A novel cryptosystem using dynamics perturbation of logistic map
Recently, the chaotic cryptosystem has been
studied extensively [1]. The chaotic cryptography
employs chaotic dynamics generated by chao systems
to have the complexity for encryption; this is the
alternative approach to encrypt data, beside the
conventional approach of using numerical complexity
[2]. The main advantages of using chaos over the
conventional approach is the simpleness in design
and the elastic keyspace. However, the disadvantage
so far for chaotic crytosystem is the lack of
provability [3]. Extensive study has been pursuited to
make chaotic cyrpstosystem reliable and applicable.
There are few main ways in employing chaotic
systems for cryptography. Those are that (i) chaotic
state values are used as a random sequence for
encryption [4]; (ii) chaotic dynamics involves in
encryption and decryption by means of
perturbing/modulating on the initial vector (IV)
and/or on the control parameters [5]. The perturbation
is known as changing the value of state variable or of
control parameter during iterations. The proposed
cryptosystem in this paper is categorized into the
second way.
More recently, the statistical properties of bits in
bit layers of image have been analyzed [6]. It shows
that the statistics of bits in different bit layers of
image should be balanced, and the method of bit
balancing was proposed [7]. In that work, the
statistical properties of ciphertext produced by a
cryptosystem with the inclusion of bit balancing is
improved significantly.
* Corresponding author: Tel.: (+84) 988.802.694
Email: thang.hoangmanh@hust.edu.vn
In this work, a novel cryptosystem is proposed
with the use of Logistic map. The structure of the
cryptosystem is the Unified model [2], with
permutation and diffusion. The Logistic map is
employed for both permutation and diffusion. All the
chaotic value and the control parameter of Logistic
map are represented in the format of fixed point. The
perturbation is made in bit level to the control
parameter. In addition, the bit distribution balancing
is proposed to improve the statistical properties in the
ciphertext. The simulation result shows the
effectiveness of the proposed system and the
simulation results are compared with those in other
works published recently.
Trang 1
Trang 2
Trang 3
Trang 4
Trang 5
Trang 6
Trang 7
Tóm tắt nội dung tài liệu: A novel cryptosystem using dynamics perturbation of logistic map
�−1 to make 𝐶𝐶𝑋𝑋𝑋𝑋 delayed for calculating the future pixel. The value of 𝐵𝐵𝐵𝐵𝐵𝐵𝐵𝐵𝐵𝐵(𝑑𝑑𝑑𝑑𝑑𝑑𝑑𝑑) becomes 𝐵𝐵𝐵𝐵𝐵𝐵𝐵𝐵𝐵𝐵(𝑑𝑑𝑑𝑑𝑑𝑑𝑑𝑑) = � 𝐶𝐶0 for 𝑛𝑛(𝑑𝑑𝑑𝑑𝑑𝑑𝑑𝑑) = 1 and 𝑝𝑝(𝑥𝑥, 𝑦𝑦) with 𝑥𝑥 = 0 and 𝑦𝑦 = 0𝐶𝐶𝑋𝑋𝑋𝑋−1 for 𝑛𝑛(𝑑𝑑𝑑𝑑𝑑𝑑𝑑𝑑) = 1 and 𝑝𝑝(𝑥𝑥, 𝑦𝑦) with 𝑥𝑥 ≠ 0 or 𝑦𝑦 ≠ 0 𝐵𝐵𝐵𝐵𝐵𝐵𝐸𝐸𝑥𝑥𝐵𝐵𝑟𝑟(𝑑𝑑𝑑𝑑𝑑𝑑𝑑𝑑) for 1 < 𝑛𝑛(𝑑𝑑𝑑𝑑𝑑𝑑𝑑𝑑) ≤ 𝑁𝑁(𝑑𝑑𝑑𝑑𝑑𝑑𝑑𝑑) and 𝑝𝑝(𝑥𝑥, 𝑦𝑦) with ∀𝑥𝑥,𝑦𝑦 . (8) The constraint for the number of bits in the cryptosystem will be considered. Fig. 3. Structure of iCD. Journal of Science & Technology 139 (2019) 024 - 030 27 3. Simulation results In order to illustrate the operation of the cryptosystem, the example is simulated for 8 bits gray scale images with the size of 256 × 256, or 𝑘𝑘1 =log2 256 × 256 = 16 bits and 𝑘𝑘2 = 8 bits. Tables 1 and 2 show the number of bits and the chosen value for parameters, respectively. Table 1. The number of bits representing for data. Parameters #bits Fixed point format 𝑚𝑚1 32 1.31 𝑚𝑚2 33 2.31 Table 2. The value of parameters and number of bits for representation. Parameters Chosen value Represented by #bits 𝑟𝑟(𝑝𝑝𝑛𝑛𝑝𝑝𝑝𝑝) 3.625 33 𝑟𝑟(𝑑𝑑𝑑𝑑𝑑𝑑𝑑𝑑) 3.625 33 𝐼𝐼𝑉𝑉(𝑝𝑝𝑛𝑛𝑝𝑝𝑝𝑝) 0.0123456789 32 𝐼𝐼𝑉𝑉(𝑑𝑑𝑑𝑑𝑑𝑑𝑑𝑑) 0.9876543210 32 𝐶𝐶0 123 8 Total no. of bits 138 The value of other parameters for the simulation is 𝑁𝑁(𝑑𝑑𝑑𝑑𝑑𝑑𝑑𝑑) = 1, 𝑁𝑁 = 1, 𝑛𝑛 = 1, and 𝑚𝑚 = 1. In order to guarantee the chaotic behavior exhibited by the Logistic map, 𝑟𝑟(𝑝𝑝𝑛𝑛𝑝𝑝𝑝𝑝) = 𝑟𝑟(𝑑𝑑𝑑𝑑𝑑𝑑𝑑𝑑) = 3.625 is chosen, so its binary representation is 111010000000000000000000000000000. The bit positions in 𝑟𝑟(𝑝𝑝𝑛𝑛𝑝𝑝𝑝𝑝) and 𝑟𝑟(𝑑𝑑𝑑𝑑𝑑𝑑𝑑𝑑) to be perturbed to produce 𝑟𝑟 are from 𝑏𝑏0 to 𝑏𝑏28. As a result, the value range of 𝑟𝑟 for the Logistic map in both the CPP and the CD is from 3.625 to 3.99999 (2−31 less than 4.0). The extension functions 𝑓𝑓1(. ) and 𝑓𝑓3(. )are filled zeros to the bit positions rather than those indicated in 𝑄𝑄1 (𝑝𝑝𝑛𝑛𝑝𝑝𝑝𝑝) and 𝑄𝑄1(𝑑𝑑𝑑𝑑𝑑𝑑𝑑𝑑). Moreover, the extraction functions 𝑓𝑓2(. ) and 𝑓𝑓4(. ) collect bits from 𝑋𝑋𝑛𝑛 with the order of bits defined in 𝑄𝑄2 (𝑝𝑝𝑛𝑛𝑝𝑝𝑝𝑝) and 𝑄𝑄2(𝑑𝑑𝑑𝑑𝑑𝑑𝑑𝑑). It is noted that the order of bits specified by 𝑄𝑄1 (𝑝𝑝𝑛𝑛𝑝𝑝𝑝𝑝), 𝑄𝑄1(𝑑𝑑𝑑𝑑𝑑𝑑𝑑𝑑), 𝑄𝑄2(𝑝𝑝𝑛𝑛𝑝𝑝𝑝𝑝), and 𝑄𝑄2(𝑑𝑑𝑑𝑑𝑑𝑑𝑑𝑑) will make the key space expanded significantly. In this example, the sizes are �𝑄𝑄1 (𝑝𝑝𝑛𝑛𝑝𝑝𝑝𝑝)� = 16, �𝑄𝑄1(𝑑𝑑𝑑𝑑𝑑𝑑𝑑𝑑)� = 8, �𝑄𝑄2(𝑝𝑝𝑛𝑛𝑝𝑝𝑝𝑝)� =16, and �𝑄𝑄2(𝑑𝑑𝑑𝑑𝑑𝑑𝑑𝑑)� = 8. The chosen order is displayed in Table 3. Table 3. The order of bits. The lists The order of bits 𝑄𝑄1 (𝑝𝑝𝑛𝑛𝑝𝑝𝑝𝑝) {2,9,13,1,10,8,5,12,3,14,7,15,4,0,6,11} 𝑄𝑄2 (𝑝𝑝𝑛𝑛𝑝𝑝𝑝𝑝) {3,14,6,15,10,8,4,12,13,11,7,1,5,0,2,9} 𝑄𝑄1 (𝑑𝑑𝑑𝑑𝑑𝑑𝑑𝑑) {7,1,3,6,4,5,2,0} 𝑄𝑄2 (𝑑𝑑𝑑𝑑𝑑𝑑𝑑𝑑) {2,5,6,0,4,3,7,1} Fig. 4 shows the encryption results for the images and the cipher images are recovered correctly. 4. The security analysis The security of the cryptosystem and specific example is presented to show the effectiveness. (a) Lena. (b) Ciphered Lena (c) Cameraman. (d) Ciphered Cameraman. (e) House. (f) Ciphered House. (g) Peppers. (h) Ciphered Peppers. Fig. 4. The plain images (left column) and its ciphered images (right column). Journal of Science & Technology 139 (2019) 024 - 030 28 4.1. The key space The rule of bits to be extracted and extended in the permutation and diffusion can be considered as the contribution to the key space. As shown in this example with the value 𝑟𝑟(𝑝𝑝𝑛𝑛𝑝𝑝𝑝𝑝) = 𝑟𝑟(𝑑𝑑𝑑𝑑𝑑𝑑𝑑𝑑) = 3.625, these are represented in the format of fixed point as 111010000000000000000000000000000. So the number of bits can be perturbed is 29 bits for each of control parameters in this example. There is a number of possible ways of extension for 𝑘𝑘1 and 𝑘𝑘2 bits laid out of 29 bits in the permutation and the diffusion processes. Moreover, the same number of possible ways of extraction for bits to get pixel positions 𝑋𝑋𝑋𝑋𝑛𝑛𝑛𝑛𝑛𝑛 and the value of cipher pixels 𝐶𝐶𝑋𝑋𝑋𝑋 from 𝑋𝑋𝑛𝑛. The location information for the extraction and extension is considered as the encryption key of the proposed cryptosystem. That is presented by the value of elements in 𝑄𝑄1 (𝑝𝑝𝑛𝑛𝑝𝑝𝑝𝑝), 𝑄𝑄1(𝑑𝑑𝑑𝑑𝑑𝑑𝑑𝑑), 𝑄𝑄2(𝑝𝑝𝑛𝑛𝑝𝑝𝑝𝑝), and 𝑄𝑄2 (𝑑𝑑𝑑𝑑𝑑𝑑𝑑𝑑). The values of the bit order can be ranged from 0 to 30, so, each element is encoded by 5 bits. It is noted that each elements of 𝑄𝑄1 (𝑝𝑝𝑛𝑛𝑝𝑝𝑝𝑝), and 𝑄𝑄2(𝑝𝑝𝑛𝑛𝑝𝑝𝑝𝑝) has 16 elements and each element represented by 5 bits, while each elements of 𝑄𝑄1 (𝑑𝑑𝑑𝑑𝑑𝑑𝑑𝑑)and 𝑄𝑄2(𝑑𝑑𝑑𝑑𝑑𝑑𝑑𝑑)has 8 elements and each is encoded by 5 bits. The total number of bits represents for the order of bits 𝑁𝑁𝑜𝑜𝑝𝑝𝑑𝑑𝑛𝑛𝑝𝑝 in 𝑄𝑄1 (𝑝𝑝𝑛𝑛𝑝𝑝𝑝𝑝), 𝑄𝑄1(𝑑𝑑𝑑𝑑𝑑𝑑𝑑𝑑), 𝑄𝑄2(𝑝𝑝𝑛𝑛𝑝𝑝𝑝𝑝), and 𝑄𝑄2(𝑑𝑑𝑑𝑑𝑑𝑑𝑑𝑑)is 𝑁𝑁𝑜𝑜𝑝𝑝𝑑𝑑𝑛𝑛𝑝𝑝 =5 × (2 × 16 + 2 × 8) = 240 bits. As given in Table 2, the number of bits representing for parameters is 𝑁𝑁𝑝𝑝𝑝𝑝𝑝𝑝𝑝𝑝 = 138. Therefore, the key space is 𝑁𝑁𝑆𝑆𝑝𝑝𝑝𝑝𝑆𝑆𝑛𝑛 = 𝑁𝑁𝑝𝑝𝑝𝑝𝑝𝑝𝑝𝑝 + 𝑁𝑁𝑜𝑜𝑝𝑝𝑑𝑑𝑛𝑛𝑝𝑝(= 378 bits in this case). It is clear that the key space 𝑁𝑁𝑆𝑆𝑝𝑝𝑝𝑝𝑆𝑆𝑛𝑛is expanded more much significantly in compared with that in the case of without considering the rule of bits to be extracted and extended. 4.2. The key sensitivity analysis The key sensitivity analysis is considered by means of the difference in ciphertexts obtained by smallest difference in encryption keys [8]. Let us call Δ𝐾𝐾 be the tolerance in the encryption key. The ciphertext difference rate (𝐶𝐶𝐶𝐶𝑟𝑟) is reflected for the key sensitivity and calculated by 𝐶𝐶𝐶𝐶𝑟𝑟 = 𝐷𝐷𝑑𝑑𝑑𝑑𝑑𝑑(𝐶𝐶,𝐶𝐶1)+𝐷𝐷𝑑𝑑𝑑𝑑𝑑𝑑(𝐶𝐶,𝐶𝐶2) 2𝑀𝑀×𝑁𝑁 × 100%. (9) 𝑀𝑀 and 𝑁𝑁 are the number of pixel rows and columns; 𝐶𝐶 is the ciphertext using the encryption key 𝐾𝐾; 𝐶𝐶1 and 𝐶𝐶2are ciphertexts using the encryption key 𝐾𝐾 + Δ𝐾𝐾 and 𝐾𝐾 − Δ𝐾𝐾, respectively. There, 𝐷𝐷𝐵𝐵𝑓𝑓𝑓𝑓(𝐴𝐴,𝐵𝐵) is the number of pixels with the value in 𝐴𝐴 different from that in 𝐵𝐵, i.e. 𝐷𝐷𝐵𝐵𝑓𝑓𝑓𝑓(𝐴𝐴,𝐵𝐵) = ∑ ∑ 𝐷𝐷𝐵𝐵𝑓𝑓𝑝𝑝(𝐴𝐴(𝑥𝑥,𝑦𝑦),𝐵𝐵(𝑥𝑥,𝑦𝑦))𝑁𝑁−1𝑦𝑦=0𝑀𝑀−1𝑥𝑥=0 , (10) where 𝐷𝐷𝐵𝐵𝑓𝑓𝑝𝑝(𝐴𝐴(𝑥𝑥,𝑦𝑦),𝐵𝐵(𝑥𝑥,𝑦𝑦)) is 𝐷𝐷𝐵𝐵𝑓𝑓𝑝𝑝�𝐴𝐴(𝑥𝑥, 𝑦𝑦),𝐵𝐵(𝑥𝑥,𝑦𝑦)� = �1, for 𝐴𝐴(𝑥𝑥,𝑦𝑦) ≠ 𝐵𝐵(𝑥𝑥,𝑦𝑦);0, for 𝐴𝐴(𝑥𝑥, 𝑦𝑦) = 𝐵𝐵(𝑥𝑥,𝑦𝑦). (11) The simulation is carried out with smallest difference in every single element contributing to the encryption key, i.e. 𝑟𝑟(𝑝𝑝𝑛𝑛𝑝𝑝𝑝𝑝), 𝑟𝑟(𝑑𝑑𝑑𝑑𝑑𝑑𝑑𝑑), 𝐼𝐼𝑉𝑉(𝑝𝑝𝑛𝑛𝑝𝑝𝑝𝑝), 𝐼𝐼𝑉𝑉(𝑑𝑑𝑑𝑑𝑑𝑑𝑑𝑑), and 𝐶𝐶0. The smallest amount of tolerance Δ𝐾𝐾 is defined by the resolution of the value representation, i.e. one bit of LSB. The value of other parameters is as chosen earlier. In addition, the simulation performs on a set of 100 random images with the same size of 256 × 256. The means and standard deviation of 𝐶𝐶𝐶𝐶𝑟𝑟 is as shown in Table 4. Table 4. The key sensitivity 𝐶𝐶𝐶𝐶𝑟𝑟. On parameter s 𝐶𝐶𝐶𝐶𝑟𝑟 Mean (%) Std. dev. (%) 𝑁𝑁𝑝𝑝𝑜𝑜𝑟𝑟𝑛𝑛𝑑𝑑 1 2 3 1 2 3 𝑟𝑟(𝑝𝑝𝑛𝑛𝑝𝑝𝑝𝑝) 99.8 99.9 99.9 0.015 0. 01 0.01 𝑟𝑟(𝑑𝑑𝑑𝑑𝑑𝑑𝑑𝑑) 99.7 99.8 99.8 0.02 0.02 0.01 𝐼𝐼𝑉𝑉(𝑝𝑝𝑛𝑛𝑝𝑝𝑝𝑝) 98.6 98.8 99.0 0.012 0.01 0.01 𝐼𝐼𝑉𝑉(𝑑𝑑𝑑𝑑𝑑𝑑𝑑𝑑) 98.9 98.9 99.0 0.02 0.015 0.01 𝐶𝐶0 99.0 99.4 99.5 0.021 0.02 0.01 It is clear from Table 4 that the rate of change is very large and it seems to need a single encryption round to get the value of almost pixels changed. The maximum value of 𝐶𝐶𝐶𝐶𝑟𝑟 is 99.9% at the third round is much better than that of 99.63% as the result of work of [10] published very recently. 4.3. Information entropy analysis In this work, the well-known Shannon’s information entropy is applied to measure the randomness in the data of cipher images. The information entropy (IE) is 𝐼𝐼𝐸𝐸(𝑚𝑚) = ∑ 𝑝𝑝(𝑚𝑚𝑑𝑑) log2 1𝑝𝑝(𝑝𝑝𝑖𝑖)2𝑘𝑘2−1𝑑𝑑=0 , (12) where 𝑘𝑘2 is the number of bits representing for the pixel value; 𝑚𝑚𝑑𝑑 is the value of pixels; and 𝑝𝑝(𝑚𝑚𝑑𝑑)is the probability of 𝑚𝑚𝑑𝑑 occcurence. In this work, four well- known grayscale images with the size of 256 × 256 are used for measuring 𝐼𝐼𝐸𝐸 of the cipher images, i.e. Lena, Cameramen, House, and Peppers. The 𝐼𝐼𝐸𝐸 with respect for a number of encryption rounds is obtained as given in Table 5. Specifically, the value of 𝐼𝐼𝐸𝐸 =7.999 is almost equal to the theoritical value of 8. It is much better than that most of recent results, i.e. 7,9972 in [11], 7,9974 in [12], and 7,9965 in [9], etc. Journal of Science & Technology 139 (2019) 024 - 030 29 Table 5. The IE of the ciphered image. Name IE 𝑁𝑁𝑝𝑝𝑜𝑜𝑟𝑟𝑛𝑛𝑑𝑑 1 2 3 Lena 7.990 7.990 7.998 Cameraman 7.980 7.990 7.999 House 7.970 7.989 7.999 Peppers 7.985 7.987 7.999 4.4. Differential analysis The differential analysis is to test the cryptosysem against from differential attacks by using the slightly difference in the plaintexts with respect to that in the corresponding ciphertexts. Here, the analysis for the differential attack is based on the two well-known measures, i.e. Number of Pixels Change Rate (NPCR) and Unified Average Changing Intensity (UACI). The equation to calculate 𝑁𝑁𝑃𝑃𝐶𝐶𝑁𝑁 and 𝑈𝑈𝐴𝐴𝐶𝐶𝐼𝐼 are as below. 𝑁𝑁𝑃𝑃𝐶𝐶𝑁𝑁 = ∑ 𝐷𝐷(𝑥𝑥,𝑦𝑦)𝑥𝑥,𝑦𝑦 𝑀𝑀×𝑁𝑁 × 100%, (13) 𝑈𝑈𝐴𝐴𝐶𝐶𝐼𝐼 = 1 𝑀𝑀×𝑁𝑁 ∑ |𝐶𝐶1(𝑥𝑥,𝑦𝑦)−𝐶𝐶2(𝑥𝑥,𝑦𝑦)|𝑥𝑥,𝑦𝑦 255 × 100%, (14) 𝐷𝐷(𝑥𝑥, 𝑦𝑦) = �1, 𝑓𝑓𝑓𝑓𝑟𝑟 𝐶𝐶1(𝑥𝑥, 𝑦𝑦) ≠ 𝐶𝐶2(𝑥𝑥, 𝑦𝑦)0, 𝑓𝑓𝑓𝑓𝑟𝑟 𝐶𝐶1(𝑥𝑥, 𝑦𝑦) = 𝐶𝐶2(𝑥𝑥, 𝑦𝑦). (15) There, 𝐶𝐶1(𝑥𝑥, 𝑦𝑦)and 𝐶𝐶2(𝑥𝑥, 𝑦𝑦) are pixels at the location (𝑥𝑥,𝑦𝑦) in the cipher images with a slightly difference in their corresponding plain images. In this work, a set of 100 plain images with the random value of pixels and the size of 256 × 256 are used. Encryption is carried out with the set of plain images 𝑃𝑃1 to produce a set of cipher images 𝐶𝐶1. The slightly difference is made to each of images in 𝑃𝑃 to get 𝑃𝑃2 . A modification with randomly increased or decreased by 1 to the value of randomly chosen pixel, except for the pixels with the value of 0 and 255. Then, images in 𝑃𝑃2 are encrypted with different encryption rounds (𝑁𝑁𝑝𝑝𝑜𝑜𝑟𝑟𝑛𝑛𝑑𝑑) to produce a set of cipher images 𝐶𝐶2. Calculation for 𝑁𝑁𝑃𝑃𝐶𝐶𝑁𝑁 and 𝑈𝑈𝐴𝐴𝐶𝐶𝐼𝐼 is performed on 𝐶𝐶1and 𝐶𝐶2. The average of 𝑁𝑁𝑃𝑃𝐶𝐶𝑁𝑁 and 𝑈𝑈𝐴𝐴𝐶𝐶𝐼𝐼 as well as the standard deviation are calculated over the set of 100 images as described. The result is shown in Table 6 that the 𝑁𝑁𝑃𝑃𝐶𝐶𝑁𝑁 and 𝑈𝑈𝐴𝐴𝐶𝐶𝐼𝐼 of proposed cryptosystem is as good as those in the recent results published by in [9,10] and better than those cited therein. Table 6 shows that the maximum NPCR and UACI are 99.9 and 33.451, respectively. The result of NPCR in this work is better that that of 99.6126 in [9], of 99.61 in [10], and of 99.5974 in [13], etc. Table 6. The average of 𝑁𝑁𝑃𝑃𝐶𝐶𝑁𝑁 and 𝑈𝑈𝐴𝐴𝐶𝐶𝐼𝐼 calculated over 100 pixels. 𝑁𝑁𝑝𝑝𝑜𝑜𝑟𝑟𝑛𝑛𝑑𝑑 𝑁𝑁𝑃𝑃𝐶𝐶𝑁𝑁 (%) 𝑈𝑈𝐴𝐴𝐶𝐶𝐼𝐼 (%) Mean Std. dev. Mean Std. dev. 1 99.6 0.030 33.451 0.020 2 99.8 0.012 33.450 0.015 3 99.9 0.010 33.430 0.011 5. Conclusion and future works The paper has presented the novel cryptosystem using the Logistic map. The main contribution of this work is that the cryptosystem works on the bit level perturbation on the control parameter of the Logistic map. The key space is 378 bits and this is very large in compared with other cryptosystems. With this key space, the brute-force attack must be unsuccessful on nowadays computers. The simulation results also show that the proposed cryptosystem can be as good as those published recently. The future work will be the investigation for the bit level perturbation on chaotic values of state variables, and for the implementation them on the reconfigurable hardware. Acknowledgments This research is funded by Vietnam National Foundation for Science and Technology Development (NAFOSTED) under grant number 102.04-2018.06. References [1] L. Kocarev, S. Lian, Chaos-Based Cryptography: Theory, Algorithms and Applications, Springer Berlin Heidelberg (2011). [2] L. Kocarev, Chaos-based cryptography: a brief overview, IEEE Circuits and Systems Magazine 1 (2001) 6-21. [3] G. Alvarez, S. Li, Some basic cryptographic requirements for chaos-based cryptosystems, International Journal of Bifurcation and Chaos 16 (2006) 2129-2151. [4] S.E. Assad, M. Farajallah, A new chaos-based image encryption system, Signal Processing: Image Communication 41 (2016), 144-157. [5] L. Liu, S. Miao, A new image encryption algorithm based on logistic chaotic map with varying parameter, SpringerPlus 5 (2016) 289. [6] W. Zhang, K-W. Wong, H. Yu, Z-L. Zhu, A symmetric color image encryption algorithm using the intrinsic features of bit distributions, Communications in Nonlinear Science and Numerical Simulation 18 (2013) 584-600. Journal of Science & Technology 139 (2019) 024 - 030 30 [7] J. Chen, Z. Zhu, C. Fu, L. Zhang, Y. Zhang, An image encryption scheme using nonlinear inter-pixel computing and swapping based permutation approach, Communications in Nonlinear Science and Numerical Simulation 23 (2015) 294 – 310. [8] S. Lian, J. Sun, Z. Wang, Security Analysis of A Chaos-based Image Encryption Algorithm, Physica A. 351 (2005) 645 - 661. [9] P. Ping, J. Fan, Y. Mao, F. Xu, J. Gao, A chaos based image encryption scheme using digit-level permutation and block diffusion, IEEE Access. 6 (2018) 67581 - 67593. [10] Erdem Yavuz, A novel chaotic image encryption algorithm based on content-sensitive dynamic function switching scheme, Optics & Laser Technology 114 (2019), 224-239. [11] Y. Li, C. Wang, and H. Chen, A hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutation, Optics and Lasers in Engineering 90 (2017), 238 – 246. [12] X.Wang and H. li Zhang, A color image encryption with heterogeneous bit permutation and correlated chaos, Optics Communications 342 (2015), 51– 60. [13] A.-V. Diaconu, Circular inter-intra pixels bit-level permutation and chaos based image encryption, Information Sciences 355-356 (2016), 314 – 327.
File đính kèm:
- a_novel_cryptosystem_using_dynamics_perturbation_of_logistic.pdf