Multi‐image encryption and authentication using computational ghost imaging and singular value decomposition DOI Creative Commons

Hong Huang,

Zhiguang Han

IET Image Processing, Journal Year: 2024, Volume and Issue: unknown

Published: Sept. 6, 2024

Abstract The non‐local imaging characteristics of computational ghost (CGI) make it widely used in the field information security. However, processing method based on traditional CGI has some problems process multi‐image encryption, such as low efficiency and unsatisfactory reconstruction quality. Therefore, this article proposes to use wavelet transform singular value decomposition technology help efficiently complete coding encryption multiple images, alternating direction multiplier (ADMM) image restoration carry out high‐quality original encrypted image. results show that scheme good effect, strong security robustness even at a sampling rate. It provides reference for digital watermarking cryptography.

Language: Английский

Secure image encryption scheme based on a new robust chaotic map and strong S-box DOI
Shenli Zhu, Xiaoheng Deng, Wendong Zhang

et al.

Mathematics and Computers in Simulation, Journal Year: 2023, Volume and Issue: 207, P. 322 - 346

Published: Jan. 4, 2023

Language: Английский

Citations

104

Chaos-Based Image Encryption: Review, Application, and Challenges DOI Creative Commons
Bowen Zhang, Lingfeng Liu

Mathematics, Journal Year: 2023, Volume and Issue: 11(11), P. 2585 - 2585

Published: June 5, 2023

Chaos has been one of the most effective cryptographic sources since it was first used in image-encryption algorithms. This paper closely examines development process chaos-based algorithms from various angles, including symmetric and asymmetric algorithms, block ciphers stream ciphers, integration with other technologies. The unique attributes chaos, such as sensitivity to initial conditions, topological transitivity, pseudo-randomness, are conducive cross-referencing disciplines improving methods. Additionally, this covers practical application scenarios current challenges chaotic image encryption, thereby encouraging researchers continue developing complementing existing situations, may also serve a basis future prospects for encryption.

Language: Английский

Citations

97

Enhancing Image Encryption with the Kronecker xor Product, the Hill Cipher, and the Sigmoid Logistic Map DOI Creative Commons
Dani Elias Mfungo, Xianping Fu,

Xingyuan Wang

et al.

Applied Sciences, Journal Year: 2023, Volume and Issue: 13(6), P. 4034 - 4034

Published: March 22, 2023

In today’s digital age, it is crucial to secure the flow of information protect data and from being hacked during transmission or storage. To address this need, we present a new image encryption technique that combines Kronecker xor product, Hill cipher, sigmoid logistic Map. Our proposed algorithm begins by shifting values in each row state matrix left predetermined number positions, then encrypting resulting using Cipher. The top value odd even column used perform an operation with all corresponding column, excluding value. diffused map subjected product among pixels create image. again other keys for final product. We compared our method recent work found be safe efficient terms performance after conducting statistical analysis, differential attack brute force entropy analysis. results demonstrate robust, lightweight, fast performance, meets requirements decryption, resistant various attacks.

Language: Английский

Citations

24

Semantically enhanced selective image encryption scheme with parallel computing DOI

Baisong Liu,

Wei Song,

Zheng Mingyuan

et al.

Expert Systems with Applications, Journal Year: 2025, Volume and Issue: unknown, P. 127404 - 127404

Published: April 1, 2025

Language: Английский

Citations

1

Image encryption algorithm based on improved iterative chaotic map with infinite collapses and Gray code DOI
Quanyv Wang, Xiaoqiang Zhang, Xiaohu Zhao

et al.

Physica Scripta, Journal Year: 2024, Volume and Issue: 99(2), P. 025232 - 025232

Published: Jan. 4, 2024

Abstract The quick advancement of multimedia technology has led to the widespread utilization digital images across various industries. Meanwhile, image security become an urgent issue in need resolution. To guarantee as well fulfill requirements real-time cryptosystems, a novel encryption algorithm is proposed based on designed improved iterative chaotic map with infinite collapses (ICMIC), Gray code and semi-pixel level permutation diffusion. Firstly, two sequences are produced using ICMIC then they used perform scrambling diffusion operations. Secondly, plain encoded we convert each into semi-pixels. Thirdly, scramble vector. Finally, scrambled vector diffused dynamic performance analyses illustrate that possesses robust high efficiency, making it ideally suited for application cryptosystems.

Language: Английский

Citations

8

Mixed Multi-Chaos Quantum Image Encryption Scheme Based on Quantum Cellular Automata (QCA) DOI Creative Commons
Nehal Abd El-Salam Mohamed, Hala S. El‐sayed, Aliaa A. A. Youssif

et al.

Fractal and Fractional, Journal Year: 2023, Volume and Issue: 7(10), P. 734 - 734

Published: Oct. 4, 2023

The advent of quantum computers could enable the resolution complex computational problems that conventional cryptographic protocols find challenging. As a result, formidable computing capabilities may render all present-day schemes rely on complexity ineffectual. Inspired by these possibilities, primary purpose this paper is to suggest image encryption scheme based cellular automata with mixed multi-chaos hybrid maps and hyperchaotic system operations. To achieve desirable outcomes, we designed an involving two main operations: (1) pixel-level diffusion (2) permutation. Initially, secret keys generated using were closely tied original image. During first phase, establishment correlations among pixels, in addition three chaotic sequences obtained from system, was achieved application quantum-state superposition measurement principle, wherein color information pixel described single qubit. Therefore, channels plain subjected operations, which involve Hadamard transformation quantum-controlled NOT gate, before each channel system. Subsequently, ternary Toffoli gate used perform operation. Next, appropriate performed diffused channels. attain confusion blend two-dimensional automaton produce random sequence keys. circular shift utilized additionally shuffle rows columns components, order alter positions their values, significantly contributes permutation process. Lastly, encoding channels, R, G, B, merged acquire encrypted experimental findings security analyses established possesses excellent efficiency, high degree security, ability effectively withstand diverse variety statistical attacks.

Language: Английский

Citations

16

Combined image encryption and steganography technique for enhanced security using multiple chaotic maps DOI

H Aparna,

J. Madhumitha

Computers & Electrical Engineering, Journal Year: 2023, Volume and Issue: 110, P. 108824 - 108824

Published: June 20, 2023

Language: Английский

Citations

13

Color image encryption using a Zigzag Transformation and sine–cosine maps DOI Creative Commons
Fouzia Elazzaby, Khalid Sabour, Nabil El Akkad

et al.

Scientific African, Journal Year: 2023, Volume and Issue: 22, P. e01955 - e01955

Published: Nov. 1, 2023

This research endeavor is dedicated to enhancing data confidentiality in internet transmissions by strategically employing Hash functions and harnessing the advantageous attributes of chaos. These attributes, characterized inherent complexity, sensitivity initial conditions, resilience attacks, are foundational elements realm image encryption. The proposed encryption algorithm firmly adheres principles confusion diffusion, thereby constructing a secure framework. Within permutation phase algorithm, meticulously crafted scrambling technique takes center stage. adeptly disperses adjacent pixels within an across red, green, blue channels through both horizontal vertical zigzag transformations. intricate process significantly elevates level intricacy unpredictability procedure, bolstering security measures. To further fortify security, substitution stage integrates two one-dimensional chaotic systems, specifically 1-DSP 1-DCP. systems serve as mechanisms introduce subtle alterations original image, affecting all encrypted image. extent these hinges on values three least significant bits (LSB) each pixel. incorporation this dual system approach introduces additional layer complexity into methodology. effectiveness subjected rigorous evaluation comprehensive analysis. analysis encompasses array performance metrics, including NPCR (Normalized Pixel Change Rate), UACI (Unified Average Changing Intensity), correlation coefficient, histogram analysis, key metrics collectively assess viability feasibility suggested approach, functioning litmus test for system's efficiency. results underscore robust superior method, positioning it favorably when compared various advanced algorithms.

Language: Английский

Citations

11

A two-dimensional chaotic model and its application in image encryption DOI Creative Commons

Rongqing Lei,

Lingfeng Liu

Physica Scripta, Journal Year: 2024, Volume and Issue: 99(7), P. 075202 - 075202

Published: May 22, 2024

Abstract In this paper, we propose a rule that follows time-varying delay construction method and construct scheme based on it. This is also combined with polynomial to obtain novel two-dimensional chaotic model. Both mathematical analysis experimental results show the model satisfies chaos condition. Good have been achieved in complexity analysis, information entropy Auto-correlation certain competitiveness. The obtained applied image encryption algorithm. algorithm has high security can effectively resist noise attacks, shear differential attacks.

Language: Английский

Citations

4

Image Encryption Algorithm Based on Hybrid Chaotic System and Three-Dimensional Model DOI
Xiaoqiang Zhang, Pengfei Chen, Xueheng Zhang

et al.

Published: Jan. 1, 2025

Language: Английский

Citations

0