详细信息
An Effective Framework for Chaotic Image Encryption Based on 3D Logistic Map ( SCI-EXPANDED收录 EI收录) 被引量:35
文献类型:期刊文献
英文题名:An Effective Framework for Chaotic Image Encryption Based on 3D Logistic Map
作者:Ye, Guodong[1];Jiao, Kaixin[1];Pan, Chen[1];Huang, Xiaoling[1]
机构:[1]Guangdong Ocean Univ, Fac Math & Comp Sci, Zhanjiang 524088, Peoples R China
年份:2018
卷号:2018
外文期刊名:SECURITY AND COMMUNICATION NETWORKS
收录:SCI-EXPANDED(收录号:WOS:000449189600001)、、EI(收录号:20184606067161)、Scopus(收录号:2-s2.0-85056287691)、WOS
基金:This work was fully supported by the National Natural Science Foundations of China (no. 61602124, no. 61702116), the Natural Science Foundation of Guangdong Province of China (no. 2016A030310333), the Science and Technology Planning Project of Guangdong Province of China (no. 2017A010101025), the Program for Scientific Research Start-up Funds of Guangdong Ocean University of China (no. R17037), the Special Funding Program for Excellent Young Scholars of Guangdong Ocean University of China (no. HDYQ2017006), and the Natural Science Foundation of Guangdong Ocean University of China (no. P15238).
语种:英文
外文关键词:Chaotic systems - Electrocardiography - Image processing
外文摘要:In this paper, an effective framework for chaotic encryption based on a three-dimensional logistic map is presented together with secure hash algorithm-3 (SHA-3) and electrocardiograph (ECG) signal. Following the analysis of the drawbacks, namely, fixed key and low sensitivity, of some current algorithms, this work tries to solve these two problems and includes two contributions: (1) removal of the phenomenon of summation invariance in a plain-image, for which SHA-3 is proposed to calculate the hash value for the plain-image, with the results being employed to influence the initial keys for chaotic map; (2) resolution of the problem of fixed key by using an ECG signal, that can be different for different subjects or different for same subject at different times. The Wolf algorithm is employed to produce all the control parameters and initial keys in the proposed encryption method. It is believed that combining with the classical architecture of permutation-diffusion, the summation invariance in the plain-image and shortcoming of a fixed key will be avoided in our algorithm. Furthermore, the experimental results and security analysis show that the proposed encryption algorithm can achieve confidentiality.
参考文献:
正在载入数据...