journal article Jan 01, 2020

Image encryption algorithm based on new five-dimensional multi-ring multi-wing hyperchaotic system

View at Publisher Save 10.7498/aps.69.20191342
Abstract
The complex structure of hyperchaos and its complex dynamic behavior have a good application prospect in the fields of image encryption, digital watermarking and information security. Therefore, it has become very important to generate chaotic attractors with multi-vortex and multi-winged multi-rings with complex topologies. In this paper, we propose a new five-dimensional hyperchaotic system capable of generating multi-ring and multi-wing, and carry out theoretical analysis and numerical simulation experiments on some basic dynamic characteristics of the chaotic system. Such as equilibrium point, dissipation, Lyapunov exponent, bifurcation diagram, phase diagram and so on. In the process of encryption, first, we decompose the plaintext image matrix and the five chaotic sequences into an orthogonal matrix and an upper triangular matrix by QR decomposition. The five chaotic sequences generated by the chaotic system are respectively decomposed into an upper triangular matrix and a lower triangular matrix by the LU decomposition method. The upper triangular matrix decomposed by the QR decomposition method and the lower triangular matrix decomposed by the LU decomposition method are respectively added to obtain five discrete chaotic sequences. At the same time, the five discrete chaotic sequences are added to the upper triangular matrix decomposed by the LU decomposition method to obtain the final five discrete chaotic sequences. Secondly, the orthogonal matrix decomposed by the plaintext image matrix is multiplied by five orthogonal matrices decomposed by five chaotic sequences. At the same time, the elements in the upper triangular matrix decomposed by the plaintext image matrix are chaotically arranged by the chaotic sequence, and then the two matrices after the operation are multiplied. Finally, the multiplied matrix is chaotically placed on the bit by a chaotic sequence. Then use the chaotic sequence to perform a bitwise XOR operation to obtain the final encrypted image. The theoretical analysis and simulation results show that the algorithm has large key space and strong key sensitivity. It can effectively resist the attacks of statistical analysis and gray value analysis, and has good encryption effect on digital image encryption. This image encryption algorithm using a combination of conventional encryption and chaotic encryption does not have a defined plaintext ciphertext mapping relationship.
Topics

No keywords indexed for this article. Browse by subject →

References
22
[1]
Wang P, Feng Y, Sun L X, Han F L 2002 <i>Control Theory &amp; Appl.</i> <b>21</b> 1<br/>王平, 冯勇, 孙黎霞, 韩凤玲 2002 控制理论与应用 <b>21</b> 1
[2]
Yu S M 2005 <i>Acta Phys.Sin.</i> <b>54</b> 1500<br/>禹思敏 2005 物理学报 <b>54</b> 1500 10.7498/aps.54.1500
[3]
Karthikeyan R, Serdar C, Peiman N, Abdul J M, Sajad J, Anitha K 2018 <i>Eur. Phys. J. Plus</i> <b>133</b> 354
[4]
Jia M M, Jiang H G, Li W J 2019 <i>Acta Phys. Sin.</i> <b>68</b> 130503<br/>贾美美, 蒋浩刚, 李文静 2019 物理学报 <b>68</b> 130503 10.7498/aps.68.20182183
[5]
Li Y X, Tang W K S, Chen G R 2005 <i>Int. J. Bifurcation Chaos.</i> <b>15</b> 3367 10.1142/s0218127405013988
[6]
Peng Z P, Wang C H, Lin Y, Luo X W 2014 <i>Acta Phys. Sin.</i> <b>63</b> 240506<br/>彭再平, 王春华, 林愿, 骆小文 2014 物理学报 <b>63</b> 240506 10.7498/aps.63.240506
[7]
Liu Y 2015 <i>Ph. D. Dissertation</i> (Harbin: Harbin Institute of Technology) (in Chinese)<br/>刘杨 2015 博士学位论文 (哈尔滨: 哈尔滨工业大学)
[8]
Yu S M 2018 <i>Design Principles and Applications of New Chaotic Circuits and Systems</i> (Beijing: Science Press) pp139– 155 (in Chinese)<br/>禹思敏 2018 新型混沌电路与系统的设计原理及其应用 (北京: 科学出版社) 第139—155页
[9]
Zhang L H, Liao X F, Wang X B 2005 <i>Chaos, Solitons Fractals</i> <b>24</b> 759 10.1016/j.chaos.2004.09.035
[10]
Wong K, Kwor B, Law W 2008 <i>Phys. Lett. A</i> <b>372</b> 2645 10.1016/j.physleta.2007.12.026
[11]
Zhang W, Yu H, Zhao Y L, Zhu Z L 2016 <i>Signal Process.</i> <b>118</b> 36 10.1016/j.sigpro.2015.06.008
[12]
Luo Y L, Zhou R L, Liu J X, Gao Y, Ding X M 2018 <i>Nonlinear Dyn.</i> <b>4</b> 1
[13]
Ye G D, Pan C, Huang X L, Mei Q X 2018 <i>Nonlinear Dyn.</i> <b>20</b> 18
[14]
Abanda Y, Tiedeu A 2016 <i>IET Image Proc.</i> <b>10</b> 742 10.1049/iet-ipr.2015.0244
[15]
Zhang Y 2018 <i>Inf. Sci.</i> <b>255</b> 31145
[16]
He Y, Zhang Y Q, Wang X Y 2018 <i>Neural Comput. Appl.</i> <b>10</b> 1
[17]
Raza S F, Satpute V 2018 <i>Nonlinear Dyn.</i> <b>254</b> 1
[18]
Ahmad J, Khan M A, Hwang S O, Khan J S 2017 <i>Neural Comput. Appl.</i> <b>28</b> 953 10.1007/s00521-016-2405-6
[19]
Ahmad J, Khan M A, Ahmed F, Khan J S 2018 <i>Neural Comput. Appl.</i> <b>3</b> 1
[20]
Sprott J C 1994 <i>Phys. Rev. E</i> <b>50</b> 647 10.1103/physreve.50.r647
[21]
Enayatifar R, Abdullah A H, Isnin I F, Altameem A, Lee A 2017 <i>Opt. Lasers Eng.</i> <b>90</b> 146 10.1016/j.optlaseng.2016.10.006
[22]
Liu H J, Wang X Y, Kadir A 2012 <i>Appl. Soft Comput.</i> <b>12</b> 1457 10.1016/j.asoc.2012.01.016
Metrics
13
Citations
22
References
Details
Published
Jan 01, 2020
Vol/Issue
69(4)
Pages
040502
Cite This Article
Zhi-Ben Zhuang, Jun Li, Jing-Yi Liu, et al. (2020). Image encryption algorithm based on new five-dimensional multi-ring multi-wing hyperchaotic system. Acta Physica Sinica, 69(4), 040502. https://doi.org/10.7498/aps.69.20191342