Enhancing the kinetic complexity of 2-D digital coupled chaotic lattice
- PDF / 9,251,108 Bytes
- 19 Pages / 547.087 x 737.008 pts Page_size
- 40 Downloads / 175 Views
(0123456789().,-volV) ( 01234567 89().,-volV)
ORIGINAL PAPER
Enhancing the kinetic complexity of 2-D digital coupled chaotic lattice Chengye Zou
. Xingyuan Wang . Haifeng Li . Yongzhao Wang
Received: 31 December 2019 / Accepted: 13 November 2020 Ó Springer Nature B.V. 2020
Abstract A 2-dimensional coupled logistic map lattice model and a 2-dimensional Logistic-nestedSine map are proposed in this paper. In order to strengthen complexity of 2-dimensional coupled logistic map lattice, chaotic sequences are transformed to binary sequences, and new decimal sequences are constructed by perturbed binary sequences. Numerical experimental results demonstrate that this method can increase the complexity and ergodicity of 2-dimensional coupled logistic map lattice effectively. The initial values of the 2-dimensional coupled logistic map lattice are determined by utilization of the SHA 512 hash function. The row and column positions of pixels are shuffled completely in permutation process. Unlike 1-dimensional linear diffusion operation, we have adopted two-dimensional space diffusion began C. Zou (&) Y. Wang School of Mathematics and Statistics, Anyang Normal University, Anyang 455000, China e-mail: [email protected] Y. Wang e-mail: [email protected] X. Wang School of Information Science and Technology, Dalian Maritime University, Dalian 116026, China e-mail: [email protected] H. Li School of Software, Dalian University of Technology, Dalian 116024, China e-mail: [email protected]
from random semi-surround. Keys security, correlation coefficient, information entropy, and ability of defending differential attack are analyzed to confirm the security of our encryption scheme. Experimental results confirm that the proposed algorithm can encrypt image effectively. Keywords Logistic map Dynamical degradation Chaos control Image encryption SHA 512 hash function
1 Introduction Digital image as an important information vector is important in multimedia communication; therefore, information security of digital image has increasingly became a key issue of concern. Compared with traditional encryption methods such as DES, IDEA and AES, chaotic image encryption algorithm has many unique advantages, for example it has anti-noise ability in transmission and high speed on encryption. Chaotic system has many excellent intrinsic properties, including ergodicity, aperiodicity, high sensitivity to initial conditions, control parameters and pseudo-random [1, 2]. As a result, many chaotic image encryption algorithms have been proposed [3–15].
123
C. Zou et al.
Although low dimensional chaotic system in image encryption is easy and effective, the key space is small, thus security is weak [16]. In order to overcome this drawback, chaotic image encryption algorithm has also mainly gone through the stages from low dimensional to high dimensional and spatiotemporal chaos [17]. However, any chaotic system implemented degrade of various extents definitely in finite precision devices, which may cause serious sec
Data Loading...