A fast image encryption algorithm with variable key space
The security of images is of great importance given the current development of Internet technology. The existing encryption algorithms have some defects, such as the key space is not large enough and the encryption speed is slow. A fast image encryption algorithm with variable key space is proposed....
Uloženo v:
| Vydáno v: | Multimedia tools and applications Ročník 83; číslo 12; s. 35427 - 35447 |
|---|---|
| Hlavní autoři: | , |
| Médium: | Journal Article |
| Jazyk: | angličtina |
| Vydáno: |
New York
Springer US
01.04.2024
Springer Nature B.V |
| Témata: | |
| ISSN: | 1573-7721, 1380-7501, 1573-7721 |
| On-line přístup: | Získat plný text |
| Tagy: |
Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
|
| Shrnutí: | The security of images is of great importance given the current development of Internet technology. The existing encryption algorithms have some defects, such as the key space is not large enough and the encryption speed is slow. A fast image encryption algorithm with variable key space is proposed. The algorithm key space is dynamically changeable and the variable key space is associated with the initial condition of Hénon map, making this cryptosystem extremely sensitive to the key. The overall algorithm uses a permutation-diffusion-permutation-diffusion encryption structure. The first permutation process is implemented by cross-sampling and the first diffusion is implemented by modal operation. The second permutation is implemented using the chaotic sequence approach and the second diffusion is implemented using the XOR operation. The designed permutation and diffusion operations are executed with high efficiency, and the two different diffusion operations make the encryption process with nonlinear mapping capability, making the algorithm effective against existing typical differential attack schemes. Experiments show that the algorithm has a dynamically adjustable key space, high efficiency of algorithm encryption, good robustness, and effective resistance to statistical attack analysis and differential attack analysis. |
|---|---|
| Bibliografie: | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ISSN: | 1573-7721 1380-7501 1573-7721 |
| DOI: | 10.1007/s11042-023-16981-8 |