Exploiting preprocessing-permutation–diffusion strategy for secure image cipher based on 3D Latin cube and memristive hyperchaotic system

In this paper, an effective image encryption algorithm based on 3D Latin cube and memristive hyperchaotic system is proposed. The architecture of preprocessing, permutation and diffusion is utilized. The original image is updated for the first time by the preprocessing process to modify statistical...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Neural computing & applications 2021-08, Vol.33 (16), p.10371-10402
Hauptverfasser: Chai, Xiuli, Fu, Jiangyu, Zhang, Jitong, Han, Daojun, Gan, Zhihua
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:In this paper, an effective image encryption algorithm based on 3D Latin cube and memristive hyperchaotic system is proposed. The architecture of preprocessing, permutation and diffusion is utilized. The original image is updated for the first time by the preprocessing process to modify statistical distribution of image pixels, which includes random data embedding and alphabetic XOR operation (AXO). Subsequently, the resulting image is converted to a 3D bit matrix, permutation based on 3D Latin cube (P3DL) and diffusion based on 3D Latin cube (D3DL) are successively manipulated on it to obtain the final cipher image, such that each bit element of plain image may move to any position across the bit plane, and the general transformation of matrix dimensions from permutation to diffusion is also unnecessary. Additionally, the adoption of preprocessing operation makes the permutation easy to resist attacks against special images. Moreover, random data used in preprocessing and 3D Latin cubes utilized in P3DL and D3DL are controlled by a 4D memristive hyperchaotic system, its initial values are computed by information entropy of plain image, which makes the chosen-plaintext and known-plaintext attacks invulnerable. Simulation results and performance analyses verify the effectiveness and security of the proposed image encryption scheme.
ISSN:0941-0643
1433-3058
DOI:10.1007/s00521-021-05797-y