12 March 2020 Efficient image encryption using two-dimensional enhanced hyperchaotic Henon map
Hong-Xiang Zhao, Shu-Cui Xie, Jian-Zhong Zhang, Tong Wu
Author Affiliations +
Abstract

We develop a two-dimensional enhanced hyperchaotic Henon map (2D-EHHM) to overcome the problems of small chaotic range and poor security when the 2-D traditional Henon map is implemented in cryptosystems. The performance evaluations show that the 2D-EHHM has wider chaotic range, higher chaotic complexity, better ergodicity, and hyperchaotic behavior compared with certain existing chaotic maps. Based on the 2D-EHHM, we further design an efficient image encryption algorithm consisting of a multiple block substitution stage (MBSS) and a bidirectional-dynamic diffusion stage (BDDS). In the MBSS, a plain image is divided into several nonoverlapping multiple blocks to carry out permutation operation. In the BDDS, the scrambled image is redivided into nonoverlapping sub-blocks of the same size to be diffused dynamically in the forward and backward directions. Moreover, the SHA 512 function is employed to obtain a 512-bit plain image hash value treated as a raw key. A variable-length secret key (at least 128 bits), which is dynamically selected from the raw key and regarded as a valid key, is utilized to generate the initial values for the chaotic system. Simulation results and security analysis show that the proposed algorithm can resist various cryptanalytic attacks and can be applied to real-time data transmission.

© 2020 SPIE and IS&T 1017-9909/2020/$28.00 © 2020 SPIE and IS&T
Hong-Xiang Zhao, Shu-Cui Xie, Jian-Zhong Zhang, and Tong Wu "Efficient image encryption using two-dimensional enhanced hyperchaotic Henon map," Journal of Electronic Imaging 29(2), 023007 (12 March 2020). https://doi.org/10.1117/1.JEI.29.2.023007
Received: 16 October 2019; Accepted: 25 February 2020; Published: 12 March 2020
Lens.org Logo
CITATIONS
Cited by 17 scholarly publications.
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Image encryption

Image enhancement

Computer security

Diffusion

Image segmentation

Complex systems

Statistical analysis

RELATED CONTENT


Back to Top