期刊文献+
共找到1,351篇文章
< 1 2 68 >
每页显示 20 50 100
Enhancing Post-Quantum Information Security: A Novel Two-Dimensional Chaotic System for Quantum Image Encryption
1
作者 Fatima Asiri Wajdan Al Malwi 《Computer Modeling in Engineering & Sciences》 2025年第5期2053-2077,共25页
Ensuring information security in the quantum era is a growing challenge due to advancements in cryptographic attacks and the emergence of quantum computing.To address these concerns,this paper presents the mathematica... Ensuring information security in the quantum era is a growing challenge due to advancements in cryptographic attacks and the emergence of quantum computing.To address these concerns,this paper presents the mathematical and computer modeling of a novel two-dimensional(2D)chaotic system for secure key generation in quantum image encryption(QIE).The proposed map employs trigonometric perturbations in conjunction with rational-saturation functions and hence,named as Trigonometric-Rational-Saturation(TRS)map.Through rigorous mathematical analysis and computational simulations,the map is extensively evaluated for bifurcation behaviour,chaotic trajectories,and Lyapunov exponents.The security evaluation validates the map’s non-linearity,unpredictability,and sensitive dependence on initial conditions.In addition,the proposed TRS map has further been tested by integrating it in a QIE scheme.The QIE scheme first quantum-encodes the classic image using the Novel Enhanced Quantum Representation(NEQR)technique,the TRS map is used for the generation of secure diffusion key,which is XOR-ed with the quantum-ready image to obtain the encrypted images.The security evaluation of the QIE scheme demonstrates superior security of the encrypted images in terms of statistical security attacks and also against Differential attacks.The encrypted images exhibit zero correlation and maximum entropy with demonstrating strong resilience due to 99.62%and 33.47%results for Number of Pixels Change Rate(NPCR)and Unified Average Changing Intensity(UACI).The results validate the effectiveness of TRS-based quantum encryption scheme in securing digital images against emerging quantum threats,making it suitable for secure image encryption in IoT and edge-based applications. 展开更多
关键词 Information security chaotic map modeling post-quantum security quantum image encryption chaotic map image encryption
在线阅读 下载PDF
Secure Medical Image Transmission Using Chaotic Encryption and Blockchain-Based Integrity Verification
2
作者 Rim Amdouni Mahdi Madani +2 位作者 Mohamed Ali Hajjaji El Bay Bourennane Mohamed Atri 《Computers, Materials & Continua》 2025年第9期5527-5553,共27页
Ensuring the integrity and confidentiality of patient medical information is a critical priority in the healthcare sector.In the context of security,this paper proposes a novel encryption algorithm that integrates Blo... Ensuring the integrity and confidentiality of patient medical information is a critical priority in the healthcare sector.In the context of security,this paper proposes a novel encryption algorithm that integrates Blockchain technology,aiming to improve the security and privacy of transmitted data.The proposed encryption algorithm is a block-cipher image encryption scheme based on different chaotic maps:The logistic Map,the Tent Map,and the Henon Map used to generate three encryption keys.The proposed block-cipher system employs the Hilbert curve to perform permutation while a generated chaos-based S-Box is used to perform substitution.Furthermore,the integration of a Blockchain-based solution for securing data transmission and communication between nodes and authenticating the encrypted medical image’s authenticity adds a layer of security to our proposed method.Our proposed cryptosystem is divided into two principal modules presented as a pseudo-random number generator(PRNG)used for key generation and an encryption and decryption system based on the properties of confusion and diffusion.The security analysis and experimental tests for the proposed algorithm show that the average value of the information entropy of the encrypted images is 7.9993,the Number of Pixels Change Rate(NPCR)values are over 99.5%and the Unified Average Changing Intensity(UACI)values are greater than 33%.These results prove the strength of our proposed approach,demonstrating that it can significantly enhance the security of encrypted images. 展开更多
关键词 Medical image encryption chaotic maps blockchain substitution-Box security INTEGRITY
在线阅读 下载PDF
Sine-Polynomial Chaotic Map(SPCM):A Decent Cryptographic Solution for Image Encryption in Wireless Sensor Networks
3
作者 David S.Bhatti Annas W.Malik +1 位作者 Haeung Choi Ki-Il Kim 《Computers, Materials & Continua》 2025年第10期2157-2177,共21页
Traditional chaotic maps struggle with narrow chaotic ranges and inefficiencies,limiting their use for lightweight,secure image encryption in resource-constrained Wireless Sensor Networks(WSNs).We propose the SPCM,a n... Traditional chaotic maps struggle with narrow chaotic ranges and inefficiencies,limiting their use for lightweight,secure image encryption in resource-constrained Wireless Sensor Networks(WSNs).We propose the SPCM,a novel one-dimensional discontinuous chaotic system integrating polynomial and sine functions,leveraging a piecewise function to achieve a broad chaotic range()and a high Lyapunov exponent(5.04).Validated through nine benchmarks,including standard randomness tests,Diehard tests,and Shannon entropy(3.883),SPCM demonstrates superior randomness and high sensitivity to initial conditions.Applied to image encryption,SPCM achieves 0.152582 s(39%faster than some techniques)and 433.42 KB/s throughput(134%higher than some techniques),setting new benchmarks for chaotic map-based methods in WSNs.Chaos-based permutation and exclusive or(XOR)diffusion yield near-zero correlation in encrypted images,ensuring strong resistance to Statistical Attacks(SA)and accurate recovery.SPCM also exhibits a strong avalanche effect(bit difference),making it an efficient,secure solution for WSNs in domains like healthcare and smart cities. 展开更多
关键词 Chaos theory chaotic system image encryption CRYPTOGRAPHY wireless sensor networks(WSNs)
在线阅读 下载PDF
Random Strip Peeling:A novel lightweight image encryption for IoT devices based on colour planes permutation
4
作者 Kenan Ince Cemile Ince Davut Hanbay 《CAAI Transactions on Intelligence Technology》 2025年第2期529-544,共16页
This paper introduces a novel lightweight colour image encryption algorithm,specifically designed for resource-constrained environments such as Internet of Things(IoT)devices.As IoT systems become increasingly prevale... This paper introduces a novel lightweight colour image encryption algorithm,specifically designed for resource-constrained environments such as Internet of Things(IoT)devices.As IoT systems become increasingly prevalent,secure and efficient data transmission becomes crucial.The proposed algorithm addresses this need by offering a robust yet resource-efficient solution for image encryption.Traditional image encryption relies on confusion and diffusion steps.These stages are generally implemented linearly,but this work introduces a new RSP(Random Strip Peeling)algorithm for the confusion step,which disrupts linearity in the lightweight category by using two different sequences generated by the 1D Tent Map with varying initial conditions.The diffusion stage then employs an XOR matrix generated by the Logistic Map.Different evaluation metrics,such as entropy analysis,key sensitivity,statistical and differential attacks resistance,and robustness analysis demonstrate the proposed algorithm's lightweight,robust,and efficient.The proposed encryption scheme achieved average metric values of 99.6056 for NPCR,33.4397 for UACI,and 7.9914 for information entropy in the SIPI image dataset.It also exhibits a time complexity of O(2×M×N)for an image of size M×N. 展开更多
关键词 chaotic encryption image scrambling algorithm lightweight image encryption symmetric encryption
在线阅读 下载PDF
IDCE:Integrated Data Compression and Encryption for Enhanced Security and Efficiency
5
作者 Muhammad Usama Arshad Aziz +2 位作者 Suliman A.Alsuhibany Imtiaz Hassan Farrukh Yuldashev 《Computer Modeling in Engineering & Sciences》 2025年第4期1029-1048,共20页
Data compression plays a vital role in datamanagement and information theory by reducing redundancy.However,it lacks built-in security features such as secret keys or password-based access control,leaving sensitive da... Data compression plays a vital role in datamanagement and information theory by reducing redundancy.However,it lacks built-in security features such as secret keys or password-based access control,leaving sensitive data vulnerable to unauthorized access and misuse.With the exponential growth of digital data,robust security measures are essential.Data encryption,a widely used approach,ensures data confidentiality by making it unreadable and unalterable through secret key control.Despite their individual benefits,both require significant computational resources.Additionally,performing them separately for the same data increases complexity and processing time.Recognizing the need for integrated approaches that balance compression ratios and security levels,this research proposes an integrated data compression and encryption algorithm,named IDCE,for enhanced security and efficiency.Thealgorithmoperates on 128-bit block sizes and a 256-bit secret key length.It combines Huffman coding for compression and a Tent map for encryption.Additionally,an iterative Arnold cat map further enhances cryptographic confusion properties.Experimental analysis validates the effectiveness of the proposed algorithm,showcasing competitive performance in terms of compression ratio,security,and overall efficiency when compared to prior algorithms in the field. 展开更多
关键词 chaotic maps SECURITY data compression data encryption integrated compression and encryption
在线阅读 下载PDF
Chaos-Based Novel Watermarked Satellite Image Encryption Scheme
6
作者 Mohamed Medani Yahia Said +4 位作者 Nashwan Adnan Othman Farrukh Yuldashev Mohamed Kchaou Faisal Khaled Aldawood Bacha Rehman 《Computer Modeling in Engineering & Sciences》 2025年第4期1049-1070,共22页
Satellite images are widely used for remote sensing and defence applications,however,they are subject to a variety of threats.To ensure the security and privacy of these images,theymust be watermarked and encrypted be... Satellite images are widely used for remote sensing and defence applications,however,they are subject to a variety of threats.To ensure the security and privacy of these images,theymust be watermarked and encrypted before communication.Therefore,this paper proposes a novel watermarked satellite image encryption scheme based on chaos,Deoxyribonucleic Acid(DNA)sequence,and hash algorithm.The watermark image,DNA sequence,and plaintext image are passed through the Secure Hash Algorithm(SHA-512)to compute the initial condition(keys)for the Tangent-Delay Ellipse Reflecting Cavity Map(TD-ERCS),Henon,and Duffing chaotic maps,respectively.Through bitwise XOR and substitution,the TD-ERCS map encrypts the watermark image.The ciphered watermark image is embedded in the plaintext image.The embedded plaintext image is permuted row-wise and column-wise using the Henon chaotic map.The permuted image is then bitwise XORed with the values obtained from the Duffing map.For additional security,the XORed image is substituted through a dynamic S-Box.To evaluate the efficiency and performance of the proposed algorithm,several tests are performed which prove its resistance to various types of attacks such as brute-force and statistical attacks. 展开更多
关键词 DNA sequence TD-ERCS chaoticmap henon chaoticmap duffing chaotic system SHA-512 encryption technique watermark embedding
在线阅读 下载PDF
A chaotic hierarchical encryption/watermark embedding scheme for multi-medical images based on row-column confusion and closed-loop bi-directional diffusion
7
作者 张哲祎 牟俊 +1 位作者 Santo Banerjee 曹颖鸿 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第2期228-237,共10页
Security during remote transmission has been an important concern for researchers in recent years.In this paper,a hierarchical encryption multi-image encryption scheme for people with different security levels is desi... Security during remote transmission has been an important concern for researchers in recent years.In this paper,a hierarchical encryption multi-image encryption scheme for people with different security levels is designed,and a multiimage encryption(MIE)algorithm with row and column confusion and closed-loop bi-directional diffusion is adopted in the paper.While ensuring secure communication of medical image information,people with different security levels have different levels of decryption keys,and differentiated visual effects can be obtained by using the strong sensitivity of chaotic keys.The highest security level can obtain decrypted images without watermarks,and at the same time,patient information and copyright attribution can be verified by obtaining watermark images.The experimental results show that the scheme is sufficiently secure as an MIE scheme with visualized differences and the encryption and decryption efficiency is significantly improved compared to other works. 展开更多
关键词 chaotic hierarchical encryption multi-medical image encryption differentiated visual effects row-column confusion closed-loop bi-directional diffusion transform domain watermark embedding
原文传递
Double quantum images encryption scheme based on chaotic system
8
作者 蒋社想 李杨 +1 位作者 石锦 张茹 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第4期305-320,共16页
This paper explores a double quantum images representation(DNEQR)model that allows for simultaneous storage of two digital images in a quantum superposition state.Additionally,a new type of two-dimensional hyperchaoti... This paper explores a double quantum images representation(DNEQR)model that allows for simultaneous storage of two digital images in a quantum superposition state.Additionally,a new type of two-dimensional hyperchaotic system based on sine and logistic maps is investigated,offering a wider parameter space and better chaotic behavior compared to the sine and logistic maps.Based on the DNEQR model and the hyperchaotic system,a double quantum images encryption algorithm is proposed.Firstly,two classical plaintext images are transformed into quantum states using the DNEQR model.Then,the proposed hyperchaotic system is employed to iteratively generate pseudo-random sequences.These chaotic sequences are utilized to perform pixel value and position operations on the quantum image,resulting in changes to both pixel values and positions.Finally,the ciphertext image can be obtained by qubit-level diffusion using two XOR operations between the position-permutated image and the pseudo-random sequences.The corresponding quantum circuits are also given.Experimental results demonstrate that the proposed scheme ensures the security of the images during transmission,improves the encryption efficiency,and enhances anti-interference and anti-attack capabilities. 展开更多
关键词 double quantum images encryption chaotic system pixel scrambling XOR operation
原文传递
Chaotic CS Encryption:An Efficient Image Encryption Algorithm Based on Chebyshev Chaotic System and Compressive Sensing
9
作者 Mingliang Sun Jie Yuan +1 位作者 Xiaoyong Li Dongxiao Liu 《Computers, Materials & Continua》 SCIE EI 2024年第5期2625-2646,共22页
Images are the most important carrier of human information. Moreover, how to safely transmit digital imagesthrough public channels has become an urgent problem. In this paper, we propose a novel image encryptionalgori... Images are the most important carrier of human information. Moreover, how to safely transmit digital imagesthrough public channels has become an urgent problem. In this paper, we propose a novel image encryptionalgorithm, called chaotic compressive sensing (CS) encryption (CCSE), which can not only improve the efficiencyof image transmission but also introduce the high security of the chaotic system. Specifically, the proposed CCSEcan fully leverage the advantages of the Chebyshev chaotic system and CS, enabling it to withstand various attacks,such as differential attacks, and exhibit robustness. First, we use a sparse trans-form to sparse the plaintext imageand then use theArnold transformto perturb the image pixels. After that,we elaborate aChebyshev Toeplitz chaoticsensing matrix for CCSE. By using this Toeplitz matrix, the perturbed image is compressed and sampled to reducethe transmission bandwidth and the amount of data. Finally, a bilateral diffusion operator and a chaotic encryptionoperator are used to perturb and expand the image pixels to change the pixel position and value of the compressedimage, and ultimately obtain an encrypted image. Experimental results show that our method can be resistant tovarious attacks, such as the statistical attack and noise attack, and can outperform its current competitors. 展开更多
关键词 Image encryption chaotic system compressive sensing arnold transform
在线阅读 下载PDF
A color image encryption scheme based on a 2D coupled chaotic system and diagonal scrambling algorithm
10
作者 苏静明 方士辉 +1 位作者 洪炎 温言 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第7期233-243,共11页
A novel color image encryption scheme is developed to enhance the security of encryption without increasing the complexity. Firstly, the plain color image is decomposed into three grayscale plain images, which are con... A novel color image encryption scheme is developed to enhance the security of encryption without increasing the complexity. Firstly, the plain color image is decomposed into three grayscale plain images, which are converted into the frequency domain coefficient matrices(FDCM) with discrete cosine transform(DCT) operation. After that, a twodimensional(2D) coupled chaotic system is developed and used to generate one group of embedded matrices and another group of encryption matrices, respectively. The embedded matrices are integrated with the FDCM to fulfill the frequency domain encryption, and then the inverse DCT processing is implemented to recover the spatial domain signal. Eventually,under the function of the encryption matrices and the proposed diagonal scrambling algorithm, the final color ciphertext is obtained. The experimental results show that the proposed method can not only ensure efficient encryption but also satisfy various sizes of image encryption. Besides, it has better performance than other similar techniques in statistical feature analysis, such as key space, key sensitivity, anti-differential attack, information entropy, noise attack, etc. 展开更多
关键词 color image encryption discrete cosine transform two-dimensional(2D)coupled chaotic system diagonal scrambling
原文传递
A Novel Bit-level Image Encryption Method Based on Chaotic Map and Dynamic Grouping 被引量:2
11
作者 张国基 沈彦 《Communications in Theoretical Physics》 SCIE CAS CSCD 2012年第10期520-524,共5页
In this paper,a novel bit-level image encryption method based on dynamic grouping is proposed.In the proposed method,the plain-image is divided into several groups randomly,then permutation-diffusion process on bit le... In this paper,a novel bit-level image encryption method based on dynamic grouping is proposed.In the proposed method,the plain-image is divided into several groups randomly,then permutation-diffusion process on bit level is carried out.The keystream generated by logistic map is related to the plain-image,which confuses the relationship between the plain-image and the cipher-image.The computer simulation results of statistical analysis,information entropy analysis and sensitivity analysis show that the proposed encryption method is secure and reliable enough to be used for communication application. 展开更多
关键词 image encryption permutation-diffusion dynamic grouping bit-level
原文传递
High Security Nested PWLCM Chaotic Map Bit-Level Permutation Based Image Encryption 被引量:1
12
作者 Qassim Nasir Hadi H. Abdlrudha 《International Journal of Communications, Network and System Sciences》 2012年第9期548-556,共9页
Chaotic systems produce pseudo-random sequences with good randomness;therefore, these systems are suitable to efficient image encryption. In this paper, a low complexity image encryption based on Nested Piece Wise Lin... Chaotic systems produce pseudo-random sequences with good randomness;therefore, these systems are suitable to efficient image encryption. In this paper, a low complexity image encryption based on Nested Piece Wise Linear Chaotic Map (NPWLCM) is proposed. Bit planes of the grey or color levels are shuffled to increase the encryption complexity. A security analysis of the proposed system is performed and presented. The proposed method combine pixel shuffling, bit shuffling, and diffusion, which is highly disorder the original image. The initial values and the chaos control parameters of NPWLCM maps are derived from external secret key. The cipher image generated by this method is the same size as the original image and is suitable for practical use in the secure transmission of confidential information over the Internet. The experimental results of the proposed method show advantages of low complexity, and high-level security. 展开更多
关键词 encryption CHAOS PIECEWISE chaotic MAPS Security
在线阅读 下载PDF
Image encryption using high-dimension chaotic system 被引量:14
13
作者 孙福艳 刘树堂 吕宗旺 《Chinese Physics B》 SCIE EI CAS CSCD 2007年第12期3616-3623,共8页
In recent years, the chaos based cryptographic algorithms have suggested some new and efficient ways to develop secure image encryption techniques. This paper proposes a new approach for image encryption based on a hi... In recent years, the chaos based cryptographic algorithms have suggested some new and efficient ways to develop secure image encryption techniques. This paper proposes a new approach for image encryption based on a high-dimensional chaotic map. The new scheme employs the Cat map to shuffle the positions, then to confuse the relationship between the cipher-image and the plain-image using the high-dimensional Lorenz chaotic map preprocessed. The results of experimental, statistical analysis and key space analysis show that the proposed image encryption scheme provides an efficient and secure way for real-time image encryption and transmission. 展开更多
关键词 Arnold cat map image encryption chaotic encryption
原文传递
New chaotical image encryption algorithm based on Fisher–Yatess scrambling and DNA coding 被引量:9
14
作者 Xing-Yuan Wang Jun-Jian Zhang +1 位作者 Fu-Chen Zhang Guang-Hui Cao 《Chinese Physics B》 SCIE EI CAS CSCD 2019年第4期121-130,共10页
Based on the Fisher–Yatess scrambling and DNA coding technology, a chaotical image encryption method is proposed. First, the SHA-3 algorithm is used to calculate the hash value of the initial password, which is used ... Based on the Fisher–Yatess scrambling and DNA coding technology, a chaotical image encryption method is proposed. First, the SHA-3 algorithm is used to calculate the hash value of the initial password, which is used as the initial value of the chaotic system. Second, the chaotic sequence and Fisher–Yatess scrambling are used to scramble the plaintext,and a sorting scrambling algorithm is used for secondary scrambling. Then, the chaotic sequence and DNA coding rules are used to change the plaintext pixel values, which makes the ciphertext more random and resistant to attacks, and thus ensures that the encrypted ciphertext is more secure. Finally, we add plaintext statistics for pixel-level diffusion to ensure plaintext sensitivity. The experimental results and security analysis show that the new algorithm has a good encryption effect and speed, and can also resist common attacks. 展开更多
关键词 Fisher–Yatess SCRAMBLING chaotic sequence DNA CODING image encryption
原文传递
Digital image encryption with chaotic map lattices 被引量:8
15
作者 孙福艳 吕宗旺 《Chinese Physics B》 SCIE EI CAS CSCD 2011年第4期132-138,共7页
This paper proposes a secure approach for encryption and decryption of digital images with chaotic map lattices. In the proposed encryption process, eight different types of operations are used to encrypt the pixels o... This paper proposes a secure approach for encryption and decryption of digital images with chaotic map lattices. In the proposed encryption process, eight different types of operations are used to encrypt the pixels of an image and one of them will be used for particular pixels decided by the outcome of the chaotic map lattices. To make the cipher more robust against any attacks, the secret key is modified after encrypting each block of sixteen pixels of the image. The experimental results and security analysis show that the proposed image encryption scheme achieves high security and efficiency. 展开更多
关键词 image encryption image decryption chaotic map lattice CRYPTOGRAPHY spatiotemporal chaotic system
原文传递
An improved image encryption algorithm based on chaotic maps 被引量:4
16
作者 徐淑奖 王继志 杨素香 《Chinese Physics B》 SCIE EI CAS CSCD 2008年第11期4027-4032,共6页
Recently, two chaotic image encryption schemes have been proposed, in which shuffling the positions and changing the grey values of image pixels are combined. This paper provides the chosen plaintext attack to recover... Recently, two chaotic image encryption schemes have been proposed, in which shuffling the positions and changing the grey values of image pixels are combined. This paper provides the chosen plaintext attack to recover the corresponding plaintext of a given ciphertext. Furthermore, it points out that the two schemes are not sufficiently sensitive to small changes of the plaintext. Based on the given analysis, it proposes an improved algorithm which includes two rounds of substitution and one round of permutation to strengthen the overall performance. 展开更多
关键词 CHAOS chaotic cryptosystem image encryption chosen plaintext attack
原文传递
Repeater jamming suppression method for pulse Doppler fuze based on identity recognition and chaotic encryption 被引量:8
17
作者 Jian Dai Xin-hong Hao +2 位作者 Qiang Liu Xiao-peng Yan Ping Li 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2021年第3期1002-1012,共11页
Pulse Doppler(PD) fuze is widely used in current battlefield. However, with the threat of repeater jamming, especially digital radio frequency memory technology, the deficiency in the anti-repeater jamming of a tradit... Pulse Doppler(PD) fuze is widely used in current battlefield. However, with the threat of repeater jamming, especially digital radio frequency memory technology, the deficiency in the anti-repeater jamming of a traditional PD fuze increasingly emerges. Therefore, a repeater jamming suppression method for a PD fuze based on identity(ID) recognition and chaotic encryption is proposed. Every fuze has its own ID which is encrypted with different chaotic binary sequences in every pulse period of the transmitted signal. The thumbtack-shaped ambiguity function shows a good resolution and distance cutoff characteristic. The ability of anti-repeater jamming is emphatically analyzed, and the results at different signal-to-noise ratio(SNR) show a strong anti-repeater jamming ability and range resolution that the proposed method possesses. Furthermore, the anti-repeater jamming ability is influenced by processing gain, bit error rate(BER) and correlation function. The simulation result validates the theoretical analysis, it shows the proposed method can significantly improve the anti-repeater jamming ability of a PD fuze. 展开更多
关键词 Pulse Doppler fuze ID chaotic binary code encryption Repeater jamming
在线阅读 下载PDF
Chaotic Image Encryption Algorithm by Correlating Keys with Plaintext 被引量:6
18
作者 Zhu Congxu Sun Kehui 《China Communications》 SCIE CSCD 2012年第1期73-79,共7页
A novel image encryption scheme based on the modified skew tent map was proposed in this paper. In the key generating procedure, the algorithm generates a plaintext-dependent secret keys set. In the encryption process... A novel image encryption scheme based on the modified skew tent map was proposed in this paper. In the key generating procedure, the algorithm generates a plaintext-dependent secret keys set. In the encryption process, the diffusion operation with cipher output feedback is introduced. Thus, cipher-irmge is sensitive to both initial keys and plaintext through only one round diffusion operation. The key space is large. As a resuk, the algorithm can effectively resist differential attacks, statistical attacks, brute-force attacks, known plaintext and chosen plaintext attacks. Perforrmnce test and security analysis demonstrates that this algorithm is eficient and reliable, with high potential to be adopted for secure comnmnications. 展开更多
关键词 skew tent map chaotic system image encryption secure corrrrmnieation
在线阅读 下载PDF
An image encryption algorithm based on improved baker transformation and chaotic S-box 被引量:4
19
作者 Xing-Yuan Wang Huai-Huai Sun Hao Gao 《Chinese Physics B》 SCIE EI CAS CSCD 2021年第6期216-225,共10页
The algorithm is an image encryption algorithm based on the improved baker transformation and chaotic substitution box(S-box). It mainly uses the initial values and parameters of a one-dimensional logistic chaotic sys... The algorithm is an image encryption algorithm based on the improved baker transformation and chaotic substitution box(S-box). It mainly uses the initial values and parameters of a one-dimensional logistic chaotic system as an encryption key. Specifically, in the image scrambling stage, the algorithm primarily uses an improved baker transform method to process the image. In the image diffusion stage, the algorithm first uses the chaotic S-box method to process the encryption key. Secondly, an exclusive OR(XOR) operation is performed on the image and the encryption key to initially diffuse the image. Finally, the image is again diffused using the method of ortho XOR. Simulation analysis shows that the algorithm can achieve good encryption effect, simple and easy implementation, and good security. In the digital image communication transmission, it has good practical value. 展开更多
关键词 image encryption improved baker transformation chaotic S-box chaotic sequence
原文传递
Image Encryption Application of Chaotic Sequences Incorporating Quantum Keys 被引量:3
20
作者 Bin Ge Hai-Bo Luo 《International Journal of Automation and computing》 EI CSCD 2020年第1期123-138,共16页
This paper proposes an image encryption algorithm LQBPNN(logistic quantum and back propagation neural network)based on chaotic sequences incorporating quantum keys. Firstly, the improved one-dimensional logistic cha... This paper proposes an image encryption algorithm LQBPNN(logistic quantum and back propagation neural network)based on chaotic sequences incorporating quantum keys. Firstly, the improved one-dimensional logistic chaotic sequence is used as the basic key sequence. After the quantum key is introduced, the quantum key is incorporated into the chaotic sequence by nonlinear operation. Then the pixel confused process is completed by the neural network. Finally, two sets of different mixed secret key sequences are used to perform two rounds of diffusion encryption on the confusing image. The experimental results show that the randomness and uniformity of the key sequence are effectively enhanced. The algorithm has a secret key space greater than 2182. The adjacent pixel correlation of the encrypted image is close to 0, and the information entropy is close to 8. The ciphertext image can resist several common attacks such as typical attacks, statistical analysis attacks and differential attacks. 展开更多
关键词 Logistic chaotic system quantum key nonlinear operation sequence performance image encryption algorithm
原文传递
上一页 1 2 68 下一页 到第
使用帮助 返回顶部