Multiple-Layer Image Encryption Utilizing Fractional-Order Chen Hyperchaotic Map and Cryptographically Secure PRNGs
نویسندگان
چکیده
Image encryption is increasingly becoming an important area of research in information security and network communications as digital images are widely used various applications vulnerable to types attacks. In this work, a color image cryptosystem that based on multiple layers proposed. For every layer, key S-box generated utilized. These four-dimensional (4D) dynamical Chen system fractional-order, the Mersenne Twister, OpenSLL, Rule 30 Cellular Automata Intel’s MKL. The sequential application Shannon’s ideas diffusion confusion three times guarantees total distortion any input plain image, thereby, resulting totally encrypted one. Apart from excellent comparable performance other state-of-the-art algorithms, showcasing resistance visual, statistical, entropy, differential, known plaintext brute-force attacks, proposed provides exceptionally superior two aspects: vast space 21658 average rate 3.34 Mbps. Furthermore, shown successfully pass all tests NIST SP 800 suite.
منابع مشابه
A Color Image Encryption Algorithm Based on a Fractional-Order Hyperchaotic System
In this paper, a new color image encryption algorithm based on a fractional-order hyperchaotic system is proposed. Firstly, four chaotic sequences are generated by a fractional-order hyperchaotic system. The parameters of such a system, together with the initial value, are regarded as the secret keys and the plain image is encrypted by performing the XOR and shuffling operations simultaneously....
متن کاملProposed Hyperchaotic System for Image Encryption
This paper presents a new hyper chaos system based on Hénon and Logistic maps which provides characteristics of high capacity, security and efficiency. The Proposed hyper chaos system is employed to generate the key for diffusion in an image encryption algorithm. The simulation experiments to the image encryption algorithm which based on the proposed hyper chaos system show that the algorithm s...
متن کاملIntroduction to Secure PRNGs
Pseudo-Random Number Generators (PRNGs) are required for generating secret keys in cryptographic algorithms, generating sequences of packet in Network simulations (workload generators) and other applications in various fields. In this paper we will discuss a list of some requirements for generating a reliable random sequence and then will present some PRNG methods which are based on combination...
متن کاملChaos synchronization of fractional order time-delay Chen system and its application in secure communication
In this paper, it is considered that chaos synchronization of Chen fractional order time-delay chaotic systems and its application in secure communication. By use of the fractional calculus techniques, we find that chaos exists in the fractional order Chen system with time delays when the order is less than 3. Firstly, based on the Laplace transform theory, the conditions for achieving synchron...
متن کاملA fractional-order hyperchaotic system and its synchronization
In this paper a novel fractional-order hyperchaotic system is proposed. The chaotic properties of the system in phase portraits are analyzed by using linear transfer function approximation of the fractional-order integrator block. Furthermore, synchronization between two fractional-order systems is achieved by utilizing a single-variable feedback method. Simulation results show that our scheme ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Fractal and fractional
سال: 2023
ISSN: ['2504-3110']
DOI: https://doi.org/10.3390/fractalfract7040287