登录    注册    忘记密码    使用帮助

详细信息

Asymmetric image encryption algorithm using a new chaotic map and an improved radial diffusion  ( EI收录)   被引量:37

文献类型:期刊文献

英文题名:Asymmetric image encryption algorithm using a new chaotic map and an improved radial diffusion

作者:Liu, Shoukang[1]; Ye, Guodong[1]

机构:[1] Faculty of Mathematics and Computer Science, Guangdong Ocean University, Zhanjiang, 524088, China

年份:2023

卷号:288

外文期刊名:Optik

收录:EI(收录号:20232914422345)、Scopus(收录号:2-s2.0-85165160430)

语种:英文

外文关键词:Chaotic systems - Hash functions - Image enhancement - Internet of things

外文摘要:In order to address the security risks associated with the theft of private images over open Internet of Things (IoT), this paper introduces a new Logistic-Sine-Coupling Map (LoSCM) in three dimensions with a better chaotic behavior, and proposes an image encryption algorithm using an improved Radial Diffusion (ImRD) to achieve a better diffusion effect in image encryption process. Firstly, a preprocessed image is obtained through an XOR operation between the original plain image and a random generated matrix, followed by Secure Hash Algorithm 512 (SHA-512) performed on it, producing a plaintext information with length of 512 bits. Then, a parameter transformation model (PaTM) is constructed, and the plaintext key associated with the plain image is computed by the plaintext property. Secondly, by employing public-key Rivest-Shamir-Adleman cryptogram, i.e., RSA, the ciphertext key is obtained through the plaintext key and opened to public. Then, a new initial value acquisition model (InVAM) is designed to calculate the initial values of LoSCM, thereby generating the corresponding keystream. Finally, XOR, row scrambling, ImRD diffusion, and column scrambling are performed on secret plain image, followed by modular addition with a random matrix to get the final cipher image. Furthermore, the simulation results and performance analysis also prove that the new suggested image encryption algorithm in this paper can effectively oppose chosen or known-plaintext attack. The highlights are: (1) Construct chaotic map LoSCM with better chaotic behavior. (2) Design diffusion ImRD with better diffusion effect. (3) Build models PaTM and InVAM with high security to produce keystream. ? 2023 Elsevier GmbH

参考文献:

正在载入数据...

版权所有©广东海洋大学 重庆维普资讯有限公司 渝B2-20050021-8 
渝公网安备 50019002500408号 违法和不良信息举报中心