Image encryption based on hyper-chaotic multi-attractors

Linear time-delay feedback method makes the stable system generate the infinite-dimensional hyper-chaos, which possesses more than one positive Lyapunov exponent, infinite-dimensional, a wider chaotic parameter range, and multi-attractors, including the single-scroll attractor, the double-scroll attractor, and the composite multi-scroll attractor. The infinite-dimensional hyper-chaotic multi-attractors Chen system generated by linear time-delay feedback (HCMACS) is used for image encryption. Firstly, the state time sequences of the infinite-dimensional HCMACS are preprocessed to achieve the ideal statistical property. Secondly, two random matrices generated by random number generators are used to expand the image size. Finally, the preprocessed chaotic sequences are used to confuse and diffuse the expanded digital image to obtain the encrypted image. The special feature of the proposed method is the theoretically infinite-dimensional secret key space. Results of analysis and computer simulation indicate that the encryption algorithm has good encryption performance, which can effectively resist various attacks.

[1]  Yue Wu,et al.  Image encryption using the two-dimensional logistic chaotic map , 2012, J. Electronic Imaging.

[2]  Zhiliang Zhu,et al.  Exploiting self-adaptive permutation-diffusion and DNA random encoding for secure and efficient image encryption , 2018, Signal Process..

[3]  Olcay Taner Yildiz,et al.  Cryptanalysis of Fridrich's Chaotic Image Encryption , 2010, Int. J. Bifurc. Chaos.

[4]  Qixiang Mei,et al.  An efficient pixel-level chaotic image encryption algorithm , 2018, Nonlinear Dynamics.

[5]  Ana Cristina Dascalescu,et al.  A new hyperchaotic map and its application in an image encryption scheme , 2014, Signal Process. Image Commun..

[6]  Gang Hu,et al.  Chaos-based secure communications in a large community. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.

[7]  Celso Grebogi,et al.  Dynamics of delay induced composite multi-scroll attractor and its application in encryption , 2017 .

[8]  Kevin M. Short,et al.  Steps Toward Unmasking Secure Communications , 1994 .

[9]  Guanrong Chen,et al.  Dynamical Analysis of a New Chaotic Attractor , 2002, Int. J. Bifurc. Chaos.

[10]  X. Mou,et al.  On the security of a chaotic encryption scheme: problems with computerized chaos in finite computing precision , 2003 .

[11]  H. Ren,et al.  Heteroclinic orbits in Chen circuit with time delay , 2010 .

[12]  Kwok-Wo Wong,et al.  An image encryption scheme using reverse 2-dimensional chaotic map and dependent diffusion , 2013, Commun. Nonlinear Sci. Numer. Simul..

[13]  Guanrong Chen,et al.  YET ANOTHER CHAOTIC ATTRACTOR , 1999 .

[14]  S. Li,et al.  On the security of a new image encryption scheme based on chaotic map lattices. , 2008, Chaos.

[15]  Hayder Natiq,et al.  A new hyperchaotic map and its application for image encryption , 2018, The European Physical Journal Plus.

[16]  Hong Zhou,et al.  Problems with the chaotic inverse system encryption approach , 1997 .

[17]  E. Solak,et al.  Cryptanalysis of a chaos-based image encryption algorithm , 2009 .

[18]  Safya Belghith,et al.  Cryptanalysis of a new substitution–diffusion based image cipher , 2010 .

[19]  Liu Ding,et al.  Anticontrol of chaos via direct time delay feedback , 2006 .

[20]  Guodong Ye,et al.  Image scrambling encryption algorithm of pixel bit based on chaos map , 2010, Pattern Recognit. Lett..

[21]  S. Li,et al.  Cryptographic requirements for chaotic secure communications , 2003, nlin/0311039.

[22]  Guanrong Chen,et al.  Bifurcation Analysis of Chen's equation , 2000, Int. J. Bifurc. Chaos.

[23]  Yicong Zhou,et al.  A new 1D chaotic system for image encryption , 2014, Signal Process..

[24]  Xing-Yuan Wang,et al.  A new image encryption algorithm based on non-adjacent coupled map lattices , 2015, Appl. Soft Comput..

[25]  Celso Grebogi,et al.  Secure Communication Based on Hyperchaotic Chen System with Time-Delay , 2017, Int. J. Bifurc. Chaos.

[26]  Safwan El Assad,et al.  Comparative Study of 1-D Chaotic Generators for Digital Data Encryption , 2008 .

[27]  Lin Teng,et al.  A novel colour image encryption algorithm based on chaos , 2012, Signal Process..

[28]  Yicong Zhou,et al.  2D Sine Logistic modulation map for image encryption , 2015, Inf. Sci..

[29]  Gonzalo Alvarez,et al.  Comment on “Image encryption with chaotically coupled chaotic maps” , 2010 .

[30]  Gonzalo Álvarez,et al.  Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems , 2003, Int. J. Bifurc. Chaos.

[31]  Kwok-Wo Wong,et al.  An efficient entire chaos-based scheme for deniable authentication , 2005 .

[32]  Li Li,et al.  A new approach to chaotic image encryption based on quantum chaotic system, exploiting color spaces , 2013, Signal Process..