Table of Contents Author Guidelines Submit a Manuscript
Discrete Dynamics in Nature and Society
Volume 2018, Article ID 4585083, 24 pages
https://doi.org/10.1155/2018/4585083
Research Article

Image Encryption Technology Based on Fractional Two-Dimensional Triangle Function Combination Discrete Chaotic Map Coupled with Menezes-Vanstone Elliptic Curve Cryptosystem

1Department of Mathematics, Shanghai University, Shanghai 200444, China
2Science and Technology on Communication Security Laboratory, Chengdu, Sichuan 610041, China

Correspondence should be addressed to Tiecheng Xia; nc.ude.uhs@ctaix

Received 7 December 2017; Revised 10 February 2018; Accepted 22 February 2018; Published 23 April 2018

Academic Editor: Youssef N. Raffoul

Copyright © 2018 Zeyu Liu et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. L. Xu, X. Gou, Z. Li, and J. Li, “A novel chaotic image encryption algorithm using block scrambling and dynamic index based diffusion,” Optics and Lasers in Engineering, vol. 91, pp. 41–52, 2017. View at Publisher · View at Google Scholar · View at Scopus
  2. L. Teng, X. Wang, and J. Meng, “A chaotic color image encryption using integrated bit-level permutation,” Multimedia Tools and Applications, pp. 1–14, 2017. View at Publisher · View at Google Scholar · View at Scopus
  3. R. Enayatifar, A. H. Abdullah, I. F. Isnin, A. Altameem, and M. Lee, “Image encryption using a synchronous permutation-diffusion technique,” Optics and Lasers in Engineering, vol. 90, pp. 146–154, 2017. View at Publisher · View at Google Scholar · View at Scopus
  4. Y. Li, C. Wang, and H. Chen, “A hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutation,” Optics and Lasers in Engineering, vol. 90, pp. 238–246, 2017. View at Publisher · View at Google Scholar · View at Scopus
  5. S. Chakraborty, A. Seal, M. Roy, and K. Mali, “A novel lossless image encryption method using DNA substitution and chaotic logistic map,” International Journal of Security and Its Applications, vol. 10, no. 2, pp. 205–216, 2016. View at Publisher · View at Google Scholar · View at Scopus
  6. N. Zhou, S. Pan, S. Cheng, and Z. Zhou, “Image compression�Cencryption scheme based on hyper-chaotic system and 2D compressive sensing,” Optics & Laser Technology, vol. 82, pp. 121–133, 2016. View at Publisher · View at Google Scholar
  7. K. S. Miller and B. Ross, “Fractional difference calculus,” in Univalent functions, fractional calculus, and their applications (K\=oriyama, 1988), Ellis Horwood Ser. Math. Appl., pp. 139–152, Horwood, Chichester, 1989. View at Google Scholar · View at MathSciNet
  8. M. Bohner and A. Peterson, Dynamic Equations on Time Scales: An Introduction with Applications, Birkhauser, Boston, Mass, USA, 2001. View at Publisher · View at Google Scholar · View at MathSciNet
  9. F. M. Atıcı and P. W. Eloe, “Initial value problems in discrete fractional calculus,” Proceedings of the American Mathematical Society, vol. 137, no. 3, pp. 981–989, 2009. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  10. F. M. Atici and S. Sengul, “Modeling with fractional difference equations,” Journal of Mathematical Analysis and Applications, vol. 369, no. 1, pp. 1–9, 2010. View at Publisher · View at Google Scholar · View at MathSciNet
  11. M. T. Holm, “The Laplace transform in discrete fractional calculus,” Computers & Mathematics with Applications, vol. 62, no. 3, pp. 1591–1601, 2011. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  12. M. D. Ortigueira, “Introduction to fractional linear systems. Part 2: discrete-time case,” IEE Proceedings Vision, Image and Signal Processing, vol. 147, no. 1, pp. 71–78, 2000. View at Publisher · View at Google Scholar · View at Scopus
  13. M. D. Ortigueira, F. J. V. Coito, and J. J. Trujillo, “A new look into the discrete-time fractional calculus: Derivatives and exponentials,” in Proceedings of the 6th Workshop on Fractional Differentiation and Its Applications, FDA 2013, pp. 629–634, France, February 2013. View at Publisher · View at Google Scholar · View at Scopus
  14. G.-C. Wu and D. Baleanu, “Discrete chaos in fractional delayed logistic maps,” Nonlinear Dynamics, vol. 80, no. 4, pp. 1697–1703, 2015. View at Publisher · View at Google Scholar · View at Scopus
  15. G.-C. Wu and D. Baleanu, “Discrete fractional logistic map and its chaos,” Nonlinear Dynamics, vol. 75, no. 1-2, pp. 283–287, 2014. View at Publisher · View at Google Scholar · View at Scopus
  16. G.-C. Wu, D. Baleanu, and S.-D. Zeng, “Discrete chaos in fractional sine and standard maps,” Physics Letters A, vol. 378, no. 5-6, pp. 484–487, 2014. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  17. K. Araki, T. Satoh, and S. Miura, “Overview of elliptic curve cryptography,” Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface, vol. 1431, pp. 29–49, 1998. View at Publisher · View at Google Scholar · View at Scopus
  18. C. Ma, Modern Cryptography, National Defense Industry Press, 2014.
  19. S. M. Ismail, L. A. Said, A. A. Rezk et al., “Biomedical image encryption based on double-humped and fractional logistic maps,” in Proceedings of the 6th International Conference on Modern Circuits and Systems Technologies, MOCAST 2017, Greece, May 2017. View at Publisher · View at Google Scholar · View at Scopus
  20. J.-F. Zhao, S.-Y. Wang, L.-T. Zhang, and X.-Y. Wang, “Image encryption algorithm based on a novel improper fractional-order attractor and a wavelet function map,” Journal of Electrical and Computer Engineering, vol. 2017, Article ID 8672716, 2017. View at Publisher · View at Google Scholar · View at Scopus
  21. P. Muthukumar, P. Balasubramaniam, and K. Ratnavelu, “A novel cascade encryption algorithm for digital images based on anti-synchronized fractional order dynamical systems,” Multimedia Tools and Applications, pp. 1–22, 2016. View at Publisher · View at Google Scholar · View at Scopus
  22. G.-C. Wu, D. Baleanu, and Z.-X. Lin, “Image encryption technique based on fractional chaotic time series,” Journal of Vibration and Control, vol. 22, no. 8, pp. 2092–2099, 2016. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  23. Z. Liu and T. Xia, “Novel two dimensional fractional-order discrete chaotic map and its application to image encryption,” Applied Computing and Informatics, 2017. View at Publisher · View at Google Scholar
  24. Z. Liu, T. Xia, and J. Wang, “Fractional two-dimensional discrete chaotic map and its applications to the information security with elliptic-curve public key cryptography,” Journal of Vibration and Control, p. 107754631773471, 2017. View at Publisher · View at Google Scholar
  25. F. M. Atici and P. W. Eloe, “A transform method in discrete fractional calculus,” International Journal of Difference Equations, vol. 2, no. 2, pp. 165–176, 2007. View at Google Scholar · View at MathSciNet
  26. T. Abdeljawad and D. Baleanu, “Fractional differences and integration by parts,” Journal of Computational Analysis and Applications, vol. 13, no. 3, pp. 574–582, 2011. View at Google Scholar · View at MathSciNet · View at Scopus
  27. Y. Zhou, F. Chen, and X. Luo, “Existence results for nonlinear fractional difference equation,” Advances in Difference Equations, vol. 2011, Article ID 713201, 2011. View at Publisher · View at Google Scholar · View at Scopus
  28. N. Koblitz, “Elliptic curve cryptosystems,” Mathematics of Computation, vol. 48, no. 177, pp. 203–209, 1987. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  29. Y. Xiao, Research on Elliptic Curve Cryptography, Huazhong University of Science and Technology Press, 2006.
  30. P. Li, L. Min, Y. Hu, G. Zhao, and X. Li, “Novel two dimensional discrete chaotic maps and simulations,” in Proceedings of the 2012 IEEE 6th International Conference on Information and Automation for Sustainability, ICIAFS 2012, pp. 159–162, China, September 2012. View at Publisher · View at Google Scholar · View at Scopus
  31. M. M. Liu, T. C. Xia, and J. B. Wang, “A two dimensional fractional discrete chaos combined with triangle function,” Journal of Shanghai University (Natural Science Edition), 2017, preprinted. View at Google Scholar
  32. G.-C. Wu and D. Baleanu, “Jacobian matrix algorithm for Lyapunov exponents of the discrete fractional maps,” Communications in Nonlinear Science and Numerical Simulation, vol. 22, no. 1-3, pp. 95–100, 2015. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  33. F. M. Guo and L. Tu, The Application of Chaotic Theory in Cryptography, Beijing Institute of Technology Press, Beijing, China, 2015.
  34. D. Xiao, X. Liao, and P. Wei, “Analysis and improvement of a chaos-based image encryption algorithm,” Chaos, Solitons & Fractals, vol. 40, no. 5, pp. 2191–2199, 2009. View at Publisher · View at Google Scholar · View at Scopus
  35. C. Li, S. Li, G. Chen, and W. A. Halang, “Cryptanalysis of an image encryption scheme based on a compound chaotic sequence,” Image and Vision Computing, vol. 27, no. 8, pp. 1035–1039, 2009. View at Publisher · View at Google Scholar · View at Scopus
  36. R. Rhouma, E. Solak, and S. Belghith, “Cryptanalysis of a new substitution-diffusion based image cipher,” Communications in Nonlinear Science and Numerical Simulation, vol. 15, no. 7, pp. 1887–1892, 2010. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  37. Y. Zhang, D. Xiao, W. Wen, and M. Li, “Cryptanalyzing a novel image cipher based on mixed transformed logistic maps,” Multimedia Tools and Applications, vol. 73, no. 3, pp. 1885–1896, 2014. View at Publisher · View at Google Scholar · View at Scopus
  38. C. Li, L. Y. Zhang, R. Ou, K.-W. Wong, and S. Shu, “Breaking a novel colour image encryption algorithm based on chaos,” Nonlinear Dynamics, vol. 70, no. 4, pp. 2383–2388, 2012. View at Publisher · View at Google Scholar · View at Scopus
  39. Y. Zhang, D. Xiao, W. Wen, and H. Nan, “Cryptanalysis of image scrambling based on chaotic sequences and Vigenère cipher,” Nonlinear Dynamics, vol. 78, no. 1, pp. 235–240, 2014. View at Publisher · View at Google Scholar · View at Scopus
  40. Y. Zhang, D. Xiao, W. Wen, and M. Li, “Breaking an image encryption algorithm based on hyper-chaotic system with only one round diffusion process,” Nonlinear Dynamics, vol. 76, no. 3, pp. 1645–1650, 2014. View at Publisher · View at Google Scholar · View at Scopus
  41. L. Y. Zhang, C. Li, K.-W. Wong, S. Shu, and G. Chen, “Cryptanalyzing a chaos-based image encryption algorithm using alternate structure,” The Journal of Systems and Software, vol. 85, no. 9, pp. 2077–2085, 2012. View at Publisher · View at Google Scholar · View at Scopus