In order to further improve the information effectiveness of digital image transmission, an image-encryption algorithm based on 2D-Logistic-adjusted-Sine map (2D-LASM) and Discrete Wavelet Transform (DWT) is proposed. First, a dynamic key with plaintext correlation is generated using Message-Digest Algorithm 5 (MD5), and 2D-LASM chaos is generated based on the key to obtain a chaotic pseudo-random sequence. Secondly, we perform DWT on the plaintext image to map the image from the time domain to the frequency domain and decompose the low-frequency (LF) coefficient and high-frequency (HF) coefficient. Then, the chaotic sequence is used to encrypt the LF coefficient with the structure of "confusion-permutation". We perform the permutation operation on HF coefficient, and we reconstruct the image of the processed LF coefficient and HF coefficient to obtain the frequency-domain ciphertext image. Finally, the ciphertext is dynamically diffused using the chaotic sequence to obtain the final ciphertext. Theoretical analysis and simulation experiments show that the algorithm has a large key space and can effectively resist various attacks. Compared with the spatial-domain algorithms, this algorithm has great advantages in terms of computational complexity, security performance, and encryption efficiency. At the same time, it provides better concealment of the encrypted image while ensuring the encryption efficiency compared to existing frequency-domain methods. The successful implementation on the embedded device in the optical network environment verifies the experimental feasibility of this algorithm in the new network application.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC9600562PMC
http://dx.doi.org/10.3390/e24101332DOI Listing

Publication Analysis

Top Keywords

chaotic sequence
8
encryption efficiency
8
image
7
coefficient
6
algorithm
5
design embedded
4
embedded implementation
4
implementation secure
4
secure image
4
image encryption
4

Similar Publications

Multiple image encryption algorithm using channel randomization and multiple chaotic maps.

Sci Rep

December 2024

Department of Computer Science, Faculty of Computers and Information, Suez University, P.O. Box 43221, Suez, Egypt.

Developing robust and secure image encryption methods for transmitting multiple images in batches over unprotected networks has become imperative. This necessity arises from the limitations of single-image encryption techniques in managing the escalating volume of extensive data. This paper introduces a novel three-layer multiple-image encryption (MIE) technique to encrypt batch images based on three 2D-chaotic maps.

View Article and Find Full Text PDF

Cluster synchronization of fractional-order two-layer networks and application in image encryption/decryption.

Neural Netw

December 2024

College of Mathematics and System Sciences, Xinjiang University, Urumqi 830017, China; Xinjiang Key Laboratory of Applied Mathematics, Urumqi, 830017, China. Electronic address:

In this paper, a type of fractional-order two-layer network model is constructed, wherein each layer in the network exhibits distinct topology. Subsequently, the cluster synchronization problem of fractional-order two-layer networks is investigated through a two-step approach. The initial step involves the implementation of finite-time cluster synchronization in the first layer by utilizing a fractional-order finite-time convergence lemma.

View Article and Find Full Text PDF

In this Letter, an integrated deceptive sensing and secure communication scheme based on random subcarrier (RSC) orthogonal frequency-division multiplexing (OFDM) in a photonics-assisted millimeter-wave (MMW) system is proposed. Based on chaotic encryption on bit and constellation level, the RSC-OFDM signal is used to further disturb the transmitting signal and achieve sensing deception. Moreover, to make full use of sensing function to achieve collaborative security, sensing-aided dynamic parameter (DP) encryption is designed, which uses sensing information as the random seed to get encryption DPs and sequences.

View Article and Find Full Text PDF

PhyIN: trimming alignments by phylogenetic incompatibilities among neighbouring sites.

PeerJ

December 2024

Beaty Biodiversity Museum and Departments of Zoology and Botany, University of British Columbia, Vancouver, British Columbia, Canada.

In phylogenomics, regions of low alignment reliability and high noise are typically trimmed from multiple sequence alignments before they are used in phylogenetic inference. I introduce a new trimming tool, PhyIN, which deletes regions in which a large proportion of sites (characters) have conflicting phylogenetic signal. It does not require inference of a phylogenetic tree, as it finds neighbouring characters that cannot agree on any possible tree.

View Article and Find Full Text PDF

This study estimates the performance of a piezoelectric energy harvester (PEH) with rotatable external magnets from the viewpoint of global dynamics. According to static analysis of the PEH dynamic system, the monostable and bistable potential wells are configured under different values of the inclined angle of the external magnets. In the monostable case, the method of multiple scales is applied for the analysis of periodic responses, while the extended averaging method and the Melnikov method are utilized to analyze the periodic and chaotic responses in the bistable case.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!