详细信息
文献类型:期刊文献
英文题名:IWT and RSA based asymmetric image encryption algorithm
作者:Du, Simin[1];Ye, Guodong[1,2]
机构:[1]Guangdong Ocean Univ, Fac Math & Comp Sci, Zhanjiang 524088, Peoples R China;[2]Guangdong Prov Engn & Technol Res Ctr Far Sea Fish, Zhanjiang 524088, Peoples R China
年份:2023
卷号:66
起止页码:979
外文期刊名:ALEXANDRIA ENGINEERING JOURNAL
收录:SCI-EXPANDED(收录号:WOS:000921042900001)、、EI(收录号:20224813170976)、Scopus(收录号:2-s2.0-85142495358)、WOS
基金:This work was supported in part by the National Natural Science Foundation of China (No.61972103) , the Natural Science Foundation of Guangdong Province of China (No.2019A1515011361) , the Special Project in Key Area of General University in Guangdong Province of China (No.2020ZDZX3064) , the Characteristic Innovation Project of General University in Guangdong Province of China (No.2022KTSCX051) , and the Foundation of Guangdong Provincial Engineering and Technology Research Centre of Far Sea Fisheries Management and Fishing of South China Sea.
语种:英文
外文关键词:Asymmetric image encryption; IOM; PTM; RSA; IWT
外文摘要:An asymmetric image encryption algorithm based on integer wavelet transformation (IWT) and Rivest-Shamir-Adleman (RSA) algorithm is proposed. Firstly, two plain characteristic parameters (PCP) of the plain image are extracted and two random numbers are chosen. Then, a new parameter transformation model (PTM) is constructed to do nonlinear processing for them, and three cipher characteristic parameters (CCP) are got. After applying RSA operation for CCP (seen as plain messages), three cipher messages are obtained. Secondly, a new initial value obtaining model (IOM) for all plain messages and cipher messages is established, by which initial values of 3D chaotic system are produced. Then, three chaotic sequences can be generated. Thirdly, chaotic sequences are used to confuse the plain image by a way of row-column cycle. Then, IWT operation is carried out and the above chaotic sequences are employed to confuse again the wavelet coefficients. Thereafter, inverse IWT is applied to get the confused image, realizing double confusion operations on both spatial domain and frequency domain. Finally, the confused image is diffused as a whole to get the cipher image. Experiment results explain that the proposed algorithm can realize the encryption in short time, and resist effectively against brute-force attack and noise attack.(c) 2022 THE AUTHORS. Published by Elsevier BV on behalf of Faculty of Engineering, Alexandria University. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/ licenses/by-nc-nd/4.0/).
参考文献:
正在载入数据...