期刊文献+
共找到118篇文章
< 1 2 6 >
每页显示 20 50 100
A lightweight symmetric image encryption cryptosystem in wavelet domain based on an improved sine map
1
作者 陈柏池 黄林青 +2 位作者 蔡述庭 熊晓明 张慧 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第3期266-276,共11页
In the era of big data,the number of images transmitted over the public channel increases exponentially.As a result,it is crucial to devise the efficient and highly secure encryption method to safeguard the sensitive ... In the era of big data,the number of images transmitted over the public channel increases exponentially.As a result,it is crucial to devise the efficient and highly secure encryption method to safeguard the sensitive image.In this paper,an improved sine map(ISM)possessing a larger chaotic region,more complex chaotic behavior and greater unpredictability is proposed and extensively tested.Drawing upon the strengths of ISM,we introduce a lightweight symmetric image encryption cryptosystem in wavelet domain(WDLIC).The WDLIC employs selective encryption to strike a satisfactory balance between security and speed.Initially,only the low-frequency-low-frequency component is chosen to encrypt utilizing classic permutation and diffusion.Then leveraging the statistical properties in wavelet domain,Gaussianization operation which opens the minds of encrypting image information in wavelet domain is first proposed and employed to all sub-bands.Simulations and theoretical analysis demonstrate the high speed and the remarkable effectiveness of WDLIC. 展开更多
关键词 image encryption discrete wavelet transform 1D-chaotic system selective encryption Gaussianization operation
下载PDF
Novel self-embedding holographic watermarking image encryption protection scheme
2
作者 王励年 周楠润 +2 位作者 孙博 曹颖鸿 牟俊 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第5期281-290,共10页
For digital image transmission security and information copyright,a new holographic image self-embedding watermarking encryption scheme is proposed.Firstly,the plaintext is converted to the RGB three-color channel,the... For digital image transmission security and information copyright,a new holographic image self-embedding watermarking encryption scheme is proposed.Firstly,the plaintext is converted to the RGB three-color channel,the corresponding phase hologram is obtained by holographic technology and the watermark is self-embedded in the frequency domain.Secondly,by applying the Hilbert transform principle and genetic center law,a complete set of image encryption algorithms is constructed to realize the encryption of image information.Finally,simulation results and security analysis indicate that the scheme can effectively encrypt and decrypt image information and realize the copyright protection of information.The introduced scheme can provide some support for relevant theoretical research,and has practical significance. 展开更多
关键词 color image encryption Hilbert transform self-embedding watermark holographic technology
下载PDF
Enhancing visual security: An image encryption scheme based on parallel compressive sensing and edge detection embedding
3
作者 王一铭 黄树锋 +2 位作者 陈煌 杨健 蔡述庭 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第1期287-302,共16页
A novel image encryption scheme based on parallel compressive sensing and edge detection embedding technology is proposed to improve visual security. Firstly, the plain image is sparsely represented using the discrete... A novel image encryption scheme based on parallel compressive sensing and edge detection embedding technology is proposed to improve visual security. Firstly, the plain image is sparsely represented using the discrete wavelet transform.Then, the coefficient matrix is scrambled and compressed to obtain a size-reduced image using the Fisher–Yates shuffle and parallel compressive sensing. Subsequently, to increase the security of the proposed algorithm, the compressed image is re-encrypted through permutation and diffusion to obtain a noise-like secret image. Finally, an adaptive embedding method based on edge detection for different carrier images is proposed to generate a visually meaningful cipher image. To improve the plaintext sensitivity of the algorithm, the counter mode is combined with the hash function to generate keys for chaotic systems. Additionally, an effective permutation method is designed to scramble the pixels of the compressed image in the re-encryption stage. The simulation results and analyses demonstrate that the proposed algorithm performs well in terms of visual security and decryption quality. 展开更多
关键词 visual security image encryption parallel compressive sensing edge detection embedding
下载PDF
Coexistence behavior of asymmetric attractors in hyperbolic-type memristive Hopfield neural network and its application in image encryption
4
作者 李晓霞 何倩倩 +2 位作者 余天意 才壮 徐桂芝 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第3期302-315,共14页
The neuron model has been widely employed in neural-morphic computing systems and chaotic circuits.This study aims to develop a novel circuit simulation of a three-neuron Hopfield neural network(HNN)with coupled hyper... The neuron model has been widely employed in neural-morphic computing systems and chaotic circuits.This study aims to develop a novel circuit simulation of a three-neuron Hopfield neural network(HNN)with coupled hyperbolic memristors through the modification of a single coupling connection weight.The bistable mode of the hyperbolic memristive HNN(mHNN),characterized by the coexistence of asymmetric chaos and periodic attractors,is effectively demonstrated through the utilization of conventional nonlinear analysis techniques.These techniques include bifurcation diagrams,two-parameter maximum Lyapunov exponent plots,local attractor basins,and phase trajectory diagrams.Moreover,an encryption technique for color images is devised by leveraging the mHNN model and asymmetric structural attractors.This method demonstrates significant benefits in correlation,information entropy,and resistance to differential attacks,providing strong evidence for its effectiveness in encryption.Additionally,an improved modular circuit design method is employed to create the analog equivalent circuit of the memristive HNN.The correctness of the circuit design is confirmed through Multisim simulations,which align with numerical simulations conducted in Matlab. 展开更多
关键词 hyperbolic-type memristor Hopfield neural network(HNN) asymmetric attractors image encryption
下载PDF
A color image encryption scheme based on a 2D coupled chaotic system and diagonal scrambling algorithm
5
作者 苏静明 方士辉 +1 位作者 洪炎 温言 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第7期233-243,共11页
A novel color image encryption scheme is developed to enhance the security of encryption without increasing the complexity. Firstly, the plain color image is decomposed into three grayscale plain images, which are con... A novel color image encryption scheme is developed to enhance the security of encryption without increasing the complexity. Firstly, the plain color image is decomposed into three grayscale plain images, which are converted into the frequency domain coefficient matrices(FDCM) with discrete cosine transform(DCT) operation. After that, a twodimensional(2D) coupled chaotic system is developed and used to generate one group of embedded matrices and another group of encryption matrices, respectively. The embedded matrices are integrated with the FDCM to fulfill the frequency domain encryption, and then the inverse DCT processing is implemented to recover the spatial domain signal. Eventually,under the function of the encryption matrices and the proposed diagonal scrambling algorithm, the final color ciphertext is obtained. The experimental results show that the proposed method can not only ensure efficient encryption but also satisfy various sizes of image encryption. Besides, it has better performance than other similar techniques in statistical feature analysis, such as key space, key sensitivity, anti-differential attack, information entropy, noise attack, etc. 展开更多
关键词 color image encryption discrete cosine transform two-dimensional(2D)coupled chaotic system diagonal scrambling
下载PDF
Chaotic CS Encryption:An Efficient Image Encryption Algorithm Based on Chebyshev Chaotic System and Compressive Sensing
6
作者 Mingliang Sun Jie Yuan +1 位作者 Xiaoyong Li Dongxiao Liu 《Computers, Materials & Continua》 SCIE EI 2024年第5期2625-2646,共22页
Images are the most important carrier of human information. Moreover, how to safely transmit digital imagesthrough public channels has become an urgent problem. In this paper, we propose a novel image encryptionalgori... Images are the most important carrier of human information. Moreover, how to safely transmit digital imagesthrough public channels has become an urgent problem. In this paper, we propose a novel image encryptionalgorithm, called chaotic compressive sensing (CS) encryption (CCSE), which can not only improve the efficiencyof image transmission but also introduce the high security of the chaotic system. Specifically, the proposed CCSEcan fully leverage the advantages of the Chebyshev chaotic system and CS, enabling it to withstand various attacks,such as differential attacks, and exhibit robustness. First, we use a sparse trans-form to sparse the plaintext imageand then use theArnold transformto perturb the image pixels. After that,we elaborate aChebyshev Toeplitz chaoticsensing matrix for CCSE. By using this Toeplitz matrix, the perturbed image is compressed and sampled to reducethe transmission bandwidth and the amount of data. Finally, a bilateral diffusion operator and a chaotic encryptionoperator are used to perturb and expand the image pixels to change the pixel position and value of the compressedimage, and ultimately obtain an encrypted image. Experimental results show that our method can be resistant tovarious attacks, such as the statistical attack and noise attack, and can outperform its current competitors. 展开更多
关键词 image encryption chaotic system compressive sensing arnold transform
下载PDF
Lossless embedding: A visually meaningful image encryption algorithm based on hyperchaos and compressive sensing 被引量:1
7
作者 王兴元 王哓丽 +2 位作者 滕琳 蒋东华 咸永锦 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第2期136-149,共14页
A novel visually meaningful image encryption algorithm is proposed based on a hyperchaotic system and compressive sensing(CS), which aims to improve the visual security of steganographic image and decrypted quality. F... A novel visually meaningful image encryption algorithm is proposed based on a hyperchaotic system and compressive sensing(CS), which aims to improve the visual security of steganographic image and decrypted quality. First, a dynamic spiral block scrambling is designed to encrypt the sparse matrix generated by performing discrete wavelet transform(DWT)on the plain image. Then, the encrypted image is compressed and quantified to obtain the noise-like cipher image. Then the cipher image is embedded into the alpha channel of the carrier image in portable network graphics(PNG) format to generate the visually meaningful steganographic image. In our scheme, the hyperchaotic Lorenz system controlled by the hash value of plain image is utilized to construct the scrambling matrix, the measurement matrix and the embedding matrix to achieve higher security. In addition, compared with other existing encryption algorithms, the proposed PNG-based embedding method can blindly extract the cipher image, thus effectively reducing the transmission cost and storage space. Finally, the experimental results indicate that the proposed encryption algorithm has very high visual security. 展开更多
关键词 chaotic image encryption compressive sensing meaningful cipher image portable network graphics image encryption algorithm
下载PDF
A Color Image Encryption Scheme Based on Singular Values and Chaos
8
作者 Adnan Malik Muhammad Ali +2 位作者 Faisal S.Alsubaei Nisar Ahmed Harish Kumar 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第10期965-999,共35页
The security of digital images transmitted via the Internet or other public media is of the utmost importance.Image encryption is a method of keeping an image secure while it travels across a non-secure communication ... The security of digital images transmitted via the Internet or other public media is of the utmost importance.Image encryption is a method of keeping an image secure while it travels across a non-secure communication medium where it could be intercepted by unauthorized entities.This study provides an approach to color image encryption that could find practical use in various contexts.The proposed method,which combines four chaotic systems,employs singular value decomposition and a chaotic sequence,making it both secure and compression-friendly.The unified average change intensity,the number of pixels’change rate,information entropy analysis,correlation coefficient analysis,compression friendliness,and security against brute force,statistical analysis and differential attacks are all used to evaluate the algorithm’s performance.Following a thorough investigation of the experimental data,it is concluded that the proposed image encryption approach is secure against a wide range of attacks and provides superior compression friendliness when compared to chaos-based alternatives. 展开更多
关键词 encryption image encryption chaos theory color image encryption singular value decomposition compression friendliness
下载PDF
A Novel 2D Hyperchaotic with a Complex Dynamic Behavior for Color Image Encryption 被引量:1
9
作者 Yongsheng Hu Liyong Nan 《Computers, Materials & Continua》 SCIE EI 2023年第3期6555-6571,共17页
The generation method of the key stream and the structure of the algorithm determine the security of the cryptosystem.The classical chaotic map has simple dynamic behavior and few control parameters,so it is not suita... The generation method of the key stream and the structure of the algorithm determine the security of the cryptosystem.The classical chaotic map has simple dynamic behavior and few control parameters,so it is not suitable for modern cryptography.In this paper,we design a new 2D hyperchaotic system called 2D simple structure and complex dynamic behavior map(2D-SSCDB).The 2D-SSCDB has a simple structure but has complex dynamic behavior.The Lyapunov exponent verifies that the 2D-SSCDB has hyperchaotic behavior,and the parameter space in the hyperchaotic state is extensive and continuous.Trajectory analysis and some randomness tests verify that the 2D-SSCDB can generate random sequences with good performance.Next,to verify the excellent performance of the 2D-SSCDB,we use the 2D-SSCDB to generate a keystream for color image encryption.In the encryption algorithm,the encryption algorithm scrambles and diffuses simultaneously,increasing the cryptographic system’s security.The horizontal correlation,vertical correlation,and diagonal correlation of ciphertext are−0.0004,−0.0004 and 0.0007,respectively.The average information entropy of the ciphertext is 7.9993.In addition,the designed encryption algorithm reduces the correlation between the three channels of the color image.Security analysis shows that the color image encryption algorithm designed using 2DSSCDB has good security,can resist standard attack methods,and has high efficiency. 展开更多
关键词 Chaos theory 2D-SSCDB CRYPTOGRAPHY image encryption
下载PDF
Rucklidge-based memristive chaotic system:Dynamic analysis and image encryption
10
作者 蹇璨岭 田泽安 +3 位作者 梁波 胡晨阳 王桥 陈靖翕 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第10期298-309,共12页
A new four-dimensional(4D)memristive chaotic system is obtained by introducing a memristor into the Rucklidge chaotic system,and a detailed dynamic analysis of the system is performed.The sensitivity of the system to ... A new four-dimensional(4D)memristive chaotic system is obtained by introducing a memristor into the Rucklidge chaotic system,and a detailed dynamic analysis of the system is performed.The sensitivity of the system to parameters allows it obtains 16 different attractors by changing only one parameter.The various transient behaviors and excellent spectral entropy and C0 complexity values of the system can also reflect the high complexity of the system.A circuit is designed and verified the feasibility of the system from the physical level.Finally,the system is applied to image encryption,and the security of the encryption system is analyzed from multiple aspects,providing a reference for the application of such memristive chaotic systems. 展开更多
关键词 chaotic system MEMRISTOR intermittent chaos multi-transient behavior image encryption
下载PDF
Optical image encryption algorithm based on a new four-dimensional memristive hyperchaotic system and compressed sensing
11
作者 都洋 隆国强 +2 位作者 蒋东华 柴秀丽 韩俊鹤 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第11期426-445,共20页
Some existing image encryption schemes use simple low-dimensional chaotic systems, which makes the algorithms insecure and vulnerable to brute force attacks and cracking. Some algorithms have issues such as weak corre... Some existing image encryption schemes use simple low-dimensional chaotic systems, which makes the algorithms insecure and vulnerable to brute force attacks and cracking. Some algorithms have issues such as weak correlation with plaintext images, poor image reconstruction quality, and low efficiency in transmission and storage. To solve these issues,this paper proposes an optical image encryption algorithm based on a new four-dimensional memristive hyperchaotic system(4D MHS) and compressed sensing(CS). Firstly, this paper proposes a new 4D MHS, which has larger key space, richer dynamic behavior, and more complex hyperchaotic characteristics. The introduction of CS can reduce the image size and the transmission burden of hardware devices. The introduction of double random phase encoding(DRPE) enables this algorithm has the ability of parallel data processing and multi-dimensional coding space, and the hyperchaotic characteristics of 4D MHS make up for the nonlinear deficiency of DRPE. Secondly, a construction method of the deterministic chaotic measurement matrix(DCMM) is proposed. Using DCMM can not only save a lot of transmission bandwidth and storage space, but also ensure good quality of reconstructed images. Thirdly, the confusion method and diffusion method proposed are related to plaintext images, which require both four hyperchaotic sequences of 4D MHS and row and column keys based on plaintext images. The generation process of hyperchaotic sequences is closely related to the hash value of plaintext images. Therefore, this algorithm has high sensitivity to plaintext images. The experimental testing and comparative analysis results show that proposed algorithm has good security and effectiveness. 展开更多
关键词 MEMRISTOR hyperchaotic system compressed sensing fractional Fourier transform optical image encryption
下载PDF
A color image encryption algorithm based on hyperchaotic map and DNA mutation
12
作者 高昕瑜 孙博 +2 位作者 曹颖鸿 Santo Banerjee 牟俊 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第3期131-142,共12页
We devise a color image encryption scheme via combining hyperchaotic map,cross-plane operation and gene theory.First,the hyperchaotic map used in the encryption scheme is analyzed and studied.On the basis of the dynam... We devise a color image encryption scheme via combining hyperchaotic map,cross-plane operation and gene theory.First,the hyperchaotic map used in the encryption scheme is analyzed and studied.On the basis of the dynamics of hyperchaotic map,a color image encryption scheme is designed.At the end of the encryption process,a DNA mutation operation is used to increase the encoding images’randomness and to improve the encryption algorithm’s security.Finally,simulation experiments,performance analysis,and attack tests are performed to prove the effectiveness and security of the designed algorithm.This work provides the possibility of applying chaos theory and gene theory in image encryption. 展开更多
关键词 color image encryption hyperchaotic map cross-plane permutation DNA mutation
下载PDF
Visually meaningful image encryption algorithm based on digital signature
13
作者 Xiaoling Huang Youxia Dong +2 位作者 Guodong Ye Wun-She Yap Bok-Min Goi 《Digital Communications and Networks》 SCIE CSCD 2023年第1期159-165,共7页
Traditional image encryption algorithms transform a plain image into a noise-like image.To lower the chances for the encrypted image being detected by the attacker during the image transmission,a visually meaningful i... Traditional image encryption algorithms transform a plain image into a noise-like image.To lower the chances for the encrypted image being detected by the attacker during the image transmission,a visually meaningful image encryption scheme is suggested to hide the encrypted image using another carrier image.This paper proposes a visually meaningful encrypted image algorithm that hides a secret image and a digital signature which provides authenticity and confidentiality.The recovered digital signature is used for the purpose of identity authentication while the secret image is encrypted to protect its confidentiality.Least Significant Bit(LSB)method to embed signature on the encrypted image and Lifting Wavelet Transform(LWT)to generate a visually meaningful encrypted image are designed.The proposed algorithm has a keyspace of 139.5-bit,a Normalized Correlation(NC)value of 0.9998 which is closer to 1 and a Peak Signal to Noise Ratio(PSNR)with a value greater than 50 dB.Different analyses are also performed on the proposed algorithm using different images.The experimental results show that the proposed scheme is with high key sensitivity and strong robustness against pepper and salt attack and cropping attack.Moreover,the histogram analysis shows that the original carrier image and the final visual image are very similar. 展开更多
关键词 Visually meaningful image encryption Lifting wavelet transform Lorenz system SIGNATURE SECURITY
下载PDF
Asymmetric image encryption algorithm based on a new three-dimensional improved logistic chaotic map
14
作者 叶国栋 吴惠山 +1 位作者 黄小玲 Syh-Yuan Tan 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第3期153-163,共11页
Based on some analyses of existing chaotic image encryption frameworks and a new designed three-dimensional improved logistic chaotic map(3D-ILM),an asymmetric image encryption algorithm using public-key Rivest–Shami... Based on some analyses of existing chaotic image encryption frameworks and a new designed three-dimensional improved logistic chaotic map(3D-ILM),an asymmetric image encryption algorithm using public-key Rivest–Shamir–Adleman(RSA)is presented in this paper.In the first stage,a new 3D-ILM is proposed to enhance the chaotic behavior considering analysis of time sequence,Lyapunov exponent,and Shannon entropy.In the second stage,combined with the public key RSA algorithm,a new key acquisition mathematical model(MKA)is constructed to obtain the initial keys for the 3D-ILM.Consequently,the key stream can be produced depending on the plain image for a higher security.Moreover,a novel process model(NPM)for the input of the 3D-ILM is built,which is built to improve the distribution uniformity of the chaotic sequence.In the third stage,to encrypt the plain image,a pre-process by exclusive OR(XOR)operation with a random matrix is applied.Then,the pre-processed image is performed by a permutation for rows,a downward modulo function for adjacent pixels,a permutation for columns,a forward direction XOR addition-modulo diffusion,and a backward direction XOR addition-modulo diffusion to achieve the final cipher image.Moreover,experiments show that the the proposed algorithm has a better performance.Especially,the number of pixels change rate(NPCR)is close to ideal case 99.6094%,with the unified average changing intensity(UACI)close to 33.4634%,and the information entropy(IE)close to 8. 展开更多
关键词 three-dimensional improved logistic chaotic map(3D-ILM) Rivest–Shamir–Adleman(RSA)algorithm image encryption CONFUSION ENTROPY
下载PDF
An Efficient Color-Image Encryption Method Using DNA Sequence and Chaos Cipher
15
作者 Ghofran Kh.Shraida Hameed A.Younis +3 位作者 Taief Alaa Al-Amiedy Mohammed Anbar Hussain A.Younis Iznan H.Hasbullah 《Computers, Materials & Continua》 SCIE EI 2023年第5期2641-2654,共14页
Nowadays,high-resolution images pose several challenges in the context of image encryption.The encryption of huge images’file sizes requires high computational resources.Traditional encryption techniques like,Data En... Nowadays,high-resolution images pose several challenges in the context of image encryption.The encryption of huge images’file sizes requires high computational resources.Traditional encryption techniques like,Data Encryption Standard(DES),and Advanced Encryption Standard(AES)are not only inefficient,but also less secure.Due to characteristics of chaos theory,such as periodicity,sensitivity to initial conditions and control parameters,and unpredictability.Hence,the characteristics of deoxyribonucleic acid(DNA),such as vast parallelism and large storage capacity,make it a promising field.This paper presents an efficient color image encryption method utilizing DNA encoding with two types of hyper-chaotic maps.The proposed encryption method comprises three steps.The first step initializes the conditions for generating Lorenz and Rossler hyper-chaotic maps using a plain image Secure Hash Algorithm(SHA-256/384).The second step performs a confusion procedure by scrambling the three components of the image(red,green,and blue)using Lorenz hyper-chaotic sequences.Finally,the third step combines three approaches to encrypt the scrambled components for diffusion:DNA encoding/decoding,addition operation between components,and XORing with Rossler hyper-chaotic sequences.The simulation results indicate that the suggested encryption algorithm satisfies the requirements of security.The entropy value of confusion and diffusion is 7.997,the key space is 2200,and the correlation coefficient is nearly zero.The efficacy of the proposed method has been verified through numerous evaluations,and the results show its resistance and effectiveness against several attacks,like statistical and brute-force attacks.Finally,the devised algorithm vanquishes other relevant color image encryption algorithms. 展开更多
关键词 Color image encryption DNA encoding lorenz system rossler system SHA-2
下载PDF
Digital Image Encryption Algorithm Based on Double Chaotic Map and LSTM
16
作者 Luoyin Feng Jize Du Chong Fu 《Computers, Materials & Continua》 SCIE EI 2023年第11期1645-1662,共18页
In the era of network communication,digital image encryption(DIE)technology is critical to ensure the security of image data.However,there has been limited research on combining deep learning neural networks with chao... In the era of network communication,digital image encryption(DIE)technology is critical to ensure the security of image data.However,there has been limited research on combining deep learning neural networks with chaotic mapping for the encryption of digital images.So,this paper addresses this gap by studying the generation of pseudo-random sequences(PRS)chaotic signals using dual logistic chaotic maps.These signals are then predicted using long and short-term memory(LSTM)networks,resulting in the reconstruction of a new chaotic signal.During the research process,it was discovered that there are numerous training parameters associated with the LSTM network,which can hinder training efficiency.To overcome this challenge and improve training efficiency,the paper proposes an improved particle swarm optimization(IPSO)algorithm to optimize the LSTM network.Subsequently,the obtained chaotic signal from the optimized model training is further scrambled,obfuscated,and diffused to achieve the final encrypted image.This research presents a digital image encryption(DIE)algorithm based on a double chaotic map(DCM)and LSTM.The algorithm demonstrates a high average NPCR(Number of Pixel Change Rate)of 99.56%and a UACI(Unified Average Changing Intensity)value of 33.46%,indicating a strong ability to resist differential attacks.Overall,the proposed algorithm realizes secure and sensitive digital image encryption,ensuring the protection of personal information in the Internet environment. 展开更多
关键词 Digital image encryption LSTM particle swarm optimization algorithm DCM
下载PDF
Cryptanalysis of 2D-SCMCI Hyperchaotic Map Based Image Encryption Algorithm
17
作者 Mohammed S.Alshehri Sultan Almakdi +1 位作者 Mimonah Al Qathrady Jawad Ahmad 《Computer Systems Science & Engineering》 SCIE EI 2023年第8期2401-2414,共14页
Chaos-based cryptosystems are considered a secure mode of communication due to their reliability.Chaotic maps are associated with the other domains to construct robust encryption algorithms.There exist numerous encryp... Chaos-based cryptosystems are considered a secure mode of communication due to their reliability.Chaotic maps are associated with the other domains to construct robust encryption algorithms.There exist numerous encryption schemes in the literature based on chaotic maps.This work aims to propose an attack on a recently proposed hyper-chaotic map-based cryptosystem.The core notion of the original algorithm was based on permutation and diffusion.A bitlevel permutation approach was used to do the permutation row-and column-wise.The diffusion was executed in the forward and backward directions.The statistical strength of the cryptosystem has been demonstrated by extensive testing conducted by the author of the cryptosystem.This cryptanalysis article investigates the robustness of this cryptosystem against a chosen-plaintext attack.The secret keys of the cryptosystem were retrieved by the proposed attack with 258 chosen-plain images.The results in this manuscript suggest that,in addition to standard statistical evaluations,thorough cryptanalysis of each newly suggested cryptosystem is necessary before it can be used in practical application.Moreover,the data retrieved is also passed through some statistical analysis to compare the quality of the original and retrieved data.The results of the performance analysis indicate the exact recovery of the original data.To make the cryptosystem useful for applications requiring secure data exchange,a few further improvement recommendations are also suggested. 展开更多
关键词 CRYPTANALYSIS hyperchaotic map image encryption chosen-plaintext attack CRYPTOSYSTEM
下载PDF
A Cross-Plane Color Image Encryption Algorithm Based on 1D-SLM
18
作者 Xiaohong Wang Huiqing Wu +1 位作者 Yuying Ma Shuzhen Huang 《Computer Systems Science & Engineering》 SCIE EI 2023年第7期1093-1108,共16页
With the rapid development of 5G technology,it has become fast and easy for people to transmit information on the Internet.Digital images can express information more intuitively,so transmitting information through im... With the rapid development of 5G technology,it has become fast and easy for people to transmit information on the Internet.Digital images can express information more intuitively,so transmitting information through images has excellent applications.This paper uses a new chaotic system called 1D-Sin-Logistic-Map(1D-SLM).1D-SLM has two control parameters,which can provide larger parameter space,and the parameter space in the chaotic state is continuous.Through Lyapunov exponent analysis(LE),bifurcation diagrams analysis,spectral entropy analysis(SE),and 0-1 test,it is verified that 1D-SLM has complex dynamic behavior and is very suitable for cryptography.Compared with other 1D chaotic systems,the 1D-SLM has a larger Lyapunov exponent(LE)and spectral entropy(SE).For color image encryption algorithms,only relying on chaotic mapping is not enough to ensure security.So combined with 1D-SLM,we design a color image encryption algorithm,which is implemented by plane expansion,which reduces the correlation between the three channels of color images.The experimental results show that the proposed cross-plane color image encryption algorithm is safe and resistant to common attack methods. 展开更多
关键词 Chaos theory chaotic system 1D-SLM image encryption information security
下载PDF
A Multi-Stream Scrambling and DNA Encoding Method Based Image Encryption
19
作者 Nashat Salih Abdulkarim Alsandi Dilovan Asaad Zebari +4 位作者 Adel Al-Zebari Falah Y.H.Ahmed Mazin Abed Mohammed Marwan Albahar Abdulaziz Ali Albahr 《Computer Systems Science & Engineering》 SCIE EI 2023年第11期1321-1347,共27页
Information security has emerged as a key problem in encryption because of the rapid evolution of the internet and networks.Thus,the progress of image encryption techniques is becoming an increasingly serious issue an... Information security has emerged as a key problem in encryption because of the rapid evolution of the internet and networks.Thus,the progress of image encryption techniques is becoming an increasingly serious issue and considerable problem.Small space of the key,encryption-based low confidentiality,low key sensitivity,and easily exploitable existing image encryption techniques integrating chaotic system and DNA computing are purposing the main problems to propose a new encryption technique in this study.In our proposed scheme,a three-dimensional Chen’s map and a one-dimensional Logistic map are employed to construct a double-layer image encryption scheme.In the confusion stage,different scrambling operations related to the original plain image pixels are designed using Chen’s map.A stream pixel scrambling operation related to the plain image is constructed.Then,a block scrambling-based image encryption-related stream pixel scrambled image is designed.In the diffusion stage,two rounds of pixel diffusion are generated related to the confusing image for intra-image diffusion.Chen’s map,logistic map,and DNA computing are employed to construct diffusion operations.A reverse complementary rule is applied to obtain a new form of DNA.A Chen’s map is used to produce a pseudorandom DNA sequence,and then another DNA form is constructed from a reverse pseudorandom DNA sequence.Finally,the XOR operation is performed multiple times to obtain the encrypted image.According to the simulation of experiments and security analysis,this approach extends the key space,has great sensitivity,and is able to withstand various typical attacks.An adequate encryption effect is achieved by the proposed algorithm,which can simultaneously decrease the correlation between adjacent pixels by making it near zero,also the information entropy is increased.The number of pixels changing rate(NPCR)and the unified average change intensity(UACI)both are very near to optimal values. 展开更多
关键词 Grayscale image encryption stream scrambling-confusion DNA encoding XOR operation chaotic systems
下载PDF
Remote Sensing Image Encryption Using Optimal Key Generation-Based Chaotic Encryption
20
作者 Mesfer Al Duhayyim Fatma S.Alrayes +5 位作者 Saud S.Alotaibi Sana Alazwari Nasser Allheeib Ayman Yafoz Raed Alsini Amira Sayed A.Aziz 《Computer Systems Science & Engineering》 SCIE EI 2023年第9期3209-3223,共15页
The Internet of Things(IoT)offers a new era of connectivity,which goes beyond laptops and smart connected devices for connected vehicles,smart homes,smart cities,and connected healthcare.The massive quantity of data g... The Internet of Things(IoT)offers a new era of connectivity,which goes beyond laptops and smart connected devices for connected vehicles,smart homes,smart cities,and connected healthcare.The massive quantity of data gathered from numerous IoT devices poses security and privacy concerns for users.With the increasing use of multimedia in communications,the content security of remote-sensing images attracted much attention in academia and industry.Image encryption is important for securing remote sensing images in the IoT environment.Recently,researchers have introduced plenty of algorithms for encrypting images.This study introduces an Improved Sine Cosine Algorithm with Chaotic Encryption based Remote Sensing Image Encryption(ISCACE-RSI)technique in IoT Environment.The proposed model follows a three-stage process,namely pre-processing,encryption,and optimal key generation.The remote sensing images were preprocessed at the initial stage to enhance the image quality.Next,the ISCACERSI technique exploits the double-layer remote sensing image encryption(DLRSIE)algorithm for encrypting the images.The DLRSIE methodology incorporates the design of Chaotic Maps and deoxyribonucleic acid(DNA)Strand Displacement(DNASD)approach.The chaotic map is employed for generating pseudorandom sequences and implementing routine scrambling and diffusion processes on the plaintext images.Then,the study presents three DNASD-related encryption rules based on the variety of DNASD,and those rules are applied for encrypting the images at the DNA sequence level.For an optimal key generation of the DLRSIE technique,the ISCA is applied with an objective function of the maximization of peak signal to noise ratio(PSNR).To examine the performance of the ISCACE-RSI model,a detailed set of simulations were conducted.The comparative study reported the better performance of the ISCACE-RSI model over other existing approaches. 展开更多
关键词 Remote sensing internet of things image encryption SECURITY optimal key generation
下载PDF
上一页 1 2 6 下一页 到第
使用帮助 返回顶部