Next Article in Journal
An Authentication Protocol for the Medical Internet of Things
Next Article in Special Issue
Reversible Data Hiding Using an Improved Pixel Value Ordering and Complementary Strategy
Previous Article in Journal
Distortion-Corrected Integral Imaging 3D Display System Based on Lens Array Holographic Optical Element
Previous Article in Special Issue
Clustering with Missing Features: A Density-Based Approach
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Image Encryption Algorithm Using 2-Order Bit Compass Coding and Chaotic Mapping

1
College of Electronic and Information Engineering, Nanjing University of Aeronautics and Astronautics, Nanjing 211106, China
2
College of Finance and Mathematics, Huainan Normal University, Huainan 232038, China
*
Author to whom correspondence should be addressed.
Symmetry 2022, 14(7), 1482; https://doi.org/10.3390/sym14071482
Submission received: 31 May 2022 / Revised: 11 July 2022 / Accepted: 12 July 2022 / Published: 20 July 2022

Abstract

This paper proposes a novel image encryption algorithm based on an integer form of chaotic mapping and 2-order bit compass diffusion technique. Chaotic mapping has been widely used in image encryption. If the floating-point number generated by chaotic mapping is applied to image encryption algorithm, it will slow encryption and increase the difficulty of hardware implementation. An innovative pseudo-random integer sequence generator is proposed. In chaotic system, the result of one-iteration is used as the shift value of two binary sequences, the original symmetry relationship is changed, and then XOR operation is performed to generate a new binary sequence. Multiple iterations can generate pseudo-random integer sequences. Here integer sequences have been used in scrambling of pixel positions. Meanwhile, this paper demonstrates that there is an inverse operation in the XOR operation of two binary sequences. A new pixel diffusion technique based on bit compass coding is proposed. The key vector of the algorithm comes from the original image and is hidden by image encryption. The efficiency of our proposed method in encrypting a large number of images is evaluated using security analysis and time complexity. The performance evaluation of algorithm includes key space, histogram differential attacks, gray value distribution(GDV),correlation coefficient, PSNR, entropy, and sensitivity. The comparison between the results of coefficient, entropy, PSNR, GDV, and time complexity further proves the effectiveness of the algorithm.
Keywords: image encryption; bit compass coding; plaintext data; XOR operation; pseudo-random sequence image encryption; bit compass coding; plaintext data; XOR operation; pseudo-random sequence

Share and Cite

MDPI and ACS Style

Chen, J.; Wu, Y.; Sun, Y.; Yang, C. Image Encryption Algorithm Using 2-Order Bit Compass Coding and Chaotic Mapping. Symmetry 2022, 14, 1482. https://doi.org/10.3390/sym14071482

AMA Style

Chen J, Wu Y, Sun Y, Yang C. Image Encryption Algorithm Using 2-Order Bit Compass Coding and Chaotic Mapping. Symmetry. 2022; 14(7):1482. https://doi.org/10.3390/sym14071482

Chicago/Turabian Style

Chen, Jinlin, Yiquan Wu, Yeguo Sun, and Chunzhi Yang. 2022. "Image Encryption Algorithm Using 2-Order Bit Compass Coding and Chaotic Mapping" Symmetry 14, no. 7: 1482. https://doi.org/10.3390/sym14071482

APA Style

Chen, J., Wu, Y., Sun, Y., & Yang, C. (2022). Image Encryption Algorithm Using 2-Order Bit Compass Coding and Chaotic Mapping. Symmetry, 14(7), 1482. https://doi.org/10.3390/sym14071482

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop