Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Image encryption algorithm based on cascaded chaotic system and filter diffusion
Mengmeng LI, Jiaxin HUANG, Jiawen LI, Shanshan LI
Journal of Computer Applications    2026, 46 (1): 152-160.   DOI: 10.11772/j.issn.1001-9081.2025010043
Abstract15)   HTML0)    PDF (7446KB)(10)       Save

In response to the problems of small existing chaos system parameter range and poor diffusion effect of the encrypted algorithm, a new cascaded chaotic system and a filter diffusion model were designed, and a color image encryption algorithm with unlimited image size was proposed and implemented. Firstly, a chaotic system named 2D-SIHC (Two-Dimensional Sine-Iterative-Henon Chaotic system) of was proposed with Henon mapping, Sine mapping and Iterative mapping as seed mappings, and a linear function was incorporated to extend the parameter range. In the two-dimensional sequence generated by this system, one dimension was employed to disturb pixel positions, the other dimension was applied to update filter templates and perform diffusion operations. Secondly, in order to avoid key reuse that reduces the algorithm’s security, the SHA-512 algorithm was combined with plaintext images to generate the key through the calculation of flag bits and weights. Thirdly, in order to enhance the algorithm's diffusion effect, a two-dimensional filter diffusion model was designed. Different from the traditional filter diffusion, which altered image pixel values by fixed template traversing, image pixel values were modified by the new diffusion model dynamically in the way of introducing chaotic sequences to update filter template values continuously. Finally, encryption was realized. Experimental results show that,taking the Airplane image as an example, the proposed algorithm can achieve the Number Pixel Change Rate (NPCR) of 99.605 9% and the Unified Average Change Intensity (UACI) of 33.397 1%, respectively, which are very close to the ideal values. In addition, the algorithm can resist a noise interference with 0.2 intensity and a cropping attack with 50% missing,and it has high encryption efficiency.

Table and Figures | Reference | Related Articles | Metrics