption is put forward based on DLCL. In proposed encryption algorithm, after various analysis, it has good encryption performance, and the key used for scrambling is related to the original image. It is illustrated by simulation results that the ciphered images have good pseudo randomness through our method. The proposed encryption algorithm has large key space and can effectively resist differential attack and chosen plaintext attack. |
Databáze: | OpenAIRE |
Externí odkaz: | |
Nepřihlášeným uživatelům se plný text nezobrazuje | K zobrazení výsledku je třeba se přihlásit. |