This article proposes a secure communication enhancement scheme based on face detection and chaotic partition permutation. The scheme uses edge detection technology to detect facial information, which is then used as an encryption object. The hash value of the plaintext image is extracted as the secret key to the chaotic sequence generated by the chaotic system.
View Article and Find Full Text PDFSurface roughness is a crucial factor that affects the flotation performance of minerals. In this study, the effect of sulfuric acid corrosion on the surface roughness of calcite flotation was investigated through microflotation tests, scanning electron microscopy (SEM-EDS), atomic force microscopy (AFM), Fourier transform infrared (FT-IR) spectroscopy, and contact angle analysis. Microflotation test results show that sulfuric acid treatment has a serious negative effect on the floatability of calcite.
View Article and Find Full Text PDFBit is the most basic unit of a digital image in the spatial domain, and bit-level encryption is regarded as an important technical means for digital image privacy protection. To address the vulnerability of image privacy protection to cryptographic attacks, in this paper, a bit-level image privacy protection scheme using Zigzag and chain-diffusion is proposed. The scheme uses a combination of Zigzag interleaving scrambling with chaotic sequences and chain-diffusion method images are encrypted at each bit level, while using non-sequential encryption to achieve efficient and secure encryption.
View Article and Find Full Text PDFAiming at the problem of insufficient security of image encryption technology, a secure image encryption algorithm using chaos-based block permutation and weighted bit planes chain diffusion is proposed, which is based on a variant structure of classical permutation-diffusion. During the permutation phase, the encryption operations of dividing an image into sub-block, block scrambling, block rotation and block inversion, negative-positive transformation, color component shuffling are performed sequentially with chaotic sequences of plaintext association. In the chain diffusion stage, different encryption strategies are adopted for the high and low 4-bit planes according to the weight of image information.
View Article and Find Full Text PDFThis paper proposes a video security transmission enhancement algorithm based on block permutation and dynamic multiplexing sequences encryption based on 4D autonomous hyperchaotic system. Firstly, we employ the block permutation encryption and diffusion confusion encryption module, which is based on dynamic multiplexing chaotic sequences, to encrypt the plaintext and obtain the ciphertext. Subsequently, the hash value of this round's ciphertext is utilized to generate the chaotic key, produced by the multiplexing sequence of this round after mathematical processing.
View Article and Find Full Text PDFIn order to further improve the information effectiveness of digital image transmission, an image-encryption algorithm based on 2D-Logistic-adjusted-Sine map (2D-LASM) and Discrete Wavelet Transform (DWT) is proposed. First, a dynamic key with plaintext correlation is generated using Message-Digest Algorithm 5 (MD5), and 2D-LASM chaos is generated based on the key to obtain a chaotic pseudo-random sequence. Secondly, we perform DWT on the plaintext image to map the image from the time domain to the frequency domain and decompose the low-frequency (LF) coefficient and high-frequency (HF) coefficient.
View Article and Find Full Text PDFWith the arrival of the age of big data, the amount and types of data in the process of information transmission have increased significantly, and the full-disk encryption mode used by traditional encryption algorithms has certain limitations of the times. In order to further improve the bandwidth efficiency of digital images in the transmission process and the information effectiveness of digital image transmission, this paper proposes an algorithm of high-quality restoration image encryption using DCT frequency-domain compression coding and chaos. Firstly, the image hash value is used for the generation of an encryption key with plaintext correlation, then lightweight chaos is generated based on the key to obtain a pseudo-random sequence.
View Article and Find Full Text PDFA chaotic ribonucleic acid (RNA) and deoxyribonucleic acid (DNA) encryption scheme is firstly proposed for security OFDM-WDM-PON in this paper. We adopt a dynamic key agreement based on the messenger RNA (mRNA) codebook to distribute the key, and the security and randomness of this key are enhanced by a pre-sharing key parameter set instead of transmission of a key directly. Also, the security key can be dynamically updated in real-time according to the needs of the users.
View Article and Find Full Text PDFIn the current network and big data environment, the secure transmission of digital images is facing huge challenges. The use of some methodologies in artificial intelligence to enhance its security is extremely cutting-edge and also a development trend. To this end, this paper proposes a security-enhanced image communication scheme based on cellular neural network (CNN) under cryptanalysis.
View Article and Find Full Text PDFIn this paper, we propose chaotic compressive sensing (CS) encryption algorithms for orthogonal frequency division multiplexing passive optical network (OFDM-PON), aiming at compressing the transmitted data and enhancing the security of data transmission. Bitstream transmission using CS directly is restricted due to its inability to satisfy the sparsity in neither time nor frequency domain. While the sparsity of the transmitted data can be constructed when transmitting the multimedia.
View Article and Find Full Text PDFEntropy (Basel)
March 2019
Recently, an image encryption algorithm based on DNA encoding and spatiotemporal chaos (IEA-DESC) was proposed. In IEA-DESC, pixel diffusion, DNA encoding, DNA-base permutation and DNA decoding are performed successively to generate cipher-images from the plain-images. Some security analyses and simulation results are given to prove that it can withstand various common attacks.
View Article and Find Full Text PDF