• Optoelectronics Letters
  • Vol. 19, Issue 3, 186 (2023)
Zhenlong MAN1、*, Yue ZHANG2, Ying ZHOU1, Xiaoli LU1, and Zhaoquan WANG1
Author Affiliations
  • 1School of Electronic and Information Engineering, Liaoning Technical University, Huludao 125100, China
  • 2Advanced Interactive Technology and Application Laboratory, Computer Network Information Center, Chinese Academy of Sciences, Beijing 100190, China
  • show less
    DOI: 10.1007/s11801-023-2161-7 Cite this Article
    MAN Zhenlong, ZHANG Yue, ZHOU Ying, LU Xiaoli, WANG Zhaoquan. Bit level image encryption algorithm based on hyperchaotic system[J]. Optoelectronics Letters, 2023, 19(3): 186 Copy Citation Text show less
    References

    [1] WANG J, LI J, DI X, et al. Image encryption algorithm based on bit-level permutation and dynamic overlap diffusion[J]. IEEE access, 2020, 8: 160004-160024.

    [2] LI S, CHEN G, CHEUNG A, et al. On the design of perceptual MPEG-video encryption algorithms[J]. IEEE transactions on circuits and systems for video technology, 2007, 17(2): 214-223.

    [3] WANG X Y, YANG L, LIU R, et al. A chaotic image encryption algorithm based on perceptron model[J]. Nonlinear dynamics, 2010, 62(3): 615-621.

    [4] MATTHEWS R. On the derivation of a “chaotic” encryption algorithm[J]. Cryptologia, 1989, 13(1): 29-42.

    [5] ZHU Z, ZHANG W, WONG K, et al. A chaos-based symmetric image encryption scheme using a bit-level permutation[J]. Information sciences, 2011, 181(6): 1171-1186.

    [6] ZHANG L, WANG Y, ZHANG D. Research on multiple-image encryption mechanism based on Radon transform and ghost imaging[J]. Optics communications,2022, 504: 127494.

    [7] YU X, CHEN H, XIAO J, et al. Incoherent optical image encryption based on coded aperture correlation holography[J]. Optics communications, 2022, 510: 127889.

    [8] PARAMESHACHARI B D, PANDURANGA H T. Medical image encryption using SCAN technique and chaotic tent map system[M]//Recent advances in artificial intelligence and data engineering. Singapore: Springer, 2022: 181-193.

    [9] MANCY L, VIGILA S M C. Protection of encrypted medical image using consent based access control[J]. International journal of medical engineering and informatics, 2022, 14(1): 43-51.

    [10] TU S, UR REHMAN S, WAQAS M, et al. Optimisation-based training of evolutionary convolution neural network for visual classification applications[J]. IET computer vision, 2020, 14(5): 259-267.

    [11] CHEN T H, LI K C. Multi-image encryption by circular random grids[J]. Information sciences, 2012, 189: 255-265.

    [12] RAVICHANDRAN D, BANU S A, MURTHY B K, et al. An efficient medical image encryption using hybrid DNA computing and chaos in transform domain[J]. Medical & biological engineering & computing, 2021, 59(3): 589-605.

    [13] ZHANG J, HUANG Z, LI X, et al. Quantum image encryption based on quantum image decomposition[J]. International journal of theoretical physics, 2021, 60(8): 2930-2942.

    [14] LORENZ E N. Deterministic nonperiodic flow[J]. Journal of atmospheric sciences, 1963, 20(2): 130-141.

    [15] FRIDRICH J. Symmetric ciphers based on two-dimensional chaotic maps[J]. International journal of bifurcation and chaos, 1998, 8(06): 1259-1284.

    [16] HUA Z, ZHOU Y, PUN C M, et al. 2D sine logistic modulation map for image encryption[J]. Information sciences, 2015, 297: 80-94.

    [17] ZHANG X, WANG L, CUI G, et al. Entropy-based block scrambling image encryption using DES structure and chaotic systems[J]. International journal of optics, 2019.

    [18] LIN J, ZHAO K, CAI X, et al. An image encryption method based on logistic chaotic mapping and DNA coding[C]//MIPPR 2019: Remote Sensing Image Processing, Geographic Information Systems, and Other

    [19] HUA Z, ZHOU Y. Image encryption using 2D logistic-adjusted-sine map[J]. Information sciences, 2016, 339: 237-253.

    [20] CHEN S, Lü J. Parameters identification and synchronization of chaotic systems based upon adaptive control[J]. Physics letters A, 2002, 299(4): 353-358.

    [21] from the symbolic sequences generated by chaos system[J]. Chaos, solitons & fractals, 2004, 22(2): 359-366.

    [22] HUA Z, ZHOU Y, CHEN C L P. A new series-wound framework for generating 1D chaotic maps[C]//2013 IEEE Digital Signal Processing and Signal Processing Education Meeting (DSP/SPE), August 11-14, 2013, USA. New York: IEEE, 2013: 118-123.

    [23] ZAREI A. Complex dynamics in a 5-D hyper-chaotic attractor with four-wing, one equilibrium and multiple chaotic attractors[J]. Nonlinear dynamics, 2015, 81(1): 585-605.

    [24] MAN Z, LI J, DI X, et al. Double image encryption algorithm based on neural network and chaos[J]. Chaos, solitons & fractals, 2021, 152: 111318.

    [25] ZHANG Y. A new unified image encryption algorithm based on a lifting transformation and chaos[J]. Information sciences, 2021, 547: 307-327.

    [26] GAO X, MOU J, XIONG L, et al. A fast and efficient multiple images encryption based on single-channel encryption and chaotic system[J]. Nonlinear dynamics, 2022, 108(1): 613-636.

    [27] GUPTA M, SINGH V P, GUPTA K K, et al. An efficient image encryption technique based on two-level security for internet of things[J]. Multimedia tools and applications, 2022: 1-21.

    [28] WANG X, TENG L, QIN X. A novel color image encryption algorithm based on chaos[J]. Signal processing, 2012, 92(4): 1101-1108.

    MAN Zhenlong, ZHANG Yue, ZHOU Ying, LU Xiaoli, WANG Zhaoquan. Bit level image encryption algorithm based on hyperchaotic system[J]. Optoelectronics Letters, 2023, 19(3): 186
    Download Citation