登录    注册    忘记密码    使用帮助

详细信息

Image encryption scheme based on blind signature and an improved Lorenz system  ( SCI-EXPANDED收录 EI收录)   被引量:27

文献类型:期刊文献

英文题名:Image encryption scheme based on blind signature and an improved Lorenz system

作者:Ye, Guodong[1];Wu, Huishan[1];Liu, Min[1];Shi, Yang[2]

机构:[1]Guangdong Ocean Univ, Fac Math & Comp Sci, Zhanjiang 524088, Peoples R China;[2]Tongji Univ, Sch Software Engn, Shanghai 200092, Peoples R China

年份:2022

卷号:205

外文期刊名:EXPERT SYSTEMS WITH APPLICATIONS

收录:SCI-EXPANDED(收录号:WOS:000832950900006)、、EI(收录号:20222412212819)、Scopus(收录号:2-s2.0-85131461755)、WOS

基金:This work was supported in part by the National Natural Science Foundations of China (No. 61972103, No. 62172301) , the Natural Science Foundation of Guangdong Province of China (No. 2019A1515011361) , and the Key Scientific Research Project of Educa-tion Department of Guangdong Province of China (No. 2020ZDZX3064).

语种:英文

外文关键词:Asymmetric image encryption; RSA algorithm; ImproLS; Signature

外文摘要:In this paper, a new improved Lorenz system (ImproLS) is designed with a better behavior due to a larger positive Lyapunov exponent. Then, an asymmetric image encryption scheme is presented based on blind signature and the ImproLS. First, the sender uses the public key from the receiver to produce the cipher keys in conjunction with the Rivest-Shamir-Adleman (RSA) algorithm. Then, a new mathematical model is established to convert both the plain keys and the cipher keys to generate the initial values for ImproLS. After doing preprocess to the secret plain image, its statistical characteristics is changed greatly. Then, by employing permutation and diffusion operations, the cipher image can be obtained and sent to the receiver and the signer. Second, the signer encrypts the digital signature image using Arnold transform in conjunction with the RSA algorithm, and applies the discrete wavelet transform (DWT) to the cipher image. The scrambled signature image is then embedded into the wavelet domain of cipher image blindly. Then, the cipher image containing signature is sent to the receiver for authentication. Third, the receiver uses the private key to check the signature and recover the cipher image. After comparing the decrypted images from both the sender and the signer, the receiver can judge the source of the secret plain image. Experimental results show that the information entropy is high and closer to the theoretical value. In addition, both unsigned and signed cipher images can effectively resist salt and pepper attack, and clipping attack.

参考文献:

正在载入数据...

版权所有©广东海洋大学 重庆维普资讯有限公司 渝B2-20050021-8 
渝公网安备 50019002500408号 违法和不良信息举报中心