A secure image encryption algorithm based on chaotic maps and SHA‐3
In this paper, a chaotic image encryption algorithm is suggested combining with double chaotic maps, SHA‐3 (Secure Hash Algorithm‐3), and auto‐updating system. To shuffle pixel positions, a matrix having same size of the plain‐image is generated dependent on the plain‐image in stage of permutation....
Saved in:
| Published in | Security and communication networks Vol. 9; no. 13; pp. 2015 - 2023 |
|---|---|
| Main Authors | , |
| Format | Journal Article |
| Language | English |
| Published |
London
John Wiley & Sons, Inc
10.09.2016
|
| Subjects | |
| Online Access | Get full text |
| ISSN | 1939-0114 1939-0122 |
| DOI | 10.1002/sec.1458 |
Cover
| Summary: | In this paper, a chaotic image encryption algorithm is suggested combining with double chaotic maps, SHA‐3 (Secure Hash Algorithm‐3), and auto‐updating system. To shuffle pixel positions, a matrix having same size of the plain‐image is generated dependent on the plain‐image in stage of permutation. Then, SHA‐3 is taken to calculate its hash values used to produce control parameter and initial condition of Logistic map. After that, total permutation is implemented for row and column to exchange pixels, where auto‐updating systems are established by different images acting like one‐time pad. Furthermore, 3D chaotic cat map is employed to enlarge key space in diffusion process. Permuted image is firstly divided into four sub‐blocks, which are queued randomly according to the key of Logistic map. The last sub‐block is picked out to calculate the hash values using SHA‐3, of which are assigned into three groups to update the initial conditions of 3D chaotic cat map performing like one‐time pad again. Current sub‐block is designed to influence next sub‐block in diffusion process. As a result, the proposed algorithm can resist efficiently the chosen‐plaintext and known‐plaintext attacks. Experimental results are also given to explain the high security of the proposed method. Copyright © 2016 John Wiley & Sons, Ltd.
To resist efficiently the chosen‐plaintext and known‐plaintext attacks, a chaotic maps and SHA‐3‐based image encryption algorithm is proposed in this paper under permutation‐diffusion architecture. With an auto‐updating system, the control parameter and initial condition of Logistic map are produced according to different plain images in the stage of permutation. Then, in diffusion stage, three initial conditions of 3D chaotic cat map are auto‐updated with the help of SHA‐3 function to the last sub‐block of permuted image performing like one‐time pad. |
|---|---|
| Bibliography: | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 content type line 23 |
| ISSN: | 1939-0114 1939-0122 |
| DOI: | 10.1002/sec.1458 |