A fast image encryption algorithm with variable key space

The security of images is of great importance given the current development of Internet technology. The existing encryption algorithms have some defects, such as the key space is not large enough and the encryption speed is slow. A fast image encryption algorithm with variable key space is proposed....

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:Multimedia tools and applications Ročník 83; číslo 12; s. 35427 - 35447
Hlavní autoři: Xiyu, Sun, Zhong, Chen
Médium: Journal Article
Jazyk:angličtina
Vydáno: New York Springer US 01.04.2024
Springer Nature B.V
Témata:
ISSN:1573-7721, 1380-7501, 1573-7721
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Popis
Shrnutí:The security of images is of great importance given the current development of Internet technology. The existing encryption algorithms have some defects, such as the key space is not large enough and the encryption speed is slow. A fast image encryption algorithm with variable key space is proposed. The algorithm key space is dynamically changeable and the variable key space is associated with the initial condition of Hénon map, making this cryptosystem extremely sensitive to the key. The overall algorithm uses a permutation-diffusion-permutation-diffusion encryption structure. The first permutation process is implemented by cross-sampling and the first diffusion is implemented by modal operation. The second permutation is implemented using the chaotic sequence approach and the second diffusion is implemented using the XOR operation. The designed permutation and diffusion operations are executed with high efficiency, and the two different diffusion operations make the encryption process with nonlinear mapping capability, making the algorithm effective against existing typical differential attack schemes. Experiments show that the algorithm has a dynamically adjustable key space, high efficiency of algorithm encryption, good robustness, and effective resistance to statistical attack analysis and differential attack analysis.
Bibliografie:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ISSN:1573-7721
1380-7501
1573-7721
DOI:10.1007/s11042-023-16981-8