Next Article in Journal
Representation and Characterization of Nonstationary Processes by Dilation Operators and Induced Shape Space Manifolds
Next Article in Special Issue
Video Summarization for Sign Languages Using the Median of Entropy of Mean Frames Method
Previous Article in Journal
Evaluating Sustainability of Regional Water Resources Based on Improved Generalized Entropy Method
Previous Article in Special Issue
An Adaptive Weight Method for Image Retrieval Based Multi-Feature Fusion
Open AccessArticle

A New Image Encryption Algorithm Based on Chaos and Secure Hash SHA-256

by Shuqin Zhu 1, Congxu Zhu 2,3,4,* and Wenhong Wang 1
1
School of Computer and Science, Liaocheng University, Liaocheng 252059, China
2
School of Information Science and Engineering, Central South University, Changsha 410083, China
3
School of Physics and Electronics, Central South University, Changsha 410083, China
4
Guangxi Colleges and Universities Key Laboratory of Complex System Optimization and Big Data Processing, Yulin Normal University, Yulin 537000, China
*
Author to whom correspondence should be addressed.
Entropy 2018, 20(9), 716; https://doi.org/10.3390/e20090716
Received: 23 August 2018 / Revised: 16 September 2018 / Accepted: 17 September 2018 / Published: 19 September 2018
(This article belongs to the Special Issue Entropy in Image Analysis)
In order to overcome the difficulty of key management in “one time pad” encryption schemes and also resist the attack of chosen plaintext, a new image encryption algorithm based on chaos and SHA-256 is proposed in this paper. The architecture of confusion and diffusion is adopted. Firstly, the surrounding of a plaintext image is surrounded by a sequence generated from the SHA-256 hash value of the plaintext to ensure that each encrypted result is different. Secondly, the image is scrambled according to the random sequence obtained by adding the disturbance term associated with the plaintext to the chaotic sequence. Third, the cyphertext (plaintext) feedback mechanism of the dynamic index in the diffusion stage is adopted, that is, the location index of the cyphertext (plaintext) used for feedback is dynamic. The above measures can ensure that the algorithm can resist chosen plaintext attacks and can overcome the difficulty of key management in “one time pad” encryption scheme. Also, experimental results such as key space analysis, key sensitivity analysis, differential analysis, histograms, information entropy, and correlation coefficients show that the image encryption algorithm is safe and reliable, and has high application potential. View Full-Text
Keywords: chaotic system; image encryption; permutation-diffusion; SHA-256 hash value; dynamic index chaotic system; image encryption; permutation-diffusion; SHA-256 hash value; dynamic index
Show Figures

Figure 1

MDPI and ACS Style

Zhu, S.; Zhu, C.; Wang, W. A New Image Encryption Algorithm Based on Chaos and Secure Hash SHA-256. Entropy 2018, 20, 716.

Show more citation formats Show less citations formats
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Access Map by Country/Region

1
Back to TopTop