Research on computer 3D image encryption processing based on the nonlinear algorithm

This article uses the nonlinear digital chaos theory algorithm to generate the corresponding encryption system initial parameters, by analysing the correlation degree of image elements from the angles of horizontal, vertical, and diagonal direction, in order to study computer three-dimensional (3D)...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:Nonlinear engineering Ročník 11; číslo 1; s. 664 - 671
Hlavní autoři: Bian, Longlong, Chen, Jianwei, Soni, Mukesh, Bhola, Jyoti, Kumar, Harish, Jawarneh, Malik
Médium: Journal Article
Jazyk:angličtina
Vydáno: Berlin De Gruyter 01.01.2022
Walter de Gruyter GmbH
Témata:
ISSN:2192-8029, 2192-8010, 2192-8029
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Popis
Shrnutí:This article uses the nonlinear digital chaos theory algorithm to generate the corresponding encryption system initial parameters, by analysing the correlation degree of image elements from the angles of horizontal, vertical, and diagonal direction, in order to study computer three-dimensional (3D) image encryption processing. The correlation degree of the cypher text obtained by the nonlinear algorithm is weak in the image's adjacent pixels, and the adjacent pixels are not related at all, horizontal angle: 0.915989, vertical angle: 0.968184, diagonal angle: 0.913533. The nonlinear algorithm distributes the image's statistical features into the random cypher text. By applying permutations and replacements in 3D space, the proposed approach improves performance parameters and widens key space in comparison to previous image cryptography investigations. The important qualities of such a secure system are its simplicity and efficacy. Simulations and analysis show that the proposed method can produce a large key space while also surviving standard cipher attacks. Because of its powerful cryptographic properties, it is suited for image applications. The nonlinear algorithm has very high sensitivity to the secret key and plaintext, as well as better statistical performance, higher security, and higher efficiency in the operation of the algorithm.
Bibliografie:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ISSN:2192-8029
2192-8010
2192-8029
DOI:10.1515/nleng-2022-0232