An Effective Chaos-Based Image Encryption Scheme Using Imitating Jigsaw Method
In this paper, an efficient chaos-based image encryption scheme is proposed, which uses the imitating jigsaw method containing revolving and shifting operations. In this scheme, there are three processes in encryption: preprocessing, encryption process, and postprocessing. In the preprocessing, the...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Wiley
2021-01-01
|
Series: | Complexity |
Online Access: | http://dx.doi.org/10.1155/2021/8824915 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1832560105036447744 |
---|---|
author | Zhen Li Changgen Peng Weijie Tan Liangrong Li |
author_facet | Zhen Li Changgen Peng Weijie Tan Liangrong Li |
author_sort | Zhen Li |
collection | DOAJ |
description | In this paper, an efficient chaos-based image encryption scheme is proposed, which uses the imitating jigsaw method containing revolving and shifting operations. In this scheme, there are three processes in encryption: preprocessing, encryption process, and postprocessing. In the preprocessing, the original image is partitioned into 64 × 64 pixel image blocks and then randomly revolved and shifted under control sequences which are generated by the hyperchaotic Lorenz system whose initial conditions are calculated by original image and keys. Therefore, the preprocessing is sensitive to plain image against differential attacks. In the encryption process, the after-preprocessing image is partitioned into 32 × 32 pixel image blocks; next they are randomly revolved and encrypted by control sequence and key blocks which are generated by the skew tent map. In postprocessing, the after-encryption image is partitioned into 16 × 16 pixels’ image blocks, and they are randomly revolved and shifted again under control sequences which are related with encrypted image and keys. The postprocessing further increases the diffusion characteristics. Moreover, the test experiment and security analyses are given; the results show that our proposed cryptosystem has both security and speed performance. |
format | Article |
id | doaj-art-502b91fbc5404c8d9a50a1d5bb9c40cf |
institution | Kabale University |
issn | 1076-2787 1099-0526 |
language | English |
publishDate | 2021-01-01 |
publisher | Wiley |
record_format | Article |
series | Complexity |
spelling | doaj-art-502b91fbc5404c8d9a50a1d5bb9c40cf2025-02-03T01:28:24ZengWileyComplexity1076-27871099-05262021-01-01202110.1155/2021/88249158824915An Effective Chaos-Based Image Encryption Scheme Using Imitating Jigsaw MethodZhen Li0Changgen Peng1Weijie Tan2Liangrong Li3College of Computer Science and Technology, State Key Laboratory of Public Big Data, Guizhou University, Guiyang 550025, ChinaCollege of Computer Science and Technology, State Key Laboratory of Public Big Data, Guizhou University, Guiyang 550025, ChinaCollege of Computer Science and Technology, State Key Laboratory of Public Big Data, Guizhou University, Guiyang 550025, ChinaCollege of Big Data and Information Engineering, Guizhou University, Guiyang 550025, ChinaIn this paper, an efficient chaos-based image encryption scheme is proposed, which uses the imitating jigsaw method containing revolving and shifting operations. In this scheme, there are three processes in encryption: preprocessing, encryption process, and postprocessing. In the preprocessing, the original image is partitioned into 64 × 64 pixel image blocks and then randomly revolved and shifted under control sequences which are generated by the hyperchaotic Lorenz system whose initial conditions are calculated by original image and keys. Therefore, the preprocessing is sensitive to plain image against differential attacks. In the encryption process, the after-preprocessing image is partitioned into 32 × 32 pixel image blocks; next they are randomly revolved and encrypted by control sequence and key blocks which are generated by the skew tent map. In postprocessing, the after-encryption image is partitioned into 16 × 16 pixels’ image blocks, and they are randomly revolved and shifted again under control sequences which are related with encrypted image and keys. The postprocessing further increases the diffusion characteristics. Moreover, the test experiment and security analyses are given; the results show that our proposed cryptosystem has both security and speed performance.http://dx.doi.org/10.1155/2021/8824915 |
spellingShingle | Zhen Li Changgen Peng Weijie Tan Liangrong Li An Effective Chaos-Based Image Encryption Scheme Using Imitating Jigsaw Method Complexity |
title | An Effective Chaos-Based Image Encryption Scheme Using Imitating Jigsaw Method |
title_full | An Effective Chaos-Based Image Encryption Scheme Using Imitating Jigsaw Method |
title_fullStr | An Effective Chaos-Based Image Encryption Scheme Using Imitating Jigsaw Method |
title_full_unstemmed | An Effective Chaos-Based Image Encryption Scheme Using Imitating Jigsaw Method |
title_short | An Effective Chaos-Based Image Encryption Scheme Using Imitating Jigsaw Method |
title_sort | effective chaos based image encryption scheme using imitating jigsaw method |
url | http://dx.doi.org/10.1155/2021/8824915 |
work_keys_str_mv | AT zhenli aneffectivechaosbasedimageencryptionschemeusingimitatingjigsawmethod AT changgenpeng aneffectivechaosbasedimageencryptionschemeusingimitatingjigsawmethod AT weijietan aneffectivechaosbasedimageencryptionschemeusingimitatingjigsawmethod AT liangrongli aneffectivechaosbasedimageencryptionschemeusingimitatingjigsawmethod AT zhenli effectivechaosbasedimageencryptionschemeusingimitatingjigsawmethod AT changgenpeng effectivechaosbasedimageencryptionschemeusingimitatingjigsawmethod AT weijietan effectivechaosbasedimageencryptionschemeusingimitatingjigsawmethod AT liangrongli effectivechaosbasedimageencryptionschemeusingimitatingjigsawmethod |