Hash key-based image encryption using crossover operator and chaos

Ramzi Guesmi, Mohamed Amine Ben Farah, Abdennaceur Kachouri, Mounir Samet

Research output: Contribution to journalArticle

64 Citations (Scopus)

Abstract

This paper proposes a color image encryption scheme using one-time keys based on crossover operator, chaos and the Secure Hash Algorithm(SHA-2). The (SHA-2) is employed to generate a 256-bit hash value from both the plain-image and the secret hash keys to make the key stream change in each encryption process. The SHA-2 value is employed to generate three initial values of the chaotic system. The permutation-diffusion process is based on the crossover operator and XOR operator, respectively. Experimental results and security analysis show that the scheme can achieve good encryption result through only one round encryption process, the key space is large enough to resist against common attacks,so the scheme is reliable to be applied in image encryption and secure communication.

Original languageEnglish
Pages (from-to)4753-4769
Number of pages17
JournalMultimedia Tools and Applications
Volume75
Issue number8
Early online date27 Feb 2015
DOIs
Publication statusPublished - 30 Apr 2016

Keywords

  • chaotic map
  • crossover
  • hash function
  • image encryption

Fingerprint Dive into the research topics of 'Hash key-based image encryption using crossover operator and chaos'. Together they form a unique fingerprint.

Cite this