详细信息
An asymmetric image encryption scheme based on hash SHA-3, RSA and compressive sensing ( SCI-EXPANDED收录 EI收录) 被引量:22
文献类型:期刊文献
英文题名:An asymmetric image encryption scheme based on hash SHA-3, RSA and compressive sensing
作者:Chen, Zhuozhao[1];Ye, Guodong[1,2]
机构:[1]Guangdong Ocean Univ, Fac Math & Comp Sci, Zhanjiang 524088, Peoples R China;[2]Guangdong Prov Engn & Technol Res Ctr Far Sea Fish, Zhanjiang 524088, Peoples R China
年份:2022
卷号:267
外文期刊名:OPTIK
收录:SCI-EXPANDED(收录号:WOS:000835169900005)、、EI(收录号:20223012410886)、Scopus(收录号:2-s2.0-85134638156)、WOS
基金:Many thanks for the Editor's suggestions and the Reviewers' comments. This work was supported in part by the National Natural Science Foundation of China (No.61972103), the Natural Science Foundation of Guangdong Province of China (No.2019A1515011361), the Key Scientific Research Project of Education Department of Guangdong Province of China (No.2020ZDZX3064), and the Foundation of Guangdong Provincial Engineering and Technology Research Centre of Far Sea Fisheries Management and Fishing of South China Sea.
语种:英文
外文关键词:Image encryption; Chaotic system; Asymmetric encryption; SHA-3; Compressive sensing
外文摘要:Objective: In order to avoid the unauthorized access to private images and make a secure communication, an asymmetric image encryption algorithm based on SHA-3 and compressive sensing is proposed.Methods: Firstly, a random matrix is generated and a modular-addition operation is performed between it with the plain image, obtaining a preprocessed image. Then, hash values of the pre-processed image are computed by secure hash algorithm in the third generation (SHA-3), and are grouped and summed to get three plaintext keys. Using Rivest-Shamir-Adleman (RSA), three ciphertext keys can be obtained correspondingly. Secondly, a new mathematical transformation model (MTM) is designed to transform all keys into initial values for chaotic system. Then, keystream is calculated accordingly. Thirdly, the plain image is compressed by compressive sensing (CS), and further confused by random sequences. Then, applying discrete wavelet transformation (DWT) to the confused image and generating four components of high and low frequencies. Chaotic sequences are used again to confuse the low frequency components, and then all components are recombined again into a matrix. Thereafter, perform inverse DWT (IDWT) to get a middle cipher image (MCI). Finally, another random matrix is generated by chaotic se-quences, and the final cipher image is obtained by a modular-addition operation again to the MCI. Results: Experiments show that the proposed scheme can reconstruct the plain image with a high quality. In particular, the proposed method can resist known plaintext attack and chosen plaintext attack because the keystreams are related to the plain image and with no extra transmission.
参考文献:
正在载入数据...