2023
DOI: 10.3390/e25050753
|View full text |Cite
|
Sign up to set email alerts
|

Fast and Secure Image Encryption Algorithm with Simultaneous Shuffling and Diffusion Based on a Time-Delayed Combinatorial Hyperchaos Map

Abstract: Adding time delay to nonlinear systems can significantly improve their performance, making it possible to construct image-encryption algorithms with higher security. In this paper, we propose a time-delayed nonlinear combinatorial hyperchaotic map (TD-NCHM) with a wide hyperchaotic interval. Based on TD-NCHM, we develop a fast and secure image-encryption algorithm that includes a plaintext-sensitive key-generation method and a simultaneous row-column shuffling-diffusion encryption process. Plenty of experiment… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 40 publications
0
5
0
Order By: Relevance
“…Table 2 highlights the key space comparison of the proposed quantum image encryption scheme with other recently presented schemes [2,10,20,60,63]. Based on the comparison results, it can be concluded that the proposed scheme provides better security than its competitors when transmitting images through unsecured communication channels.…”
Section: Key Security Analysis Key Space Analysismentioning
confidence: 97%
“…Table 2 highlights the key space comparison of the proposed quantum image encryption scheme with other recently presented schemes [2,10,20,60,63]. Based on the comparison results, it can be concluded that the proposed scheme provides better security than its competitors when transmitting images through unsecured communication channels.…”
Section: Key Security Analysis Key Space Analysismentioning
confidence: 97%
“…For one iteration cycle, the suggested scheme's key space value ≈2 540 is obtained. The traditional algorithm [13,16,18,23,24,25,26] has lower key space, and schemes [17,27] have larger key space values than the proposed algorithms. The scheme [13,16,17,18,23,24,25,26] has achieved its optimal key space value of 2 100 after several rounds of iteration, whereas the proposed Scheme 1 and Scheme 2 have attained their ideal values for a one cycle of iteration itself.…”
Section: Brute Force Attackmentioning
confidence: 98%
“…The traditional algorithm [13,16,18,23,24,25,26] has lower key space, and schemes [17,27] have larger key space values than the proposed algorithms. The scheme [13,16,17,18,23,24,25,26] has achieved its optimal key space value of 2 100 after several rounds of iteration, whereas the proposed Scheme 1 and Scheme 2 have attained their ideal values for a one cycle of iteration itself. Subsequently, the proposed encryption algorithm with both schemes 1 and 2 has larger key space and has sufficient resistance to withstand brute force attack.…”
Section: Brute Force Attackmentioning
confidence: 98%
“…x i e mod 1 1 6, 1 10 = -Śtep 3: Transfer the calculated initial values into a 6D fractional order hyperchaotic system to generate a chaotic sequence. The initial values of the chaotic system obtained from the computation are used to generate chaotic sequences by substituting them into the 6D hyperchaotic system equation (11), which are pseudo-random sequences. Each value in the sequence is guaranteed to be between 0 and 255.…”
Section: Encryption Processmentioning
confidence: 99%
“…It is also because these characteristics match image encryption to a high degree, which makes its application in image encryption very widely. After all these years of research, different models of chaotic systems have emerged, such as complex chaotic systems [3][4][5][6], fractional chaotic systems [7][8][9], time-lagged chaotic systems [10,11], continuous chaotic systems [12][13][14], and discrete chaotic systems [15][16][17]. On the other hand, they can be differentiated in terms of dimensionality.…”
Section: Introductionmentioning
confidence: 99%