due to the unpredictability and complexity properties, chaotic maps are widely applied in security, communication, and system control. Existing one-dimensional (1d) chaotic maps can be easily predicted and high-dimens...
详细信息
due to the unpredictability and complexity properties, chaotic maps are widely applied in security, communication, and system control. Existing one-dimensional (1d) chaotic maps can be easily predicted and high-dimensional (Hd) ones have more complex structures and higher computation costs. In order to enhance the chaotic performance, this paper proposes a new two-dimensional infinitecollapsemap (2d-ICM). Compared with existing 2d chaotic maps, 2d-ICM has better ergodicity, hyperchaotic property, unpredictability, and a wider chaotic region. To investigate its application, we further propose an image encryption algorithm using 2d-ICM. Simulation demonstrates that the proposed image encryption algorithm has excellent performance for protecting various kinds of images. (C) 2020 Elsevier B.V. All rights reserved.
By combining semi-tensor product compressed sensing (STP-CS) anddouble random-phase encoding (dRPE) technology, this paper proposes an optical image encryption scheme with information authentication ability. Firstly,...
详细信息
By combining semi-tensor product compressed sensing (STP-CS) anddouble random-phase encoding (dRPE) technology, this paper proposes an optical image encryption scheme with information authentication ability. Firstly, the phase information of the plaintext image is extracted by dRPE and quantized to generate the authentication information. Secondly, to compress the storage space and to realize the multiplication of different dimensional matrices, STP-CS is used to compress the plaintext image, and then the measurements are quantized by sigmoidmap, and the quantized measurements are embedded into the authentication message. Finally, a random key stream is generated using a 2d infinite collapse map (2d-ICM) to generate chaotic sequences, and the embedding result is used to generate a ciphertext image by the permutation and XOR diffusion method. The receiver side can perform blind authentication of the ciphertext image during the inverse operation using a nonlinear cross-correlation method. The evaluation results indicate that our encryption scheme is more secure and effective.
due to the increasing capabilities of cybercriminals and the vast quantity of sensitive data, it is necessary to protect remote sensing images during data transmission with "Belt and Road" countries. Joint i...
详细信息
due to the increasing capabilities of cybercriminals and the vast quantity of sensitive data, it is necessary to protect remote sensing images during data transmission with "Belt and Road" countries. Joint image compression and encryption techniques exhibit reliability and cost-effectiveness for data transmission. However, the existing methods for multiband remote sensing images have limitations, such as extensive preprocessing times, incompatibility with multiple bands, and insufficient security. To address the aforementioned issues, we propose a joint encryption and compression algorithm (JECA) for multiband remote sensing images, including a preprocessing encryption stage, crypto-compression stage, anddecoding stage. In the first stage, multiple bands from an input image can be spliced together in order from left to right to generate a grayscale image, which is then scrambled at the block level by a chaotic system. In the second stage, we encrypt the dC coefficient and AC coefficient. In the final stage, we first decrypt the dC coefficient and AC coefficient, and then restore the out-of-order block through the chaotic system to get the correct grayscale image. Finally, we postprocess the grayscale image and reconstruct it into a remote sensing image. The experimental results show that JECA can reduce the preprocessing time of the sender by 50% compared to existing joint encryption and compression methods. It is also compatible with multiband remote sensing images. Furthermore, JECA improves security while maintaining the same compression ratio as existing methods, especially in terms of visual security and key sensitivity.
暂无评论