Advertisement

A Novel Image Encryption Algorithm Based on Hybrid Chaotic Mapping and Intelligent Learning in Financial Security System

  • Shuang Pan
  • Jianguo WeiEmail author
  • Shaobo Hu
Article
  • 12 Downloads

Abstract

With the expansion and prevalence of financial certification, problems of financial security have been springing up. How to ensure the security of financial information and protect our privacy is an issue of particular concern. In order to reduce the influence of chaotic periodicity on cipher-text, an image dynamic encryption algorithm based on hybrid chaotic system and deep network is proposed in this paper. Firstly, the hybrid chaotic system is constructed to combine many mapping functions by using the nonlinear combination mechanism, and the chaotic sequence is outputted to generate the initial value of hybrid chaotic system by using the pixel value. Then the plain-text pixel values are adopted to generate the initial value of the hybrid system for improving the anti-plain attack ability of the algorithm; Artificial neural network is used to process chaotic sequences, and effectively eliminate chaotic periodicity; The classification and encryption of permutation image are realized by constructing quantization method and hetero-diffusion technology. The experimental results show that our proposed encryption technology has higher security and stronger ability to resist plain-text attack compared with the existing image encryption algorithms, which adapts to enhance the security of the financial system.

Keywords

Financial Security Dynamic Encryption Intelligent Network Chaotic System Anti-plain Attack Image Permutation 

Notes

Acknowledgments

This work was financially supported by the National Social Science Foundation of China (Grant No. 14BGL185).

References

  1. 1.
    Acharya RV (2018) System and method for electronic deposit of a financial instrument by banking customers from remote locations by use of a digital image: U.S. Patent 9,946,998[P]. 4–17Google Scholar
  2. 2.
    Chai X, Chen Y, Broyde L (2017) A novel chaos-based image encryption algorithm using DNA sequence operations[J]. Opt Lasers Eng 88:197–213CrossRefGoogle Scholar
  3. 3.
    Dongare A S, Alvi A S, Tarbani N M (2017) An Efficient Technique for Image Encryption and Decryption for Secured Multimedia Application[J]Google Scholar
  4. 4.
    Guan ZH, Huang F, Guan W (2005) Chaos-based image encryption algorithm[J]. Phys Lett A 346(1–3):153–157CrossRefGoogle Scholar
  5. 5.
    Hua T et al (2015) Quantum image encryption algorithm based on image correlation decomposition. Int J Theor Phys 54(2):526–537CrossRefGoogle Scholar
  6. 6.
    Jain A, Rajpal N (2016) A robust image encryption algorithm resistant to attacks using DNA and chaotic logistic maps. Multimed Tools Appl 75(10):5455–5472CrossRefGoogle Scholar
  7. 7.
    Li C (2016) Cracking a hierarchical chaotic image encryption algorithm based on permutation[J]. Signal Process 118:203–210CrossRefGoogle Scholar
  8. 8.
    Li Y, Wang C, Chen H (2017) A hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutation[J]. Opt Lasers Eng 90:238–246CrossRefGoogle Scholar
  9. 9.
    Li Y, Wang C, Chen H (2017) A hyper-chaos-based image encryption algorithm using pixel-level permutation and bit-level permutation. Opt Lasers Eng 90:238–246CrossRefGoogle Scholar
  10. 10.
    Murillo-Escobar MA, Cruz-Hernández C, Abundiz-Pérez F et al (2015) A RGB image encryption algorithm based on total plain image characteristics and chaos[J]. Signal Process 109:119–131CrossRefGoogle Scholar
  11. 11.
    Norouzi B et al (2014) A simple, sensitive and secure image encryption algorithm based on hyper-chaotic system with only one round diffusion process. Multimed Tools Appl 71(3):1469–1497CrossRefGoogle Scholar
  12. 12.
    Qiu M, Gai K, Thuraisingham B et al (2018) Proactive user-centric secure data scheme using attribute-based semantic access controls for mobile clouds in financial industry[J]. Futur Gener Comput Syst 80:421–429CrossRefGoogle Scholar
  13. 13.
    Seyedzadeh SM, Norouzi B, Mosavi MR et al (2015) A novel color image encryption algorithm based on spatial permutation and quantum chaotic map[J]. Nonlinear Dyn 81(1–2):511–529MathSciNetCrossRefGoogle Scholar
  14. 14.
    Tong XJ, Zhang M, Wang Z et al (2015) An image encryption scheme based on a new hyperchaotic finance system[J]. Opt-Int J Light Electron Opt 126(20):2445–2452CrossRefGoogle Scholar
  15. 15.
    Wang X, Liu L, Zhang Y (2015) A novel chaotic block image encryption algorithm based on dynamic random growth technique[J]. Opt Lasers Eng 66:10–18CrossRefGoogle Scholar
  16. 16.
    Wang XY, Gu SX, Zhang YQ (2015) Novel image encryption algorithm based on cycle shift and chaotic system[J]. Opt Lasers Eng 68:126–134CrossRefGoogle Scholar
  17. 17.
    Wu XJ, Wang DW, Kurths J (2016) A novel lossless color image encryption scheme using 2D DWT and 6D hyper-chaos [J]. Inf Sci 38(7):502–512Google Scholar
  18. 18.
    Xu L, Li Z, Li J et al (2016) A novel bit-level image encryption algorithm based on chaotic maps[J]. Opt Lasers Eng 78:17–25CrossRefGoogle Scholar
  19. 19.
    Zhang YQ, Wang XY (2014) A symmetric image encryption algorithm based on mixed linear–nonlinear coupled map lattice[J]. Inf Sci 273:329–351CrossRefGoogle Scholar
  20. 20.
    Zhang XP, Zhao ZM (2014) Chaos-based image encryption with total shuffling and bidirectional diffusion[J ]. Nonlinear Dyn 75(1–2):319–330CrossRefGoogle Scholar
  21. 21.
    Zhang L et al (2015) Double image multi-encryption algorithm based on fractional chaotic time series. J Comput Theor Nanosci 12(11):4980–4986CrossRefGoogle Scholar
  22. 22.
    Zhou N, Zhang A, Zheng F et al (2014) Novel image compression–encryption hybrid algorithm based on key-controlled measurement matrix in compressive sensing[J]. Opt Laser Technol 62:152–160CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  1. 1.School of EconomicsWuhan University of TechnologyWuhanChina

Personalised recommendations