当前位置: X-MOL 学术J. Inf. Secur. Appl. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Image encryption algorithm based on the finite fields in chaotic maps
Journal of Information Security and Applications ( IF 3.8 ) Pub Date : 2020-06-16 , DOI: 10.1016/j.jisa.2020.102553
Ali Broumandnia

With the advancement of computer and communication technologies in data processing, storage, and increasing bandwidth of data transmission, the amount of multimedia data generation and sharing has increased exponentially. Therefore, the security of multimedia data becomes more important in transmission, processing, and storing the day-to-day. Cryptography is one of the important mechanisms in preserving the confidentiality, integrity, and availability of multimedia data such as images. In this research, a digital encryption method is presented based on Galois fields, consisting of two main stages of diffusion and permutation. At the Diffusion stage, using matrix multiplication operations in the GF (256), the overlapping rows and columns of image pixels are mixing. The permutation stage changes image pixels position by using The 2D chaotic map in GF (2n) or The 3D chaotic map in the GF field (2k). The proposed method, with a maximum of two rounds repetition of the main steps, reaches the optimal values of the parameters of the performance evaluation. By performing standard security tests, the proposed method is resistant to differential and statistical attacks and has yielded relatively good performance compared to similar digital image encryption methods.



中文翻译:

基于混沌映射中有限域的图像加密算法

随着计算机和通信技术在数据处理,存储和数据传输带宽方面的进步,多媒体数据生成和共享的数量呈指数增长。因此,多媒体数据的安全性在日常传输,处理和存储中变得更加重要。密码术是保护多媒体数据(例如图像)的机密性,完整性和可用性的重要机制之一。在这项研究中,提出了一种基于Galois场的数字加密方法,该方法包括扩散和置换两个主要阶段。在扩散阶段,使用GF(256)中的矩阵乘法运算,图像像素的重叠行和列被混合。n)或GF字段(2 k)中的3D混沌图。所提出的方法最多重复两轮主要步骤,从而达到性能评估参数的最佳值。通过执行标准的安全测试,与类似的数字图像加密方法相比,该方法可抵抗差异和统计攻击,并具有相对较好的性能。

更新日期:2020-06-16
down
wechat
bug