中国物理B ›› 2022, Vol. 31 ›› Issue (8): 80504-080504.doi: 10.1088/1674-1056/ac5a43

• • 上一篇    下一篇

Synchronously scrambled diffuse image encryption method based on a new cosine chaotic map

Xiaopeng Yan(闫晓鹏)1,†, Xingyuan Wang(王兴元)1,2,‡, and Yongjin Xian(咸永锦)1,§   

  1. 1 School of Information Science and Technology, Dalian Maritime University, Dalian 116026, China;
    2 Guangxi Key Laboratory of Multi-source Information Mining&Security, Guangxi Normal University, Guilin 541004, China
  • 收稿日期:2022-01-12 修回日期:2022-03-02 接受日期:2022-03-03 出版日期:2022-07-18 发布日期:2022-07-18
  • 通讯作者: Xiaopeng Yan, Xingyuan Wang, Yongjin Xian E-mail:karasyxp@126.com;xywang@dlmu.edu.cn;marsxyj@163.com
  • 基金资助:
    This project was supported by the National Natural Science Foundation of China (Grant No. 61672124), the Password Theory Project of the 13th Five-Year Plan National Cryptography Development Fund (Grant No. MMJJ20170203), the Liaoning Provincial Science and Technology Innovation Leading Talents Program (Grant No. XLYC1802013), the Key R&D Project of Liaoning Province (Grant No. 2019020105-JH2/103), Jinan City ‘20 Universities’ Funding Projects Introducing Innovation Team Program (Grant No. 2019GXRC031), Research Fund of Guangxi Key Lab of Multi-source Information Mining & Security (Grant No. MIMS20-M-02).

Synchronously scrambled diffuse image encryption method based on a new cosine chaotic map

Xiaopeng Yan(闫晓鹏)1,†, Xingyuan Wang(王兴元)1,2,‡, and Yongjin Xian(咸永锦)1,§   

  1. 1 School of Information Science and Technology, Dalian Maritime University, Dalian 116026, China;
    2 Guangxi Key Laboratory of Multi-source Information Mining&Security, Guangxi Normal University, Guilin 541004, China
  • Received:2022-01-12 Revised:2022-03-02 Accepted:2022-03-03 Online:2022-07-18 Published:2022-07-18
  • Contact: Xiaopeng Yan, Xingyuan Wang, Yongjin Xian E-mail:karasyxp@126.com;xywang@dlmu.edu.cn;marsxyj@163.com
  • Supported by:
    This project was supported by the National Natural Science Foundation of China (Grant No. 61672124), the Password Theory Project of the 13th Five-Year Plan National Cryptography Development Fund (Grant No. MMJJ20170203), the Liaoning Provincial Science and Technology Innovation Leading Talents Program (Grant No. XLYC1802013), the Key R&D Project of Liaoning Province (Grant No. 2019020105-JH2/103), Jinan City ‘20 Universities’ Funding Projects Introducing Innovation Team Program (Grant No. 2019GXRC031), Research Fund of Guangxi Key Lab of Multi-source Information Mining & Security (Grant No. MIMS20-M-02).

摘要: We present a new cosine chaotic mapping proved by chaos theory test and analysis such that the system has good cryptography properties, wide chaos range, simple structure, and good sensitivity to initial value, and the mapping can meet the needs of chaotic image encryption. Based on the cosine chaotic system, we propose a new encryption method. First, according to the cyclic characteristics of the mapping, the cyclic information wave is simulated. Second, the quasi-Doppler effect is used to synchronously scramble and diffuse the image to obfuscate the original pixel. Finally, the XOR diffusion of image pixels is carried out by information wave to further enhance the encryption effect. Simulation experiment and security analysis show that the algorithm has good security, can resist the common attack mode, and has good efficiency.

关键词: chaos mapping, cosine mapping, cyclic information wave, doppler effect, image encryption

Abstract: We present a new cosine chaotic mapping proved by chaos theory test and analysis such that the system has good cryptography properties, wide chaos range, simple structure, and good sensitivity to initial value, and the mapping can meet the needs of chaotic image encryption. Based on the cosine chaotic system, we propose a new encryption method. First, according to the cyclic characteristics of the mapping, the cyclic information wave is simulated. Second, the quasi-Doppler effect is used to synchronously scramble and diffuse the image to obfuscate the original pixel. Finally, the XOR diffusion of image pixels is carried out by information wave to further enhance the encryption effect. Simulation experiment and security analysis show that the algorithm has good security, can resist the common attack mode, and has good efficiency.

Key words: chaos mapping, cosine mapping, cyclic information wave, doppler effect, image encryption

中图分类号:  (Nonlinear dynamics and chaos)

  • 05.45.-a
95.75.Mn (Image processing (including source extraction)) 95.10.Fh (Chaotic dynamics) 05.45.Ac (Low-dimensional chaos)