当前位置: X-MOL 学术J. Electron. Imaging › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Efficient chaos-based image encryption approach for secure communication
Journal of Electronic Imaging ( IF 1.1 ) Pub Date : 2021-04-01 , DOI: 10.1117/1.jei.30.2.023026
Gokhan Atali 1 , Eyup Sonmez 1
Affiliation  

Recently, data hiding and encryption methods have been very important for transmitting information to the relevant people correctly and reliably. Although each newly developed computer-aided data hiding and encryption method is stronger than previous methods, there may be security gaps or speed factors in future use. Therefore, faster and more secure encryption methods are needed. Chaotic systems can be used for high-performance random number generators because their frequency spectrum is wide. Moreover, they show extreme sensitivity to the initial conditions and eliminate the need for large sized keying. This means that a faster and more secure encryption can be made with random numbers generated from a chaotic system. All of these features make chaotic systems stand out in data hiding and encryption applications. Chaos-based image encryption and decryption applications were performed differently than in traditional encryption algorithms in the literature. For the application, a three-dimensional chaotic system was discretized by the Runge–Kutta-4 method, and random numbers were generated. These random numbers were tested by the statistical NIST-800-22 tests, the international top random standard, and their suitability was determined. With the random numbers that passed the tests successfully, the image was successfully encrypted and sent via e-mail; then the encrypted image was decrypted back to the original image by the receiver. Finally, an electronic circuit realization of the chaotic encryption approach was depicted using LabVIEW to confirm the operability of the application.

中文翻译:

高效的基于混沌的图像加密方法,用于安全通信

最近,数据隐藏和加密方法对于将信息正确可靠地传输给相关人员非常重要。尽管每种新开发的计算机辅助数据隐藏和加密方法都比以前的方法要强,但是在将来的使用中可能存在安全漏洞或速度因素。因此,需要更快,更安全的加密方法。混沌系统可用于高性能随机数发生器,因为它们的频谱很宽。而且,它们对初始条件表现出极高的敏感性,并且不需要大型按键。这意味着可以使用从混沌系统生成的随机数进行更快,更安全的加密。所有这些功能使混沌系统在数据隐藏和加密应用程序中脱颖而出。与文献中传统的加密算法不同,基于混沌的图像加密和解密应用程序的执行方式有所不同。对于该应用,通过Runge–Kutta-4方法离散了三维混沌系统,并生成了随机数。这些随机数已通过统计性NIST-800-22测试(国际最高随机标准)进行了测试,并确定了其适用性。借助成功通过测试的随机数,图像已成功加密并通过电子邮件发送;然后接收者将加密的图像解密回原始图像。最后,使用LabVIEW描述了混沌加密方法的电子电路实现,以确认应用程序的可操作性。
更新日期:2021-04-29
down
wechat
bug