Reference Hub5
A Hybrid Image Encryption Algorithm Based on Chaos System and Simplified Advanced Encryption System

A Hybrid Image Encryption Algorithm Based on Chaos System and Simplified Advanced Encryption System

Zhang Zehui, Yao Fu, Tiegang Gao
Copyright: © 2020 |Volume: 11 |Issue: 4 |Pages: 24
ISSN: 1947-8534|EISSN: 1947-8542|EISBN13: 9781799805922|DOI: 10.4018/IJMDEM.2020100101
Cite Article Cite Article

MLA

Zehui, Zhang, et al. "A Hybrid Image Encryption Algorithm Based on Chaos System and Simplified Advanced Encryption System." IJMDEM vol.11, no.4 2020: pp.1-24. http://doi.org/10.4018/IJMDEM.2020100101

APA

Zehui, Z., Fu, Y., & Gao, T. (2020). A Hybrid Image Encryption Algorithm Based on Chaos System and Simplified Advanced Encryption System. International Journal of Multimedia Data Engineering and Management (IJMDEM), 11(4), 1-24. http://doi.org/10.4018/IJMDEM.2020100101

Chicago

Zehui, Zhang, Yao Fu, and Tiegang Gao. "A Hybrid Image Encryption Algorithm Based on Chaos System and Simplified Advanced Encryption System," International Journal of Multimedia Data Engineering and Management (IJMDEM) 11, no.4: 1-24. http://doi.org/10.4018/IJMDEM.2020100101

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Image encryption algorithms usually have two processes: permutation and diffusion. In order to enhance the performance of the permutation process, this study proposes a dynamic permutation method based on XOR operation and sorting. Combined with the hyper-chaotic system, SHA-256, the proposed permutation method and the simplified advanced encryption system (S-AES), a novel image encryption algorithm is presented in this paper. Firstly, the SHA-256 is used to generate initial condition values of the chaotic system and control parameters of the permutation method. Then, the chaotic system generates pseudo-random numbers, which are used in the permutation method and S-AES. Finally, the proposed permutation method and S-AES are used to encrypt the plain-image. In particular, parallel computing is used in this study to accelerate encryption speed. The results and analysis indicate that the proposed algorithm has excellent security to resist various typical attacks and fast encryption speed.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.