首页 | 本学科首页   官方微博 | 高级检索  
     


Chaotic image encryption based on circular substitution box and key stream buffer
Affiliation:1. Department of Computer Science and Technology, Xi?an Jiaotong University, Xi?an 710049, China;2. The Genome Institute, Washington University in St. Louis, St. Louis, MO 63108, USA;1. National Engineering Research Center of Digital Life, State-Province Joint Laboratory of Digital Home Interactive Applications, School of Information Science Technology, Sun Yat-sen University, Guangzhou 510006, China;2. Institute of Computer Sciences, Guangdong Polytechnic Normal University, Guangzhou 510665, China;3. School of Informatics, Guangdong University of Foreign Studies, Guangzhou 510006, China;1. School of Electrical, Electronic and Communication Engineering, College of Engineering and Architecture, University College Dublin, Belfield, Dublin 4, Ireland;2. Communications and Optoelectronic Research Centre, University College Dublin, Belfield, Dublin 4, Ireland;3. The SFI-Strategic Research Cluster in Solar Energy Conversion, University College Dublin, Belfield, Dublin 4, Ireland;1. MOE (Ministry of Education) Key Laboratory of Intelligent Computing and Information Processing, College of Information Engineering, Xiangtan University, Xiangtan 411105, Hunan, China;2. Department of Electronic Engineering, City University of Hong Kong, Hong Kong;1. Key Laboratory of Advanced Design and Intelligent Computing (Dalian University), Ministry of Education, Dalian 116622, China;2. Applied Technology College of Dalian Ocean University, Dalian 116300, China
Abstract:A new image encryption algorithm based on spatiotemporal chaotic system is proposed, in which the circular S-box and the key stream buffer are introduced to increase the security. This algorithm is comprised of a substitution process and a diffusion process. In the substitution process, the S-box is considered as a circular sequence with a head pointer, and each image pixel is replaced with an element of S-box according to both the pixel value and the head pointer, while the head pointer varies with the previous substituted pixel. In the diffusion process, the key stream buffer is used to cache the random numbers generated by the chaotic system, and each image pixel is then enciphered by incorporating the previous cipher pixel and a random number dependently chosen from the key stream buffer. A series of experiments and security analysis results demonstrate that this new encryption algorithm is highly secure and more efficient for most of the real image encryption practices.
Keywords:Image encryption  Chaos  S-box  Substitution  Diffusion
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号