Plaintext-Related Dynamic Key Chaotic Image Encryption Algorithm.

Entropy (Basel)

Electronic Engineering College, Heilongjiang University, Harbin 150080, China.

Published: September 2021

To address the problems of the high complexity and low security of the existing image encryption algorithms, this paper proposes a dynamic key chaotic image encryption algorithm with low complexity and high security associated with plaintext. Firstly, the RGB components of the color image are read, and the RGB components are normalized to obtain the key that is closely related to the plaintext, and then the Arnold transform is used to stretch and fold the RGB components of the color image to change the position of the pixel points in space, so as to destroy the correlation between the adjacent pixel points of the image. Next, the generated sequences are independently encrypted with the Arnold-transformed RGB matrix. Finally, the three encrypted images are combined to obtain the final encrypted image. Since the key acquisition of this encryption algorithm is related to the plaintext, it is possible to achieve one key per image, so the key acquisition is dynamic. This encryption algorithm introduces chaotic mapping, so that the key space size is 10180. The key acquisition is closely related to the plaintext, which makes the ciphertext more random and resistant to differential attacks, and ensures that the ciphertext is more secure after encryption. The experiments show that the algorithm can encrypt the image effectively and can resist attack on the encrypted image.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC8466161PMC
http://dx.doi.org/10.3390/e23091159DOI Listing

Publication Analysis

Top Keywords

encryption algorithm
16
image encryption
12
rgb components
12
key acquisition
12
image
10
key
8
dynamic key
8
key chaotic
8
chaotic image
8
components color
8

Similar Publications

Within the framework of 6G networks, the rapid proliferation of Internet of Things (IoT) devices, coupled with their decentralized and heterogeneous characteristics, presents substantial security challenges. Conventional centralized systems face significant challenges in effectively managing the diverse range of IoT devices, and they are inadequate in addressing the requirements for reduced latency and the efficient processing and analysis of large-scale data. To tackle these challenges, this paper introduces a zero-trust access control framework that integrates blockchain technology with inner-product encryption.

View Article and Find Full Text PDF

With the proliferation of mobile terminals and the rapid growth of network applications, fine-grained traffic identification has become increasingly challenging. Methods based on machine learning and deep learning have achieved remarkable results, but they heavily rely on the distribution of training data, which makes them ineffective in handling unseen samples. In this paper, we propose AG-ZSL, a zero-shot learning framework based on traffic behavior and attribute representations for general encrypted traffic classification.

View Article and Find Full Text PDF

Images are important information carriers in our lives, and images should be secure when transmitted and stored. Image encryption algorithms based on chaos theory emerge in endlessly. Based on previous various chaotic image fast encryption algorithms, this paper proposes a color image sector fast encryption algorithm based on one-dimensional composite sinusoidal chaotic mapping.

View Article and Find Full Text PDF

Image Encryption Method Based on Three-Dimensional Chaotic Systems and V-Shaped Scrambling.

Entropy (Basel)

January 2025

School of Information Science and Engineering, Yanshan University, Qinhuangdao 066004, China.

With the increasing importance of securing images during network transmission, this paper introduces a novel image encryption algorithm that integrates a 3D chaotic system with V-shaped scrambling techniques. The proposed method begins by constructing a unique 3D chaotic system to generate chaotic sequences for encryption. These sequences determine a random starting point for V-shaped scrambling, which facilitates the transformation of image pixels into quaternary numbers.

View Article and Find Full Text PDF

Cryptanalysis of an Image Encryption Algorithm Using DNA Coding and Chaos.

Entropy (Basel)

January 2025

Electrical Engineering College, Heilongjiang University, Harbin 150080, China.

In recent years, many chaotic image encryption algorithms have been cracked by chosen plaintext attack. Therefore, the method of associating the key with the plaintext to resist the cryptanalysis has received extensive attention from designers. This paper proposes a new method of cryptanalysis for image encryption algorithms with a key associated with plaintext.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!