Local bit-level image encryption algorithm based on one dimensional zero excluded chaotic map

The exchange of digital images on the internet has become more convenient, but it has also led to increasing security concerns. Image encryption differs from text encryption, as inherent features such as massive data volume and high pixel correlation make it challenging to apply traditional AES and...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Physica scripta 2024-06, Vol.99 (6), p.65214
Hauptverfasser: Feng, Xiaogang, Han, Guankai, Yan, Fengying, Shen, Dongkui, Pang, Zongbin, Li, Qi
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:The exchange of digital images on the internet has become more convenient, but it has also led to increasing security concerns. Image encryption differs from text encryption, as inherent features such as massive data volume and high pixel correlation make it challenging to apply traditional AES and DES methods to images. This paper introduces a novel local bit-level image encryption algorithm based on chaos. Firstly, a new one-dimensional chaos system named the One-Dimensional Zero Excluded Chaotic Map (1D-ZECM) is designed, possessing features such as approximate global chaos, a broad chaos range, and high Lyapunov exponents, making it well-suited for cryptography. To resist brute force attacks, a hash function is employed to generate the encryption system’s key, further enhanced by using the 1D-ZECM to derive the key stream for the cryptographic system. Unlike traditional encryption methods that encrypt all 8 bits of a pixel, this algorithm focuses on the first six bits of each pixel during the encryption process, as the lower two bits contain less image information. In the diffusion process, the key stream generated by the 1D-ZECM is combined with mod and XOR operations to diffuse the rearranged image. Experimental results demonstrate that the proposed encryption algorithm exhibits high security and can resist common attacks. Moreover, when compared to representative algorithms, the proposed algorithm demonstrates better security and efficiency. The encryption algorithm presented in this paper provides a high-quality encrypted output.
ISSN:0031-8949
1402-4896
DOI:10.1088/1402-4896/ad418d