Method of encrypting images based on two multidimensional chaotic systems using fuzzy logic
Abstract
Keywords
Full Text:
PDFReferences
Boiko, J., Pyatin, I., Karpova, L., Eromenko O. Study of the Influence of Changing Signal Propagation Conditions in the Communication Chan-nel on Bit Error Rate. Data-Centric Business and Applications. Lecture Notes on Data Engineering and Communications Technologies, Springer, June 2021, vol. 69, pp. 79-103. DOI: 10.1007/978-3-030-71892-3_4.
Semenova, O., Semenov, A., Voznyak, O., Mostoviy, D., Dudatyev, I. The fuzzy-controller for WiMAX networks. 2015 International Siberian Conference on Control and Communications (SIBCON), 2015, pp. 1-4. DOI: 10.1109/SIBCON.2015.7147214.
Iavich, M., Kuchukhidze, T., Iashvili, G., Gnatyuk, S. Hybrid quantum random number generator for cryptographic algorithms. Radioelectronic and Computer Systems, 2021, no. 4 (100), pp. 103-118. DOI: 10.32620/reks.2021.4.09.
May, R. M. Simple mathematical model with very compli-cated dynamics. Nature, 1976, vol. 261, pp. 459–467. DOI: 10.1038/261459a0.
Boiko, J., Pyatin, I., Eromenko, O., Barabash O. Methodology for Assessing Synchronization Conditions in Telecommunication Devices. Advances in Science Technology and Engineering Systems Journal, 2020, vol. 5, iss. 2, pp. 320-327. DOI: 10.25046/aj050242.
Ali, T. S., Ali, R. A new chaos based color image encryption algorithm using permutation substitution and Boolean operation. Multimedia Tools and Applications, 2020, vol. 79, iss. 27, pp. 19853–19873. DOI: 10.1007/s11042-020-08850-5.
Panduranga, H., Kumar, S. N., Kiran. Image encryption based on permutation-substitution using chaotic map and Latin Square Image Cipher. Eur. Phys. J. Spec. Top., 2014, vol. 223, iss. 8, pp. 1663–1677. DOI: 10.1140/epjst/e2014-02119-9.
Ben Farah, M. A., Guesmi, R., Kachouri, A., Samet M. A new design of cryptosystem based on S-box and chaotic permutation. Multimedia Tools and Applications, 2020, vol. 79, iss. 27, pp. 19129–19150. DOI:10.1007/s11042-020-08718-8.
Alvarez, G., Li, S. Some basic cryptographic requirements for chaos-based cryptosystems. Int. J. Bifurc. Chaos, 2006, vol. 16, iss. 8, pp. 2129–2151. DOI: 10.1142/S0218127406015970.
Li, M., Guo, Y., Huang, J., Li, Y. Cryptanalysis of a chaotic image encryption scheme based on permutation-diffusion structure. Signal Process. Image Commun., 2018, vol. 62, pp. 164–172. DOI: 10.1016/j.image.2018.01.002.
Hoang, T. M., Thanh, H. X. Cryptanalysis and security improvement for a symmetric color image encryption algorithm. Optik, 2018, vol. 155, pp. 366–383. DOI: 10.1016/j.ijleo.2017.10.072.
Guo, S., Liu, Y., Gong, L., Yu, W., Gong, Y. Bit-level image cryptosystem combining 2D hyper-chaos with a modified non-adjacent spatiotemporal chaos. Multimedia Tools and Applications, 2018, vol. 77, iss. 16, pp. 21109–21130. DOI: 10.1007/s11042-017-5570-4.
Ye, G., Pan, C., Huang, X., Zhao, Z., He, J. A Chaotic Image Encryption Algorithm Based on Information Entropy. Int. J. Bifurc. Chaos, 2018, vol. 28, iss. 01, article id: 1850010, pp. 750-758. DOI: 10.1142/S0218127418500104.
Chen, J.-X., Zhu, Z.-L., Fu, C., Yu, H., Zhang, L.-B. A fast chaos-based image encryption scheme with a dynamic state variables selection mechanism. Communications in Nonlinear Science and Numerical Simulation, 2015, vol. 20, iss. 3, pp. 846–860. DOI: 10.1016/j.cnsns.2014.06.032.
Fridrich, J. Symmetric Ciphers Based on TwoDimensional Chaotic Maps. Int. J. Bifurcation Chaos. 1998, vol. 8, iss. 6, pp. 1259–1284. DOI: 10.1142/S021812749800098X.
Liu, W., Sun, K., Zhu, C. A fast image encryption algorithm based on chaotic map. Opt Lasers Eng., 2016, vol. 84, pp. 26–36. DOI: 10.1016/j.optlaseng.2016.03.019.
Hamza, R., Titouna, F. A novel sensitive image encryption algorithm based on the Zaslavsky chaotic map. Information Security Journal: A Global Perspective, 2016, vol. 25, iss. 4-6, pp. 162–179. DOI: 10.1080/ 19393555.2016.1212954.
Ping, P., Xu, F., Mao, Y., Wang, Z. Designing permutation–substitution image encryption networks with Henon map. Neurocomputing, 2018, no. 283, pp. 53–63. DOI: 10.1016/j.neucom.2017.12.048.
Mishra, K., Saharan, R. A fast image encryption technique using Henon chaotic map. Progress in advanced computing and intelligent engineering. Advances in Intelligent Systems and Computing. Springer, Singapore, 2019, vol. 713, pp. 329–339. DOI: 10.1007/978-981-13-1708-8_30.
Wang, X., Liu, L. Cryptanalysis of a parallel sub-image encryption method with high-dimensional chaos. Nonlinear Dynamics, 2013, vol. 73, iss.1, pp. 795–800. DOI: 10.1007/s11071-013-0832-9.
Mudia, H. M., Chavan, P. V. Fuzzy Logic Based Image Encryption for Con-fidential Data Transfer Using (2, 2) Secret Sharing Scheme. Procedia Computer Science, 2016, vol. 78, pp. 632-639. DOI: 10.1016/j.procs.2016.02.110.
Pandurangi Ramacharya, B., Patil, M. R., Keralkar, S. Fast partial image encryption with fuzzy logic and chaotic mapping. Evol. Intel., 2022. 17 p. DOI: 10.1007/s12065-021-00693-9.
Zhang, G., Liu, Q. A novel image encryption method based on total shuffling scheme. J Opt Commun., 2011, vol. 284, iss. 3, pp. 2775–2780. DOI: 10.1016/j.optcom.2011.02.039.
Norouzi, B., Mirzakuchaki, S., Seyedzadeh, S. M., Mosavi, M. R. A simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion process. Multimedia Tools and Applications, 2014, vol. 71, iss. 3, pp. 1469–1497. DOI: 10.1007/s11042-012-1292-9.
Norouzi, B., Seyedzadeh, S. M., Mirzakuchaki, S., Mosavi M. R. A novel image encryption based on hash function with only two-round diffusion process. Multimedia Systems, 2014, vol. 20, iss. 1, pp. 45–64. DOI: 10.1007/s00530-013-0314-4.
Behnia, S., Akhshani, A., Ahadpour, S., Mahmodi, H., Akhavan, A. A fast chaotic encryption scheme based on piecewise nonlinear chaotic maps. Physics Letters A, 2007, vol. 366, iss. 4-5, pp. 391–396. DOI: 10.1016/j.physleta.2007.01.081.
Rhouma, R., Belghith, S. Cryptanalysis of a spatiotemporal chaotic image/video cryptosystem. Chaos, Solitons & Fractals, 2009, vol. 41, iss. 4, pp. 1718–1722. DOI: 10.1016/j.chaos.2008.07.016.
Li, C., Li, S., Asim, M., Nunez, J., Alvarez, G., Chen, G. On the security defects of an image encryption scheme. Image and Vision Computing, 2009, vol. 27, iss. 9, pp. 1371–1381. DOI: 10.1016/j.imavis.2008.12.008.
Ahmed, M. H., Shibeeb, A. K., Abbood, F. H. An efficient confusion-diffusion structure for image encryption using plain image related henon map. International Journal of Computing, 2020, vol. 19, iss. 3, pp. 464-473. DOI: 10.47839/ijc.19.3.1895.
DOI: https://doi.org/10.32620/reks.2022.4.09
Refbacks
- There are currently no refbacks.
