In this paper, techniques to improve the overall efficiency of an image encoding algorithm that is specifically designed to be used in Wireless Sensor Networks (WSN) are proposed. The inherent nature of WSN, which con...
详细信息
ISBN:
(纸本)9781728188768
In this paper, techniques to improve the overall efficiency of an image encoding algorithm that is specifically designed to be used in Wireless Sensor Networks (WSN) are proposed. The inherent nature of WSN, which contains numerous network nodes each having its computational resources, makes the algorithm is being underutilized due to its sequential nature and hence there is a scope to improve speedup by applying the concepts of parallelization on it. The other avenues which are pertinent to the task are the usage of GPU for computation of large arrays as well as the concept of cluster computing to run the algorithm on a cluster of nodes. Another point of importance for such an algorithm is the utilization of memory and how to make its usage more efficient. Hence, the concept of pre-allocation is also applied to the algorithm to make it run faster. An in-depth study of the algorithm is conducted by considering various parameters such as the size and complexity of the key, histogram analysis, correlation values, etc.
imageencryption can effectively prevent unauthorized users from stealing personal information. Attackers usually analyze the information of the encrypted image according to the strong correlation between image pixels...
详细信息
imageencryption can effectively prevent unauthorized users from stealing personal information. Attackers usually analyze the information of the encrypted image according to the strong correlation between image pixels and use it as the breakthrough point of the image encryption algorithm. How to destroy the strong correlation of pixels is a hot topic of current research. In this paper, we propose a novel and simple encryption scheme that is no less effective than other algorithms, called Joseph shift encryption (JSE). To enhance the effectiveness of imageencryption, we propose the static Joseph shift encryption (S-JSE) and the dynamic Joseph shift encryption (D-JSE) algorithms. S-JSE can decrease the dimension of the image and shift with the generated Joseph sequence group, then the encrypted image can be generated. D-JSE can increase the number of iterations on the basis of S-JSE, and the Joseph sequence of each iteration is different. Furthermore, the encrypted sequence is scrambled according to the Joseph mapping table and upgraded the dimension to complete the encryption. We analyze the effectiveness of the proposed S-JSE including the impact of the key selection on the effect of imageencryption, and the encryption security. Thereafter, we utilize the proposed D-JSE to improve the security of grayscale and color image and verify the effectiveness of the proposed algorithm by extensive and comprehensive experiments in terms of correctness verification, histogram equalization and information entropy, adjacent pixel correlation, plaintext sensitivity, key sensitivity, encrypted image anti-interference, key space, encryption time and defense against special image attacks
To reduce the bandwidth and storage resources of image information in communication transmission, and improve the secure communication of information. In this paper, an image compression and encryptionalgorithm based...
详细信息
To reduce the bandwidth and storage resources of image information in communication transmission, and improve the secure communication of information. In this paper, an image compression and encryptionalgorithm based on fractional-order memristive hyperchaotic system and BP neural network is proposed. In this algorithm, the image pixel values are compressed by BP neural network, the chaotic sequences of the fractional-order memristive hyperchaotic system are used to diffuse the pixel values. The experimental simulation results indicate that the proposed algorithm not only can effectively compress and encrypt image, but also have better security features. Therefore, this work provides theoretical guidance and experimental basis for the safe transmission and storage of image information in practical communication.
In order to improve the problems of security and robustness for existing image encryption algorithms and to reduce the security risks of encryptionalgorithms against statistical analysis, differential attacks, exhaus...
详细信息
In order to improve the problems of security and robustness for existing image encryption algorithms and to reduce the security risks of encryptionalgorithms against statistical analysis, differential attacks, exhaustive attacks, cropping and noise attacks etc., a novel image encryption algorithm based on image hashing, improved chaotic mapping and DNA coding is proposed. Firstly, extracting the image features and evenly block after pre-processing the original image and fingerprint image. Secondly, the features are generated to be a binary hash sequence through the image hash algorithm, and the generated hash sequence is iterated as the initial parameter of the improved chaotic map and Chen's chaotic system. Finally, Chen's chaotic system is used to generate a random sequence, and the matrix generated by the improved chaotic map and the original image is subjected to DNA calculation and encoding operations to obtain an encrypted image. Experimental results show that the proposed algorithm has better performance on security, larger key space and higher key sensitivity, the pixel correlation coefficient close to 0, the information entropy close to 8, unified average changing intensity and number of pixels change rate values are close to ideal values, and it has better robustness on noise and cropping attacks.
Chaotic mapping has been widely used in imageencryption given the unpredictability, ergodicity, and sensitivity of parameters and initial values and the high correspondence with cryptography. The logistic map has the...
详细信息
Chaotic mapping has been widely used in imageencryption given the unpredictability, ergodicity, and sensitivity of parameters and initial values and the high correspondence with cryptography. The logistic map has the disadvantages of uneven distribution, low security, and small parameter space. In order to overcome these disadvantages, in this article, a new chaotic map based on a real-time variable logistic map with a randomly selected decimal is proposed. Furthermore, this chaotic mapping is applied to imageencryption. Several simulation experiments show that the new encryptionalgorithm can obtain a safely encrypted image at a minimal time complexity.
In this paper, a novel image encryption algorithm is presented based on self-cited pixel summation. With the classical mechanism of permutation plus diffusion, a pixel summation of the plain image is employed to make ...
详细信息
In this paper, a novel image encryption algorithm is presented based on self-cited pixel summation. With the classical mechanism of permutation plus diffusion, a pixel summation of the plain image is employed to make a gravity influence on the pixel positions in the permutation stage. Then, for each pixel in every step of the diffusion stage, the pixel summation calculated from the permuted image is updated. The values from a chaotic sequence generated by an intertwining logistic map are selected by this summation. Consequently, the keystreams generated in both stages are dependent on both the plain image and the permuted image. Because of the sensitivity of the chaotic map to its initial conditions and the plain-imagedependent keystreams, any tiny change in the secret key or the plain image would lead to a significantly different cipher image. As a result, the proposed encryptionalgorithm is immune to the known plaintext attack(KPA) and the chosen plaintext attack(CPA). Moreover, experimental simulations and security analyses show that the proposed permutationdiffusion encryption scheme can achieve a satisfactory level of security.
This paper is a cryptanalysis of a recent proposed image encryption algorithm based on chaotic functions. The cryptosystem is composed of two-stage permutation and one-stage substitution for encryption of the gray sca...
详细信息
This paper is a cryptanalysis of a recent proposed image encryption algorithm based on chaotic functions. The cryptosystem is composed of two-stage permutation and one-stage substitution for encryption of the gray scale plain-image. However, by applying chosen plaintext attack which is described in this paper, we show that all the secret parameters can be revealed. In addition, some other security defects of the cryptosystem are also highlighted. Both mathematical analysis and experimental results confirm the feasibility of this attack. As a result, the cryptosystem in this structure cannot be recommended when we need a higher level of security. (C) 2016 Elsevier GmbH. All rights reserved.
At present, the image encryption algorithm based on the bit-plane has the problem that the encryption speed and the encryption effect cannot be well balanced. To address the problem, an image layered scrambling encryp...
详细信息
At present, the image encryption algorithm based on the bit-plane has the problem that the encryption speed and the encryption effect cannot be well balanced. To address the problem, an image layered scrambling encryptionalgorithm is proposed in this paper. First, a new one-dimensional Cosine Logistic compound chaotic map (1DCLC) is proposed. Several characteristics of the new chaotic map are analyzed by using various measures, such as bifurcation diagram, Lyapunov exponent, sample entropy etc. And the results show that the novel chaotic map has a better chaotic performance. Second, based on the chaotic map, an image encryption algorithm is proposed. The algorithm first performs an XOR encryption operation on the image. Second, the layered scrambling is applied to the XOR encrypted image. Then the layered and scrambled image is recombined for the second XOR encryption operation. In particular, in the layered scrambling, not only can the position of the pixel be changed but also the value of the pixel can be modified, which improves the security of the algorithm. In addition, in order to defend against various plaintext attacks and increase the security of the overall algorithm, the Hash function is introduced to update the key of the proposed algorithm. Finally, the original algorithm is improved and the improved algorithm's ability to resist differential attacks is analyzed. The experimental simulation and security test results show that the proposed encryptionalgorithm has a comparable encryption effect and a faster encryption speed.
To explore the application of improved variational iterative method in solving fractional differential equations and the effect of DNA coding algorithm based on logistic chaos mapping in imageencryption, combining Ch...
详细信息
To explore the application of improved variational iterative method in solving fractional differential equations and the effect of DNA coding algorithm based on logistic chaos mapping in imageencryption, combining Chebyshev polynomial with variational iterative method, a new algorithm for solving fractional differential equations is proposed. In order to solve the initial value problem, the simulation software is used to compare the approximate solution after the change of values of a and k in the solution process to investigate the influence of different parameters on the accuracy of fractional order system. Subsequently, the logistic chaos sequence is used to generate discrete binary sequences, and an image encryption algorithm based on DNA coding is proposed. In order to verify the encryption performance of the proposed algorithm, Matlab simulation software is used to simulate and verify the imageencryption processing. The results show that when a approaches 1, the solution is closer to the exact solution than that when a approaches 0.5, 0.7, and 0.9;compared with 1, 3, 5, and 7, the constructed algorithm has the highest accuracy when k value is 9. The simulation results of the fuzzy partial fractional order system show that the chaotic sequence is sensitive to the initial value, and the logistic mapping sequence is suitable for the information encryption of the secure communication system. The simulation results of the image encryption algorithm based on DNA coding show that the algorithm can effectively encrypt the image, and the image histogram after encryption is approximately a horizontal line;slight changes in the initial value will affect the decryption effect of the image;the correlation analysis results show that there is no correlation between adjacent pixels in the image after encryption, which indicates that combining Chebyshev polynomials with variational iteration method can reduce the computational burden and improve the computational accuracy, a
In this paper, we construct a quantum logistic-tent map and extend it to the fractional order. Using bifurcation portrait, Lyapunov exponent spectrum, and spectral entropy, its nonlinear characteristics are investigat...
详细信息
In this paper, we construct a quantum logistic-tent map and extend it to the fractional order. Using bifurcation portrait, Lyapunov exponent spectrum, and spectral entropy, its nonlinear characteristics are investigated. The analysis results illustrate that this fractional map possesses higher nonlinearity and is better suited for imageencryption. Thus, the fractional quantum logistic-tent map as well as compressed sensing (CS) are utilized to create an image cryptosystem. The measurement matrix of CS is generated by this fractional map. Moreover, the map is also used for confusion and diffusion. In this encryptionalgorithm, the plaintext image is first sparsely represented with discrete wavelet transform (DWT). We then segment and reassemble the sparse image, and apply Arnold map to confuse the reassembled image. Next, a partial Hadamard matrix samples the image, and the pixel value is quantified with limited accuracy. Finally, the pixels of the image are diffused by two-way diffusion. This scheme integrates sparsity, block exchange, confusion, measurement acquisition, and diffusion. The simulation experiment finds that this imageencryption approach possesses good security and compression performance.
暂无评论