全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

基于中国剩余定理和混沌系统的高低位图像分治加密
Divide-and-Conquer Encryption of High and Low Bit Images Based on Chinese Remainder Theorem and Chaotic System

DOI: 10.12677/JISP.2023.122012, PP. 116-127

Keywords: 中国剩余定理,高低位加密,分治加密,DNA加密,分数阶混沌系统
Chinese Remainder Theorem
, High and Low Encryption, Divide and Conquer Encryption, DNA Encryption, Fractional Chaos System

Full-Text   Cite this paper   Add to My Lib

Abstract:

提出了一种基于中国剩余定理(CRT)和分数阶混沌系统的高低位比特图像加密算法。通过CRT将相邻像素融合,利用高低位分割提取重要图像子带和次要图像子带,对重要子带进行DNA加密,再执行跨子带间的置乱扩散,最后再通过高低位的合并和CRT逆变换(INCRT),将加密效果散布至全局。由于只对重要子带进行DNA加密,算法的效率得到提升。实验结果证明,算法具有良好的加密性能,能够抵御各种安全攻击。
A high and low bit image encryption algorithm based on Chinese Remainder Theorem (CRT) and fractional order chaotic system is proposed. The adjacent pixels are fused by CRT, the important image sub-band and the secondary image sub-band are extracted by high and low bit segmentation, DNA encryption is performed on the important sub-band, and then scrambling and diffusion across sub-bands are performed, and finally the combination of high and low bits is performed and INCRT, to spread the encryption effect globally. Since DNA encryption is only performed on important sub-bands, the efficiency of the algorithm is improved. And the test results prove that the algorithm has good encryption performance and can resist various security attacks.

References

[1]  Li, X., Mou, J., Cao, Y. and Banerjee, S. (2022) An Optical Image Encryption Algorithm Based on a Fractional Order Laser Hyperchaotic System. International Journal of Bifurcation and Chaos, 32, Article ID: 2250035.
https://doi.org/10.1142/S0218127422500353
[2]  Faragallah, O.S., et al. (2021) Efficient Optical Double Image Cryptosystem Using Chaotic Mapping-Based Fresnel Transform. Optical and Quantum Electronics, 53, 305.
https://doi.org/10.1007/s11082-021-02864-5
[3]  Tang, Z., Yin, Z., Wang, R., Wang, X., Yang, J. and Cui, J. (2022) A Double-Layer Image Encryption Scheme Based on Chaotic Maps and DNA Strand Displacement. Journal of Chemistry, 2022, Article ID: 3906392.
https://doi.org/10.1155/2022/3906392
[4]  Huang, Z.-W. and Zhou, N.-R. (2022) Image Encryption Scheme Based on Discrete Cosine Stockwell Transform and DNA-Level Modulus Diffusion. Optics & Laser Technology, 149, Article ID: 107879.
https://doi.org/10.1016/j.optlastec.2022.107879
[5]  Chen, L., Li, C. and Li, C. (2022) Security Measurement of a Medical Communication Scheme Based on Chaos and DNA Coding. Journal of Visual Communication and Image Representation, 83, Article ID: 103424.
https://doi.org/10.1016/j.jvcir.2021.103424
[6]  Elsaid, S.A., Alotaibi, E.R. and Alsaleh, S. (2023) A Robust Hybrid Cryptosystem Based on DNA and Hyperchaoticfor Images Encryption. Multimedia Tools and Applications, 82, 1995-2019.
[7]  Gupta, M., Singh, V.P., Gupta, K.K. and Shukla, P.K. (2023) An Efficient Image Encryption Technique Based on Two-Level Security for Internet of Things. Multimedia Tools and Applications, 82, 5091-5111.
https://doi.org/10.1007/s11042-022-12169-8
[8]  Wen, H., et al. (2022) Design and Embedded Implementation of Secure Image Encryption Scheme Using DWT and2D-LASM. Entropy, 24, 1332.
https://doi.org/10.3390/e24101332
[9]  Dong, Y., Huang, X. and Ye, G. (2021) Visually Meaningful Image Encryption Scheme Based on DWT and Schur Decomposition. Security and Communication Networks, 2021, Article ID: 6677325.
https://doi.org/10.1155/2021/6677325
[10]  Tütüncü, K. and ?atalta?, ?. (2021) Compensation of Degradation, Security, and Capacity of LSB Substitution Methods by a New Proposed Hybrid n-LSB Approach. Computer Science and Information Systems, 18, 1311-1332.
[11]  Vidhya, R. and Brindha, M. (2021) Evaluation and Performance Analysis of Chinese Remainder Theorem and Its Application to Lossless Image Compression. Journal of Ambient Intelligence and Humanized Computing.
https://doi.org/10.1007/s12652-021-03532-y
[12]  Ye, X., Mou, J., Wang, Z., Li, P. and Luo, C. (2018) Dynamic Characteristic Analysis for Complexity of Continuous Chaotic Systems Based on the Algorithms of SE Complexity and C Complexity. In: Gu, X.M., Liu, G.L. and Li, B., Eds., Machine Learning and Intelligent Communications, Springer, Berlin, 647-657.
https://doi.org/10.1007/978-3-319-73447-7_69
[13]  Yang, Y.-G., Guan, B.-W., Li, J., Li, D., Zhou, Y.-H. and Shi, W.-M. (2019) Image Compression-Encryption Scheme Based on Fractional Order Hyper-Chaotic Systems Combined with 2D Compressed Sensing and DNA Encoding. Optics & Laser Technology, 119, Article ID: 105661.
https://doi.org/10.1016/j.optlastec.2019.105661
[14]  Zhang, Y., Li, C., Li, Q., Zhang, D. and Shu, S. (2012) Breaking a Chaotic Image Encryption Algorithm Based on Perceptron Model. Nonlinear Dynamics, 69, 1091-1096.
https://doi.org/10.1007/s11071-012-0329-y
[15]  Wu, Y., Noonan, J.P. and Agaian, S. (2011) NPCR and UACI Randomness Tests for Image Encryption. Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), 1, 31-38.
[16]  Ullah, A., Jamal, S.S. and Shah, T. (2018) A Novel Scheme for Image Encryption Using Substitution Box and Chaotic System. Nonlinear Dynamics, 91, 359-370.
https://doi.org/10.1007/s11071-017-3874-6

Full-Text

comments powered by Disqus

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133

WeChat 1538708413