A chaotic image encryption algorithm based on perceptron model

Based on the high-dimension Lorenz chaotic system and perceptron model within a neural network, a chaotic image encryption system with a perceptron model is proposed. This paper describes the algorithm flow in detail, and analyses the cryptographic security. The experimental results show that this algorithm has high security, and strong resistance to the existing attack methods.

[1]  E. Lorenz Deterministic nonperiodic flow , 1963 .

[2]  Carroll,et al.  Synchronization in chaotic systems. , 1990, Physical review letters.

[3]  Ying-Cheng Lai,et al.  Controlling chaos , 1994 .

[4]  M. Baptista Cryptography with chaos , 1998 .

[5]  E. Alvarez,et al.  New approach to chaotic encryption , 1999 .

[6]  Vinod Patidar,et al.  Discrete chaotic cryptography using external key , 2003 .

[7]  G. Álvarez,et al.  Cryptanalysis of a discrete chaotic cryptosystem using external key , 2003 .

[8]  Moez Feki,et al.  Secure digital communication using discrete-time chaos synchronization , 2003 .

[9]  Kwok-Wo Wong,et al.  Baptista-type chaotic cryptosystems: problems and countermeasures , 2004, Physics Letters A.

[10]  Vinod Patidar,et al.  Cryptography using multiple one-dimensional chaotic maps , 2005 .

[11]  A New Chaotic Encryption Algorithm Based on Ergodicity , 2006 .

[12]  M. Buscema,et al.  Introduction to artificial neural networks. , 2007, European journal of gastroenterology & hepatology.

[13]  Adda Ali-Pacha,et al.  Lorenz’s attractor applied to the stream cipher (Ali-Pacha generator) , 2007 .

[14]  A. Akhavan,et al.  A fast chaotic encryption scheme based on piecewise nonlinear chaotic maps , 2007 .

[15]  Kwok-Wo Wong,et al.  Cryptanalysis of a cryptosystem using multiple one-dimensional chaotic maps , 2007 .

[16]  Chen Guan-Rong,et al.  Chaos synchronization of Rikitake chaotic attractor using the passive control technique , 2008 .

[17]  Wei Zhang,et al.  Chaotic synchronization and secure communication based on descriptor observer , 2009 .