IEEE Access (Jan 2024)

Colour Image Encryption System Based on Four-Dimensional Memristor Hyperchaotic

  • Deqi Huang,
  • Zhenhua Zhang,
  • Yating Tu,
  • Lirong Xie

DOI
https://doi.org/10.1109/ACCESS.2024.3439191
Journal volume & issue
Vol. 12
pp. 161530 – 161544

Abstract

Read online

This paper presents a digital image encryption scheme based on an amnesic super chaotic system. First, the performance of the hyperchaotic system with the addition of a memristor is analyzed, such as phase track map, Lyapunov exponential map, Pangaea cross-section, and other tests. The test results prove that the system has better hyper-chaotic properties. The encryption system proposed in this paper generates the initial value of the system through the SHA3-256 function to realize ‘one map, one secret.’ Chaotic sequences are generated by the memristive hyperchaotic system and used to encrypt the image. The encryption process, goes through row, column disruption, Arnold disruption, DNA encryption, and improved heterogeneous or diffusion encryption. The encrypted image is analyzed by Matlab. It is verified that the pixel dis-tribution of the encrypted image is uniform through a 3D pixel distribution graph, correlation coefficient graph, and histogram. The NPCR, UACI values of the system are obtained experimentally are close to the ideal values 99.6064%, 33.4635%, which verifies the key sensitivity of the system. The encryption system has been tested to have good ability against anti-shearing attack and noise attacks. Encrypting images of different sizes, the entropy of the image information after encryption by the system is close to 8, which verifies that the system has good encryption effect. Finally, the data loss problem of the encryption system is experimentally analyzed. The experiments show that the encryption system proposed in this paper has good anti-data loss performance. Compared to the existing techniques, the encryption of hyper chaotic systems has a high degree of complexity and unpredictability, as well as sensitivity to initial values and parameters to obtain encrypted images with better confidentiality performance.

Keywords