登录    注册    忘记密码    使用帮助

详细信息

IWT and RSA based asymmetric image encryption algorithm  ( SCI-EXPANDED收录 EI收录)   被引量:20

文献类型:期刊文献

英文题名:IWT and RSA based asymmetric image encryption algorithm

作者:Du, Simin[1];Ye, Guodong[1,2]

机构:[1]Guangdong Ocean Univ, Fac Math & Comp Sci, Zhanjiang 524088, Peoples R China;[2]Guangdong Prov Engn & Technol Res Ctr Far Sea Fish, Zhanjiang 524088, Peoples R China

年份:2023

卷号:66

起止页码:979

外文期刊名:ALEXANDRIA ENGINEERING JOURNAL

收录:SCI-EXPANDED(收录号:WOS:000921042900001)、、EI(收录号:20224813170976)、Scopus(收录号:2-s2.0-85142495358)、WOS

基金:This work was supported in part by the National Natural Science Foundation of China (No.61972103) , the Natural Science Foundation of Guangdong Province of China (No.2019A1515011361) , the Special Project in Key Area of General University in Guangdong Province of China (No.2020ZDZX3064) , the Characteristic Innovation Project of General University in Guangdong Province of China (No.2022KTSCX051) , and the Foundation of Guangdong Provincial Engineering and Technology Research Centre of Far Sea Fisheries Management and Fishing of South China Sea.

语种:英文

外文关键词:Asymmetric image encryption; IOM; PTM; RSA; IWT

外文摘要:An asymmetric image encryption algorithm based on integer wavelet transformation (IWT) and Rivest-Shamir-Adleman (RSA) algorithm is proposed. Firstly, two plain characteristic parameters (PCP) of the plain image are extracted and two random numbers are chosen. Then, a new parameter transformation model (PTM) is constructed to do nonlinear processing for them, and three cipher characteristic parameters (CCP) are got. After applying RSA operation for CCP (seen as plain messages), three cipher messages are obtained. Secondly, a new initial value obtaining model (IOM) for all plain messages and cipher messages is established, by which initial values of 3D chaotic system are produced. Then, three chaotic sequences can be generated. Thirdly, chaotic sequences are used to confuse the plain image by a way of row-column cycle. Then, IWT operation is carried out and the above chaotic sequences are employed to confuse again the wavelet coefficients. Thereafter, inverse IWT is applied to get the confused image, realizing double confusion operations on both spatial domain and frequency domain. Finally, the confused image is diffused as a whole to get the cipher image. Experiment results explain that the proposed algorithm can realize the encryption in short time, and resist effectively against brute-force attack and noise attack.(c) 2022 THE AUTHORS. Published by Elsevier BV on behalf of Faculty of Engineering, Alexandria University. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/ licenses/by-nc-nd/4.0/).

参考文献:

正在载入数据...

版权所有©广东海洋大学 重庆维普资讯有限公司 渝B2-20050021-8 
渝公网安备 50019002500408号 违法和不良信息举报中心