当前位置: X-MOL 学术Multimed. Tools Appl. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Image segmentation encryption algorithm with chaotic sequence generation participated by cipher and multi-feedback loops
Multimedia Tools and Applications ( IF 3.6 ) Pub Date : 2021-01-18 , DOI: 10.1007/s11042-020-10429-z
Jie Deng , Minjun Zhou , Chunhua Wang , Sicheng Wang , Cong Xu

The existing chaotic image encryption algorithms have common defects: (i) ciphertext does not participate in the generation processes of chaotic pseudo-random sequences and key sequences; (ii) the entire encryption process does not have a closed-loop structure. In order to solve above problems, in this paper, an image segmentation encryption algorithm based on hyperchaotic system is proposed. We decompose the scrambled sequence into three sequences of different lengths: S1, S2 and S3. Then, the initial values of the chaotic system are updated by the sequences S2 and S3 and using the updated initial value iterates the chaotic system and generates the key sequence K3, and the sequence S1 is encrypted by the sequence K3 to obtain the cipher sequence C1, using the sequences C1 and S3 updates the initial value of the chaotic system, and using the updated initial value iterates the chaotic system and generates the key sequence K4, and using the sequence K4 encrypts the sequence S2 to obtain the cipher sequence C2. Thus, ciphertext participates in the generation processes of chaotic pseudo-random sequences and key sequences, and the entire encryption process has a closed-loop structure. The experimental results show that the encryption algorithm has high security and sensitivity.



中文翻译:

密码和多反馈循环参与的具有混沌序列生成的图像分割加密算法

现有的混沌图像加密算法具有共同的缺陷:(1)密文不参与混沌伪随机序列和密钥序列的生成过程;(ii)整个加密过程没有闭环结构。为了解决上述问题,本文提出了一种基于超混沌系统的图像分割加密算法。我们将加扰序列分解为三个不同长度的序列:S 1S 2S 3。然后,通过序列S 2S 3更新混沌系统的初始值。并使用更新后的初始值迭代混沌系统并生成密钥序列K 3,序列S 1被序列K 3加密以获得密码序列C 1,使用序列C 1S 3更新初始值然后,使用更新后的初始值对混沌系统进行迭代并生成密钥序列K 4,并使用序列K 4对序列S 2进行加密以获得密码序列C 2。。因此,密文参与了混沌伪随机序列和密钥序列的生成过程,整个加密过程具有闭环结构。实验结果表明,该加密算法具有较高的安全性和敏感性。

更新日期:2021-01-19
down
wechat
bug