×

Cryptographic system based on double parameters fractal sorting vector and new spatiotemporal chaotic system. (English) Zbl 1533.94055

Summary: Information security and image encryption have rapidly developed in recent years. This study presents an iterative method for vectors with fractal characteristics. Based on the idea of combining fractal and algebraic theories, the double parameters fractal sorting vector (DPFSV) was originally proposed, which incorporates features such as complexity, self-similarity, and iteration. Based on the practical application requirements, the DPFSV has a good regulatory vector length and increases the diversity of information location change laws. Hence, this study uses the DPFSV to control iterative node relationships in spatiotemporal chaotic systems. The new spatiotemporal chaotic system proposed based on DPFSV exhibits better dynamics than that of the coupled map lattice (CML) system, verified by comparing their Kolmogorov-Sinai entropy, bifurcation diagram, information entropy, and mutual information. Therefore, DPFSV-CML is more suitable in cryptography than CML. Combining the DPFSV and spatiotemporal chaotic system, this study constructs a new cryptographic system to implement permutation-diffusion synchronous encryption. This new encryption method has a good encryption effect and is resistant to various attacks. The security of this proposed cryptographic system is verified through various security analyses and simulated attack validations.

MSC:

94A60 Cryptography
94A08 Image processing (compression, reconstruction, etc.) in information and communication theory
94A15 Information theory (general)
94A17 Measures of information, entropy
28A80 Fractals
Full Text: DOI

References:

[1] He, J. H.; Chen, J. X.; Luo, W. Q.; Tang, S. H.; Huang, J. W., A novel high-capacity reversible data hiding scheme for encrypted jpeg bitstreams, IEEE Trans. Circuits Syst. Video Technol., 29, 12, 3501-3515 (2019)
[2] Li, L. X.; Wen, G. Q.; Wang, Z. M.; Yang, Y. X., Efficient and secure image communication system based on compressed sensing for IoT monitoring applications, IEEE Trans. Multimedia, 22, 1, 82-95 (2020)
[3] Sahari, M. L.; Boukemara, I., A pseudo-random numbers generator based on a novel 3D chaotic map with an application to color image encryption, Nonlinear Dyn., 94, 1, 723-744 (2018)
[4] Himeur, Y.; Boukabou, A., A robust and secure key-frames based video watermarking system using chaotic encryption, Multimed. Tools Appl., 77, 7, 8603-8627 (2018)
[5] Hua, Z. Y.; Zhu, Z. H.; Yi, S.; Zhang, Z.; Huang, H. J.A., Cross-plane colour image encryption using a two-dimensional logistic tent modular map, Inf. Sci., 546, 1063-1083 (2021)
[6] Alawida, M.; Samsudin, A.; Teh, J. H.; Alkhawaldeh, R. S., A new hybrid digital chaotic system with applications in image encryption, Signal Process., 160, 45-58 (2019)
[7] Chai, X. L.; Zhi, X. C.; Gan, Z. H.; Zhang, Y. S.; Chen, Y. R.; Fu, J. Y., Combining improved genetic algorithm and matrix semi-tensor product (STP) in color image encryption, Signal Process., 183 (2021), 108041
[8] Wen, W. Y.; Hong, Y. K.; Fang, Y. M.; Li, M.; Li, M., A visually secure image encryption scheme based on semi-tensor product compressed sensing, Signal Process., 173 (2020), 107580
[9] Belazi, A.; Hermassi, H.; Rhouma, R.; Belghith, S., Algebraic analysis of a RGB image encryption algorithm based on DNA encoding and chaotic map, Nonlinear Dyn., 76, 4, 1989-2004 (2014) · Zbl 1314.94012
[10] Wu, J. H.; Liao, X. F.; Yang, B., Image encryption using 2D Henon-Sine map and DNA approach, Signal Process., 153, 11-23 (2018)
[11] Chen, W. H.; Luo, S. X.; Zheng, W. X., Impulsive synchronization of reaction-diffusion neural networks with mixed delays and its application to image encryption, IEEE Trans. Neural Netw. Learn. Syst., 27, 12, 2696-2710 (2016)
[12] Mani, P.; Rajan, R.; Shanmugam, L.; Joo, Y. H., Adaptive control for fractional order induced chaotic fuzzy cellular neural networks and its application to image encryption, Inf. Sci., 491, 74-89 (2019) · Zbl 1454.93134
[13] Yang, Y. G.; Tian, J.; Lei, H.; Zhou, Y. H.; Shi, W. M., Novel quantum image encryption using one-dimensional quantum cellular automata, Inf. Sci., 345, 257-270 (2016)
[14] Ye, G. D.; Jiao, K. X.; Huang, X. L., Quantum logistic image encryption algorithm based on SHA-3 and RSA, Nonlinear Dynam., 104, 3, 2807-2827 (2021)
[15] Abd-El-Atty, B.; Iliyasu, A. M.; Alanezi, A.; Abd El-latif, A. A., Optical image encryption based on quantum walks, Opt. Laser Eng., 138 (2021), 106403
[16] Gayathri, J.; Subashini, S., An efficient spatiotemporal chaotic image cipher with an improved scrambling algorithm driven by dynamic diffusion phase, Inf. Sci., 489, 227-254 (2019) · Zbl 1458.94235
[17] Kaneko, K., Pattern dynamics in spatiotemporal chaos: Pattern selection, diffusion of defect and pattern competition intermittency, Physica D., 34, 1, 1-41 (1989) · Zbl 0702.58043
[18] Zhou, P. Z.; Du, J. X.; Zhou, K.; Wei, S. F., 2D mixed pseudo-random coupling PS map lattice and its application in S-box generation, Nonlinear Dynam., 103, 1, 1151-1166 (2021)
[19] Huang, R.; Han, F.; Liao, X. J.; Wang, Z. J.; Dong, A. H., A novel intermittent jumping coupled map lattice based on multiple chaotic maps, Appl. Sci., 11, 9, 3797 (2021)
[20] Tao, Y.; Cui, W. H.; Zhang, Z., Spatiotemporal chaos in multiple dynamically coupled map lattices and its application in a novel image encryption algorithm, J. Inf. Secur. Appl., 55 (2020), 102650
[21] Wang, S. H.; Hu, G., Coupled map lattice based hash function with collision resistance in single-iteration computation, Inf. Sci., 195, 266-276 (2012)
[22] Lv, X. P.; Liao, X. F.; Yang, B., A novel pseudo-random number generator from coupled map lattice with time-varying delay, Nonlinear Dynam., 94, 1, 325-341 (2018)
[23] Liu, Z.; Wang, Y.; Zhao, Y.; Zhang, L. Y., A stream cipher algorithm based on 2D coupled map lattice and partitioned cellular automata, Nonlinear Dynam., 101, 2, 1383-1396 (2020) · Zbl 1516.94044
[24] Khellat, F.; Ghaderi, A.; Vasegh, N., Li-Yorke chaos and synchronous chaos in a globally nonlocal coupled map lattice, Chaos Soliton. Fract., 44, 11, 934-939 (2011) · Zbl 1297.37015
[25] Bukh, A.; Strelkova, G.; Anishchenko, V., Spiral wave patterns in a two-dimensional lattice of nonlocally coupled maps modeling neural activity, Chaos Soliton. Fract., 120, 75-82 (2019) · Zbl 1448.39030
[26] Xian, Y. J.; Wang, X. Y., Fractal sorting matrix and its application on chaotic image encryption, Inf. Sci., 547, 1154-1169 (2021) · Zbl 1479.94272
[27] Xian, Y. J.; Wang, X. Y.; Zhang, Y. Q.; Wang, X. Y.; Du, X. H., Fractal sorting vector-based least significant bit chaotic permutation for image encryption, Chinese Physics B., 30, 6 (2021), 060508
[28] Alawida, M.; Teh, J. S.; Samsudin, A.; Alshoura, W. H., An image encryption scheme based on hybridizing digital chaos and finite state machine, Signal Process., 164, 249-266 (2019)
[29] Hua, Z. Y.; Zhou, Y. C.; Huang, H. J., Cosine-transform-based chaotic system for image encryption, Inf. Sci., 480, 403-419 (2019)
[30] Preishuber, M.; Hutter, T.; Katzenbeisser, S.; Uhl, A., Depreciating motivation and empirical security analysis of chaos-based image and video encryption, IEEE Trans. Inf. Foren. Sec., 13, 9, 2137-2150 (2018)
[31] Rajagopalan, S.; Poori, S.; Narasimhan, M.; Rethinam, S.; Kuppusamy, C. V.; Balasubramanian, R.; Annamalai, V. M.P.; Rengarajan, A., Chua’s diode and strange attractor: a three-layer hardware-software co-design for medical image confidentiality, IET Image Process., 14, 7, 1354-1365 (2020)
[32] Lakshmi, C.; Thenmozhi, K.; Rayappan, J. B.B.; Amirtharajan, R., Hopfield attractor-trusted neural network: an attack-resistant image encryption, Neural Comput. Appl., 32, 15, 11477-11489 (2019)
[33] Belazi, A.; ElLatif, A.; Belghith, S., A novel image encryption scheme based on substitution-permutation network and chaos, Signal Process., 128, 155-170 (2016)
[34] Hosny, K. M.; Kamal, S. T.; Darwish, M. M.; Papakostas, G. A., New image encryption algorithm using hyperchaotic system and Fibonacci Q-matrix, Electronics., 10, 9, 1066 (2021)
[35] Kang, S. W.; Choi, U. S.; Cho, S. J., Fast image encryption algorithm based on (n, m, k)-PCMLCA, Multimed. Tools Appl. (2021)
[36] Wang, M. X.; Wang, X. Y.; Zhao, T. T.; Zhang, C.; Xia, Z. Q.; Yao, N. M., Spatiotemporal chaos in improved cross coupled map lattice and its application in a bit-level image encryption scheme, Inf. Sci., 544, 1-24 (2021) · Zbl 1478.94111
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.