Cargando…

A robust image encryption scheme based on compressed sensing and novel 7D oscillato with complex dynamics.

The present work studies a novel efficient compressed based cryptosystem which combines a dynamical parameter coming from high dimensional system, a dynamics S-box and a 2D compress sensing (2D-CS). Firstly, a secret key depending on input image is gotten via the SHA-256 function. That input image,...

Descripción completa

Detalles Bibliográficos
Autores principales: Ndassi, Herman Landry, Kengne, Romanic, Gakam Tegue, Armand Gabriel, Motchongom, Marceline Tingue, Tchitnga, Robert, Tchoffo, Martin
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Elsevier 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10360601/
https://www.ncbi.nlm.nih.gov/pubmed/37484273
http://dx.doi.org/10.1016/j.heliyon.2023.e16514
Descripción
Sumario:The present work studies a novel efficient compressed based cryptosystem which combines a dynamical parameter coming from high dimensional system, a dynamics S-box and a 2D compress sensing (2D-CS). Firstly, a secret key depending on input image is gotten via the SHA-256 function. That input image, decomposed into four sub-images uses chaotic sequences of the novel 7D multistable system to perform 2D compress sensing. Afterward, the previous compressed image is substituted by the key-dependent Mordell elliptic curve based dynamic S-box. At the end, the diffusion of the substituted image is proceed by chaotic sequences coming from the novel 7D multistable system. The compressed based cryptosystem presented here is considerably dependent on the original image. Moreover, the 7D chaotic system exhibits phenomenon of transient chaos. Equally, we have found plan equilibria hidden attractors which is a good chaos based property in cryptography. Let's recall that up to date, phenomenon of transient chaos and plan equilibria hidden attractors are rarely reported in Josephson junction systems. This denothing the novelty of this article. Through well-known metrics, the results found are evaluated and validated as well as their robustness over brute force attacks. The obtained results are termed as good in accordances with the existing ones over the literature.