An Effective Chaos-Based Image Encryption Scheme Using Imitating Jigsaw Method

In this paper, an efficient chaos-based image encryption scheme is proposed, which uses the imitating jigsaw method containing revolving and shifting operations. In this scheme, there are three processes in encryption: preprocessing, encryption process, and postprocessing. In the preprocessing, the...

Full description

Saved in:
Bibliographic Details
Main Authors: Zhen Li, Changgen Peng, Weijie Tan, Liangrong Li
Format: Article
Language:English
Published: Wiley 2021-01-01
Series:Complexity
Online Access:http://dx.doi.org/10.1155/2021/8824915
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1832560105036447744
author Zhen Li
Changgen Peng
Weijie Tan
Liangrong Li
author_facet Zhen Li
Changgen Peng
Weijie Tan
Liangrong Li
author_sort Zhen Li
collection DOAJ
description In this paper, an efficient chaos-based image encryption scheme is proposed, which uses the imitating jigsaw method containing revolving and shifting operations. In this scheme, there are three processes in encryption: preprocessing, encryption process, and postprocessing. In the preprocessing, the original image is partitioned into 64 × 64 pixel image blocks and then randomly revolved and shifted under control sequences which are generated by the hyperchaotic Lorenz system whose initial conditions are calculated by original image and keys. Therefore, the preprocessing is sensitive to plain image against differential attacks. In the encryption process, the after-preprocessing image is partitioned into 32 × 32 pixel image blocks; next they are randomly revolved and encrypted by control sequence and key blocks which are generated by the skew tent map. In postprocessing, the after-encryption image is partitioned into 16 × 16 pixels’ image blocks, and they are randomly revolved and shifted again under control sequences which are related with encrypted image and keys. The postprocessing further increases the diffusion characteristics. Moreover, the test experiment and security analyses are given; the results show that our proposed cryptosystem has both security and speed performance.
format Article
id doaj-art-502b91fbc5404c8d9a50a1d5bb9c40cf
institution Kabale University
issn 1076-2787
1099-0526
language English
publishDate 2021-01-01
publisher Wiley
record_format Article
series Complexity
spelling doaj-art-502b91fbc5404c8d9a50a1d5bb9c40cf2025-02-03T01:28:24ZengWileyComplexity1076-27871099-05262021-01-01202110.1155/2021/88249158824915An Effective Chaos-Based Image Encryption Scheme Using Imitating Jigsaw MethodZhen Li0Changgen Peng1Weijie Tan2Liangrong Li3College of Computer Science and Technology, State Key Laboratory of Public Big Data, Guizhou University, Guiyang 550025, ChinaCollege of Computer Science and Technology, State Key Laboratory of Public Big Data, Guizhou University, Guiyang 550025, ChinaCollege of Computer Science and Technology, State Key Laboratory of Public Big Data, Guizhou University, Guiyang 550025, ChinaCollege of Big Data and Information Engineering, Guizhou University, Guiyang 550025, ChinaIn this paper, an efficient chaos-based image encryption scheme is proposed, which uses the imitating jigsaw method containing revolving and shifting operations. In this scheme, there are three processes in encryption: preprocessing, encryption process, and postprocessing. In the preprocessing, the original image is partitioned into 64 × 64 pixel image blocks and then randomly revolved and shifted under control sequences which are generated by the hyperchaotic Lorenz system whose initial conditions are calculated by original image and keys. Therefore, the preprocessing is sensitive to plain image against differential attacks. In the encryption process, the after-preprocessing image is partitioned into 32 × 32 pixel image blocks; next they are randomly revolved and encrypted by control sequence and key blocks which are generated by the skew tent map. In postprocessing, the after-encryption image is partitioned into 16 × 16 pixels’ image blocks, and they are randomly revolved and shifted again under control sequences which are related with encrypted image and keys. The postprocessing further increases the diffusion characteristics. Moreover, the test experiment and security analyses are given; the results show that our proposed cryptosystem has both security and speed performance.http://dx.doi.org/10.1155/2021/8824915
spellingShingle Zhen Li
Changgen Peng
Weijie Tan
Liangrong Li
An Effective Chaos-Based Image Encryption Scheme Using Imitating Jigsaw Method
Complexity
title An Effective Chaos-Based Image Encryption Scheme Using Imitating Jigsaw Method
title_full An Effective Chaos-Based Image Encryption Scheme Using Imitating Jigsaw Method
title_fullStr An Effective Chaos-Based Image Encryption Scheme Using Imitating Jigsaw Method
title_full_unstemmed An Effective Chaos-Based Image Encryption Scheme Using Imitating Jigsaw Method
title_short An Effective Chaos-Based Image Encryption Scheme Using Imitating Jigsaw Method
title_sort effective chaos based image encryption scheme using imitating jigsaw method
url http://dx.doi.org/10.1155/2021/8824915
work_keys_str_mv AT zhenli aneffectivechaosbasedimageencryptionschemeusingimitatingjigsawmethod
AT changgenpeng aneffectivechaosbasedimageencryptionschemeusingimitatingjigsawmethod
AT weijietan aneffectivechaosbasedimageencryptionschemeusingimitatingjigsawmethod
AT liangrongli aneffectivechaosbasedimageencryptionschemeusingimitatingjigsawmethod
AT zhenli effectivechaosbasedimageencryptionschemeusingimitatingjigsawmethod
AT changgenpeng effectivechaosbasedimageencryptionschemeusingimitatingjigsawmethod
AT weijietan effectivechaosbasedimageencryptionschemeusingimitatingjigsawmethod
AT liangrongli effectivechaosbasedimageencryptionschemeusingimitatingjigsawmethod