A chaotic image encryption algorithm based on sliding window and pseudo-random stack shuffling
This paper introduces a new one-dimensional chaotic system, which can be considered as an improvement upon the Bernoulli map. The Quadratic Bernoulli Chaotic System (QBCS) is introduced by replacing the linear segment of the Bernoulli map's two segments with quadratic nonlinearity. Subsequently...
Saved in:
| Published in: | Nonlinear dynamics Vol. 112; no. 15; pp. 13539 - 13569 |
|---|---|
| Main Authors: | , |
| Format: | Journal Article |
| Language: | English |
| Published: |
Dordrecht
Springer Netherlands
01.08.2024
Springer Nature B.V |
| Subjects: | |
| ISSN: | 0924-090X, 1573-269X |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Summary: | This paper introduces a new one-dimensional chaotic system, which can be considered as an improvement upon the Bernoulli map. The Quadratic Bernoulli Chaotic System (QBCS) is introduced by replacing the linear segment of the Bernoulli map's two segments with quadratic nonlinearity. Subsequently, an image encryption algorithm is proposed, utilizing a sliding window mechanism and dynamic stack sequences. Initially, the position of the initial window is determined, and to ensure the traversal of the window, the initial window position is set to the top-left corner of the original image. Subsequently, the step size for window movement is determined, and chaotic sequences generated by QBCS are used to scramble the contents selected by each window. Moreover, on the basis of the standard index scrambling concept, a dynamic stack traversal method is employed, wherein the behavior of elements entering and exiting the stack is determined according to the chaotic sequences generated by QBCS, effectively expanding the value space of the chaotic index sequence. Furthermore, combined with the chaotic sequences generated by QBCS, a diffusion process using distribution dilution is applied to the contents within each window. Experimental simulations and performance analysis demonstrate the algorithm's robust security. |
|---|---|
| Bibliography: | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ISSN: | 0924-090X 1573-269X |
| DOI: | 10.1007/s11071-024-09727-0 |