期刊文献+
共找到11篇文章
< 1 >
每页显示 20 50 100
A chaotic hierarchical encryption/watermark embedding scheme for multi-medical images based on row-column confusion and closed-loop bi-directional diffusion
1
作者 张哲祎 牟俊 +1 位作者 Santo Banerjee 曹颖鸿 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第2期228-237,共10页
Security during remote transmission has been an important concern for researchers in recent years.In this paper,a hierarchical encryption multi-image encryption scheme for people with different security levels is desi... Security during remote transmission has been an important concern for researchers in recent years.In this paper,a hierarchical encryption multi-image encryption scheme for people with different security levels is designed,and a multiimage encryption(MIE)algorithm with row and column confusion and closed-loop bi-directional diffusion is adopted in the paper.While ensuring secure communication of medical image information,people with different security levels have different levels of decryption keys,and differentiated visual effects can be obtained by using the strong sensitivity of chaotic keys.The highest security level can obtain decrypted images without watermarks,and at the same time,patient information and copyright attribution can be verified by obtaining watermark images.The experimental results show that the scheme is sufficiently secure as an MIE scheme with visualized differences and the encryption and decryption efficiency is significantly improved compared to other works. 展开更多
关键词 chaotic hierarchical encryption multi-medical image encryption differentiated visual effects row-column confusion closed-loop bi-directional diffusion transform domain watermark embedding
下载PDF
Air target recognition method against ISRJ for radio frequency proximity sensors using chaotic stream encryption
2
作者 Jian-feng Li Jian Dai +2 位作者 Xin-hong Hao Xiao-peng Yan Xin-wei Wang 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2023年第10期267-279,共13页
The interrupted-sampling repeater jamming(ISRJ)can cause false targets to the radio-frequency proximity sensors(RFPSs),resulting in a serious decline in the target detection capability of the RFPS.This article propose... The interrupted-sampling repeater jamming(ISRJ)can cause false targets to the radio-frequency proximity sensors(RFPSs),resulting in a serious decline in the target detection capability of the RFPS.This article proposes a recognition method for RFPSs to identify the false targets caused by ISRJ.The proposed method is realized by assigning a unique identity(ID)to each RFPS,and each ID is a periodically and chaotically encrypted in every pulse period.The processing technique of the received signal is divided into ranging and ID decryption.In the ranging part,a high-resolution range profile(HRRP)can be obtained by performing pulse compression with the binary chaotic sequences.To suppress the noise,the singular value decomposition(SVD)is applied in the preprocessing.Regarding ID decryption,targets and ISRJ can be recognized through the encryption and decryption processes,which are controlled by random keys.An adaptability analysis conducted in terms of the peak-to-side lobe ratio(PSLR)and bit error rate(BER)indicates that the proposed method performs well within a 70-k Hz Doppler shift.A simulation and experimental results show that the proposed method achieves extremely stable target and ISRJ recognition accuracies at different signal-to-noise ratios(SNRs)and jamming-to-signal ratios(JSRs). 展开更多
关键词 Interrupted-sampling repeater jamming(ISRJ) Radio frequency proximity sensors(RFPS) chaotic stream encryption Air target recognition Identity(ID)decryption
下载PDF
Image encryption using high-dimension chaotic system 被引量:14
3
作者 孙福艳 刘树堂 吕宗旺 《Chinese Physics B》 SCIE EI CAS CSCD 2007年第12期3616-3623,共8页
In recent years, the chaos based cryptographic algorithms have suggested some new and efficient ways to develop secure image encryption techniques. This paper proposes a new approach for image encryption based on a hi... In recent years, the chaos based cryptographic algorithms have suggested some new and efficient ways to develop secure image encryption techniques. This paper proposes a new approach for image encryption based on a high-dimensional chaotic map. The new scheme employs the Cat map to shuffle the positions, then to confuse the relationship between the cipher-image and the plain-image using the high-dimensional Lorenz chaotic map preprocessed. The results of experimental, statistical analysis and key space analysis show that the proposed image encryption scheme provides an efficient and secure way for real-time image encryption and transmission. 展开更多
关键词 Arnold cat map image encryption chaotic encryption
下载PDF
Security enhancement for OFDM-UWOC system using three-layer chaotic encryption and chaotic DFT precoding 被引量:1
4
作者 邓欢 杜子豪 +3 位作者 熊建民 杨兴启 华岩 徐敬 《Chinese Optics Letters》 SCIE EI CAS CSCD 2022年第11期7-13,共7页
Security is one of the key issues in communications,but it has not attracted much attention in the field of underwater wireless optical communication(UWOC).This Letter proposes a UWOC encryption scheme with orthogonal... Security is one of the key issues in communications,but it has not attracted much attention in the field of underwater wireless optical communication(UWOC).This Letter proposes a UWOC encryption scheme with orthogonal frequency division multiplexing(OFDM)modulation,based on the three-layer chaotic encryption and chaotic discrete Fourier transform(DFT)precoding.The three-layer chaotic encryption processes are bit stream diffusion,in-phase/quadrature encryption,and time-frequency scrambling.With multi-fold data encryption,the scheme can create a keyspace of 9.7×10^(179),effectively resisting brute force attacks and chosen-plaintext attacks.A 3 Gbit/s encrypted OFDM signal is successfully transmitted over a 7 m water channel. 展开更多
关键词 SECURITY underwater wireless optical communication chaotic encryption chosen-plaintext attacks
原文传递
HybridWatermarking and Encryption Techniques for Securing Medical Images
5
作者 Amel Ali Alhussan Hanaa A.Abdallah +1 位作者 Sara Alsodairi Abdelhamied A.Ateya 《Computer Systems Science & Engineering》 SCIE EI 2023年第7期403-416,共14页
Securing medical data while transmission on the network is required because it is sensitive and life-dependent data.Many methods are used for protection,such as Steganography,Digital Signature,Cryptography,and Waterma... Securing medical data while transmission on the network is required because it is sensitive and life-dependent data.Many methods are used for protection,such as Steganography,Digital Signature,Cryptography,and Watermarking.This paper introduces a novel robust algorithm that combines discrete wavelet transform(DWT),discrete cosine transform(DCT),and singular value decomposition(SVD)digital image-watermarking algorithms.The host image is decomposed using a two-dimensional DWT(2D-DWT)to approximate low-frequency sub-bands in the embedding process.Then the sub-band low-high(LH)is decomposed using 2D-DWT to four new sub-bands.The resulting sub-band low-high(LH1)is decomposed using 2D-DWT to four new sub-bands.Two frequency bands,high-high(HH_(2))and high-low(HL_(2)),are transformed by DCT,and then the SVD is applied to the DCT coefficients.The strongest modified singular values(SVs)vary very little for most attacks,which is an important property of SVD watermarking.The two watermark images are encrypted using two layers of encryption,circular and chaotic encryption techniques,to increase security.The first encrypted watermark is embedded in the S component of the DCT components of the HL_(2)coefficients.The second encrypted watermark is embedded in the S component of the DCT components of the HH2 coefficients.The suggested technique has been tested against various attacks and proven to provide excellent stability and imperceptibility results. 展开更多
关键词 WATERMARKING discrete wavelet transform discrete cosine transform singular value decomposition circular encryption chaotic encryption
下载PDF
Fractal sorting vector-based least significant bit chaotic permutation for image encryption 被引量:1
6
作者 咸永锦 王兴元 +2 位作者 张盈谦 王晓雨 杜晓慧 《Chinese Physics B》 SCIE EI CAS CSCD 2021年第6期226-235,共10页
The image's least significant bit(LSB) covers lots of the details that have been commonly used in image encryption analysis. The newly proposed fractal sorting vector(FSV) and FSV-based LSB chaotic permutation(FSV... The image's least significant bit(LSB) covers lots of the details that have been commonly used in image encryption analysis. The newly proposed fractal sorting vector(FSV) and FSV-based LSB chaotic permutation(FSV-LSBCP) is a novel chaotic image encryption cryptosystem introduced in this article. The FSV-LSBCP effectively strengthens the security of the cryptographic scheme concerning the properties of the FSV. Key analysis, statistical analysis, resistance differential attack analysis, and resistance to cropping attacks and noise attacks are the focus of the suggested image encryption cryptosystem. The security experiment shows that the cryptosystem is adequate to achieve the desired degree of security. 展开更多
关键词 chaotic image encryption fractal sorting vector bit-level permutation FSV-based LSB chaotic permutation
下载PDF
An image encryption scheme based on three-dimensional Brownian motion and chaotic system 被引量:6
7
作者 柴秀丽 甘志华 +2 位作者 袁科 路杨 陈怡然 《Chinese Physics B》 SCIE EI CAS CSCD 2017年第2期99-113,共15页
At present, many chaos-based image encryption algorithms have proved to be unsafe, few encryption schemes permute the plain images as three-dimensional(3D) bit matrices, and thus bits cannot move to any position, th... At present, many chaos-based image encryption algorithms have proved to be unsafe, few encryption schemes permute the plain images as three-dimensional(3D) bit matrices, and thus bits cannot move to any position, the movement range of bits are limited, and based on them, in this paper we present a novel image encryption algorithm based on 3D Brownian motion and chaotic systems. The architecture of confusion and diffusion is adopted. Firstly, the plain image is converted into a 3D bit matrix and split into sub blocks. Secondly, block confusion based on 3D Brownian motion(BCB3DBM)is proposed to permute the position of the bits within the sub blocks, and the direction of particle movement is generated by logistic-tent system(LTS). Furthermore, block confusion based on position sequence group(BCBPSG) is introduced, a four-order memristive chaotic system is utilized to give random chaotic sequences, and the chaotic sequences are sorted and a position sequence group is chosen based on the plain image, then the sub blocks are confused. The proposed confusion strategy can change the positions of the bits and modify their weights, and effectively improve the statistical performance of the algorithm. Finally, a pixel level confusion is employed to enhance the encryption effect. The initial values and parameters of chaotic systems are produced by the SHA 256 hash function of the plain image. Simulation results and security analyses illustrate that our algorithm has excellent encryption performance in terms of security and speed. 展开更多
关键词 image encryption logistic-tent system(LTS) memristive chaotic system three-dimensional(3D) Brownian motion
下载PDF
Lossless embedding: A visually meaningful image encryption algorithm based on hyperchaos and compressive sensing 被引量:1
8
作者 王兴元 王哓丽 +2 位作者 滕琳 蒋东华 咸永锦 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第2期136-149,共14页
A novel visually meaningful image encryption algorithm is proposed based on a hyperchaotic system and compressive sensing(CS), which aims to improve the visual security of steganographic image and decrypted quality. F... A novel visually meaningful image encryption algorithm is proposed based on a hyperchaotic system and compressive sensing(CS), which aims to improve the visual security of steganographic image and decrypted quality. First, a dynamic spiral block scrambling is designed to encrypt the sparse matrix generated by performing discrete wavelet transform(DWT)on the plain image. Then, the encrypted image is compressed and quantified to obtain the noise-like cipher image. Then the cipher image is embedded into the alpha channel of the carrier image in portable network graphics(PNG) format to generate the visually meaningful steganographic image. In our scheme, the hyperchaotic Lorenz system controlled by the hash value of plain image is utilized to construct the scrambling matrix, the measurement matrix and the embedding matrix to achieve higher security. In addition, compared with other existing encryption algorithms, the proposed PNG-based embedding method can blindly extract the cipher image, thus effectively reducing the transmission cost and storage space. Finally, the experimental results indicate that the proposed encryption algorithm has very high visual security. 展开更多
关键词 chaotic image encryption compressive sensing meaningful cipher image portable network graphics image encryption algorithm
下载PDF
A Robust Non-Blind Watermarking for Biomedical Images Based on Chaos
9
作者 Noura Alexendre Ntsama Eloundou Pascal +1 位作者 Simo Thierry Welba Colince 《Journal of Computer and Communications》 2021年第2期1-21,共21页
The advent of the Internet in these last years encouraged a considerable traffic of digital images. In the sanitary field, precisely in telemedicine branch, medical images play a very important role for therapeutic di... The advent of the Internet in these last years encouraged a considerable traffic of digital images. In the sanitary field, precisely in telemedicine branch, medical images play a very important role for therapeutic diagnoses. Thus, it is necessary to protect medical images data before transmission over the network to preserve their security and prevent unauthorized access. In this paper, a secure algorithm for biomedical images encryption scheme based on the combination of watermarking technique and chaotic function is proposed. In the proposed method, to achieve high security level performances, a non-blind hybrid watermarking technique with audio signal, Discrete Wavelet Transform is used;smoothness is also used as selected criteria;the iterations obtained by the chaotic sequences are essential and allow a good realization of the encryption process. One of the main advantages of chaos-based encryption schemes is the generation of a large number of key spaces to resist brute force attacks from the encryption algorithm. The experimental results presented in this paper attest to the invisibility and robustness of the proposed algorithm combining watermarking and chaos-based encryption. 展开更多
关键词 Biomedical Image WATERMARKING Wavelet Transform chaotic encryption DCT
下载PDF
A chaos-based image encryption algorithm using alternate structure 被引量:6
10
作者 ZHANG Yiwei WANG YuMin SHEN XuBang 《Science in China(Series F)》 2007年第3期334-341,共8页
Combined with two chaotic maps, a novel alternate structure is applied to image cryptosystem. In proposed algorithm, a general cat-map is used for permutation and diffusion, as well as the OCML (one-way coupled map l... Combined with two chaotic maps, a novel alternate structure is applied to image cryptosystem. In proposed algorithm, a general cat-map is used for permutation and diffusion, as well as the OCML (one-way coupled map lattice), which is applied for substitution. These two methods are operated alternately in every round of encryption process, where two subkeys employed in different chaotic maps are generated through the masterkey spreading. Decryption has the same structure with the encryption algorithm, but the masterkey in each round should be reversely ordered in decryption. The cryptanalysis shows that the proposed algorithm bears good immunities to many forms of attacks. Moreover, the algorithm features high execution speed and compact program, which is suitable for various software and hardware applications. 展开更多
关键词 chaotic encryption general cat-map OCML image encryption
原文传递
Chaos-Based Encryption Algorithm for Compressed Video
11
作者 袁春 钟玉琢 贺玉文 《Tsinghua Science and Technology》 SCIE EI CAS 2003年第5期605-611,共7页
Encryption for compressed video streams has attracted increasing attention with the exponential growth of digital multimedia delivery and consumption. However, most algorithms proposed in the literature do not effect... Encryption for compressed video streams has attracted increasing attention with the exponential growth of digital multimedia delivery and consumption. However, most algorithms proposed in the literature do not effectively address the peculiarities of security and performance requirements. This paper presents a chaos-based encryption algorithm called the chaotic selective encryption of compressed video (CSECV) which exploits the characteristics of the compressed video. The encryption has three separate layers that can be selected according to the security needs of the application and the processing capability of the client computer. The chaotic pseudo-random sequence generator used to generate the key-sequence to randomize the important fields in the compressed video stream has its parameters encrypted by an asymmetric cipher and placed into the stream. The resulting stream is still a valid video stream. CSECV has significant advantages over existing algorithms for security, decryption speed, implementation flexibility, and error preservation. 展开更多
关键词 CHAOS chaotic encryption selective encryption error-preserving encryption SECURITY compressed video
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部