A novel image encryption scheme using chaos, hyper-chaos systems and the secure Hash algorithm SHA-1
Title | A novel image encryption scheme using chaos, hyper-chaos systems and the secure Hash algorithm SHA-1 |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Slimane, N. B., Bouallegue, K., Machhout, M. |
Conference Name | 2017 International Conference on Control, Automation and Diagnosis (ICCAD) |
Date Published | Jan. 2017 |
Publisher | IEEE |
ISBN Number | 978-1-5090-5987-4 |
Keywords | 4D hyperchaotic system, chaos, chaotic cryptography, chaotic index sequence, composability, Confusion, Correlation, cryptography, Diffusion, diffusion layers, digital image encryption, Encryption, encryption process, encryption schemes, Entropy, highest security level, Histograms, Hyper-chaos, hyper-chaos systems, image encryption, image encryption scheme, image sequences, Metrics, pubcrawl, Resiliency, robust scheme, secure Hash algorithm SHA-1, security analysis, Sensitivity, SHA-1, sub-vectors confusion, two-diffusion process, XOR operation |
Abstract | In this paper, we introduce a fast, secure and robust scheme for digital image encryption using chaotic system of Lorenz, 4D hyper-chaotic system and the Secure Hash Algorithm SHA-1. The encryption process consists of three layers: sub-vectors confusion and two-diffusion process. In the first layer we divide the plainimage into sub-vectors then, the position of each one is changed using the chaotic index sequence generated with chaotic attractor of Lorenz, while the diffusion layers use hyper-chaotic system to modify the values of pixels using an XOR operation. The results of security analysis such as statistical tests, differential attacks, key space, key sensitivity, entropy information and the running time are illustrated and compared to recent encryption schemes where the highest security level and speed are improved. |
URL | https://ieeexplore.ieee.org/document/8075646/ |
DOI | 10.1109/CADIAG.2017.8075646 |
Citation Key | slimane_novel_2017 |
- robust scheme
- Hyper-chaos
- hyper-chaos systems
- image encryption
- image encryption scheme
- image sequences
- Metrics
- pubcrawl
- Resiliency
- Histograms
- secure Hash algorithm SHA-1
- Security analysis
- Sensitivity
- SHA-1
- sub-vectors confusion
- two-diffusion process
- XOR operation
- 4D hyperchaotic system
- highest security level
- Entropy
- encryption schemes
- encryption process
- encryption
- digital image encryption
- diffusion layers
- Diffusion
- Cryptography
- Correlation
- Confusion
- composability
- chaotic index sequence
- chaotic cryptography
- chaos