Research on computer 3D image encryption processing based on the nonlinear algorithm

This article uses the nonlinear digital chaos theory algorithm to generate the corresponding encryption system initial parameters, by analysing the correlation degree of image elements from the angles of horizontal, vertical, and diagonal direction, in order to study computer three-dimensional (3D)...

Full description

Saved in:
Bibliographic Details
Published in:Nonlinear engineering Vol. 11; no. 1; pp. 664 - 671
Main Authors: Bian, Longlong, Chen, Jianwei, Soni, Mukesh, Bhola, Jyoti, Kumar, Harish, Jawarneh, Malik
Format: Journal Article
Language:English
Published: Berlin De Gruyter 01.01.2022
Walter de Gruyter GmbH
Subjects:
ISSN:2192-8029, 2192-8010, 2192-8029
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:This article uses the nonlinear digital chaos theory algorithm to generate the corresponding encryption system initial parameters, by analysing the correlation degree of image elements from the angles of horizontal, vertical, and diagonal direction, in order to study computer three-dimensional (3D) image encryption processing. The correlation degree of the cypher text obtained by the nonlinear algorithm is weak in the image's adjacent pixels, and the adjacent pixels are not related at all, horizontal angle: 0.915989, vertical angle: 0.968184, diagonal angle: 0.913533. The nonlinear algorithm distributes the image's statistical features into the random cypher text. By applying permutations and replacements in 3D space, the proposed approach improves performance parameters and widens key space in comparison to previous image cryptography investigations. The important qualities of such a secure system are its simplicity and efficacy. Simulations and analysis show that the proposed method can produce a large key space while also surviving standard cipher attacks. Because of its powerful cryptographic properties, it is suited for image applications. The nonlinear algorithm has very high sensitivity to the secret key and plaintext, as well as better statistical performance, higher security, and higher efficiency in the operation of the algorithm.
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ISSN:2192-8029
2192-8010
2192-8029
DOI:10.1515/nleng-2022-0232