IET Image Processing,
Journal Year:
2024,
Volume and Issue:
unknown
Published: Sept. 6, 2024
Abstract
The
non‐local
imaging
characteristics
of
computational
ghost
(CGI)
make
it
widely
used
in
the
field
information
security.
However,
processing
method
based
on
traditional
CGI
has
some
problems
process
multi‐image
encryption,
such
as
low
efficiency
and
unsatisfactory
reconstruction
quality.
Therefore,
this
article
proposes
to
use
wavelet
transform
singular
value
decomposition
technology
help
efficiently
complete
coding
encryption
multiple
images,
alternating
direction
multiplier
(ADMM)
image
restoration
carry
out
high‐quality
original
encrypted
image.
results
show
that
scheme
good
effect,
strong
security
robustness
even
at
a
sampling
rate.
It
provides
reference
for
digital
watermarking
cryptography.
Mathematics,
Journal Year:
2023,
Volume and Issue:
11(11), P. 2585 - 2585
Published: June 5, 2023
Chaos
has
been
one
of
the
most
effective
cryptographic
sources
since
it
was
first
used
in
image-encryption
algorithms.
This
paper
closely
examines
development
process
chaos-based
algorithms
from
various
angles,
including
symmetric
and
asymmetric
algorithms,
block
ciphers
stream
ciphers,
integration
with
other
technologies.
The
unique
attributes
chaos,
such
as
sensitivity
to
initial
conditions,
topological
transitivity,
pseudo-randomness,
are
conducive
cross-referencing
disciplines
improving
methods.
Additionally,
this
covers
practical
application
scenarios
current
challenges
chaotic
image
encryption,
thereby
encouraging
researchers
continue
developing
complementing
existing
situations,
may
also
serve
a
basis
future
prospects
for
encryption.
Applied Sciences,
Journal Year:
2023,
Volume and Issue:
13(6), P. 4034 - 4034
Published: March 22, 2023
In
today’s
digital
age,
it
is
crucial
to
secure
the
flow
of
information
protect
data
and
from
being
hacked
during
transmission
or
storage.
To
address
this
need,
we
present
a
new
image
encryption
technique
that
combines
Kronecker
xor
product,
Hill
cipher,
sigmoid
logistic
Map.
Our
proposed
algorithm
begins
by
shifting
values
in
each
row
state
matrix
left
predetermined
number
positions,
then
encrypting
resulting
using
Cipher.
The
top
value
odd
even
column
used
perform
an
operation
with
all
corresponding
column,
excluding
value.
diffused
map
subjected
product
among
pixels
create
image.
again
other
keys
for
final
product.
We
compared
our
method
recent
work
found
be
safe
efficient
terms
performance
after
conducting
statistical
analysis,
differential
attack
brute
force
entropy
analysis.
results
demonstrate
robust,
lightweight,
fast
performance,
meets
requirements
decryption,
resistant
various
attacks.
Physica Scripta,
Journal Year:
2024,
Volume and Issue:
99(2), P. 025232 - 025232
Published: Jan. 4, 2024
Abstract
The
quick
advancement
of
multimedia
technology
has
led
to
the
widespread
utilization
digital
images
across
various
industries.
Meanwhile,
image
security
become
an
urgent
issue
in
need
resolution.
To
guarantee
as
well
fulfill
requirements
real-time
cryptosystems,
a
novel
encryption
algorithm
is
proposed
based
on
designed
improved
iterative
chaotic
map
with
infinite
collapses
(ICMIC),
Gray
code
and
semi-pixel
level
permutation
diffusion.
Firstly,
two
sequences
are
produced
using
ICMIC
then
they
used
perform
scrambling
diffusion
operations.
Secondly,
plain
encoded
we
convert
each
into
semi-pixels.
Thirdly,
scramble
vector.
Finally,
scrambled
vector
diffused
dynamic
performance
analyses
illustrate
that
possesses
robust
high
efficiency,
making
it
ideally
suited
for
application
cryptosystems.
Fractal and Fractional,
Journal Year:
2023,
Volume and Issue:
7(10), P. 734 - 734
Published: Oct. 4, 2023
The
advent
of
quantum
computers
could
enable
the
resolution
complex
computational
problems
that
conventional
cryptographic
protocols
find
challenging.
As
a
result,
formidable
computing
capabilities
may
render
all
present-day
schemes
rely
on
complexity
ineffectual.
Inspired
by
these
possibilities,
primary
purpose
this
paper
is
to
suggest
image
encryption
scheme
based
cellular
automata
with
mixed
multi-chaos
hybrid
maps
and
hyperchaotic
system
operations.
To
achieve
desirable
outcomes,
we
designed
an
involving
two
main
operations:
(1)
pixel-level
diffusion
(2)
permutation.
Initially,
secret
keys
generated
using
were
closely
tied
original
image.
During
first
phase,
establishment
correlations
among
pixels,
in
addition
three
chaotic
sequences
obtained
from
system,
was
achieved
application
quantum-state
superposition
measurement
principle,
wherein
color
information
pixel
described
single
qubit.
Therefore,
channels
plain
subjected
operations,
which
involve
Hadamard
transformation
quantum-controlled
NOT
gate,
before
each
channel
system.
Subsequently,
ternary
Toffoli
gate
used
perform
operation.
Next,
appropriate
performed
diffused
channels.
attain
confusion
blend
two-dimensional
automaton
produce
random
sequence
keys.
circular
shift
utilized
additionally
shuffle
rows
columns
components,
order
alter
positions
their
values,
significantly
contributes
permutation
process.
Lastly,
encoding
channels,
R,
G,
B,
merged
acquire
encrypted
experimental
findings
security
analyses
established
possesses
excellent
efficiency,
high
degree
security,
ability
effectively
withstand
diverse
variety
statistical
attacks.
Scientific African,
Journal Year:
2023,
Volume and Issue:
22, P. e01955 - e01955
Published: Nov. 1, 2023
This
research
endeavor
is
dedicated
to
enhancing
data
confidentiality
in
internet
transmissions
by
strategically
employing
Hash
functions
and
harnessing
the
advantageous
attributes
of
chaos.
These
attributes,
characterized
inherent
complexity,
sensitivity
initial
conditions,
resilience
attacks,
are
foundational
elements
realm
image
encryption.
The
proposed
encryption
algorithm
firmly
adheres
principles
confusion
diffusion,
thereby
constructing
a
secure
framework.
Within
permutation
phase
algorithm,
meticulously
crafted
scrambling
technique
takes
center
stage.
adeptly
disperses
adjacent
pixels
within
an
across
red,
green,
blue
channels
through
both
horizontal
vertical
zigzag
transformations.
intricate
process
significantly
elevates
level
intricacy
unpredictability
procedure,
bolstering
security
measures.
To
further
fortify
security,
substitution
stage
integrates
two
one-dimensional
chaotic
systems,
specifically
1-DSP
1-DCP.
systems
serve
as
mechanisms
introduce
subtle
alterations
original
image,
affecting
all
encrypted
image.
extent
these
hinges
on
values
three
least
significant
bits
(LSB)
each
pixel.
incorporation
this
dual
system
approach
introduces
additional
layer
complexity
into
methodology.
effectiveness
subjected
rigorous
evaluation
comprehensive
analysis.
analysis
encompasses
array
performance
metrics,
including
NPCR
(Normalized
Pixel
Change
Rate),
UACI
(Unified
Average
Changing
Intensity),
correlation
coefficient,
histogram
analysis,
key
metrics
collectively
assess
viability
feasibility
suggested
approach,
functioning
litmus
test
for
system's
efficiency.
results
underscore
robust
superior
method,
positioning
it
favorably
when
compared
various
advanced
algorithms.
Physica Scripta,
Journal Year:
2024,
Volume and Issue:
99(7), P. 075202 - 075202
Published: May 22, 2024
Abstract
In
this
paper,
we
propose
a
rule
that
follows
time-varying
delay
construction
method
and
construct
scheme
based
on
it.
This
is
also
combined
with
polynomial
to
obtain
novel
two-dimensional
chaotic
model.
Both
mathematical
analysis
experimental
results
show
the
model
satisfies
chaos
condition.
Good
have
been
achieved
in
complexity
analysis,
information
entropy
Auto-correlation
certain
competitiveness.
The
obtained
applied
image
encryption
algorithm.
algorithm
has
high
security
can
effectively
resist
noise
attacks,
shear
differential
attacks.