Research on computer 3D image encryption processing based on the nonlinear algorithm

This article uses the nonlinear digital chaos theory algorithm to generate the corresponding encryption system initial parameters, by analysing the correlation degree of image elements from the angles of horizontal, vertical, and diagonal direction, in order to study computer three-dimensional (3D)...

Celý popis

Uložené v:
Podrobná bibliografia
Vydané v:Nonlinear engineering Ročník 11; číslo 1; s. 664 - 671
Hlavní autori: Bian, Longlong, Chen, Jianwei, Soni, Mukesh, Bhola, Jyoti, Kumar, Harish, Jawarneh, Malik
Médium: Journal Article
Jazyk:English
Vydavateľské údaje: Berlin De Gruyter 01.01.2022
Walter de Gruyter GmbH
Predmet:
ISSN:2192-8029, 2192-8010, 2192-8029
On-line prístup:Získať plný text
Tagy: Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
Popis
Shrnutí:This article uses the nonlinear digital chaos theory algorithm to generate the corresponding encryption system initial parameters, by analysing the correlation degree of image elements from the angles of horizontal, vertical, and diagonal direction, in order to study computer three-dimensional (3D) image encryption processing. The correlation degree of the cypher text obtained by the nonlinear algorithm is weak in the image's adjacent pixels, and the adjacent pixels are not related at all, horizontal angle: 0.915989, vertical angle: 0.968184, diagonal angle: 0.913533. The nonlinear algorithm distributes the image's statistical features into the random cypher text. By applying permutations and replacements in 3D space, the proposed approach improves performance parameters and widens key space in comparison to previous image cryptography investigations. The important qualities of such a secure system are its simplicity and efficacy. Simulations and analysis show that the proposed method can produce a large key space while also surviving standard cipher attacks. Because of its powerful cryptographic properties, it is suited for image applications. The nonlinear algorithm has very high sensitivity to the secret key and plaintext, as well as better statistical performance, higher security, and higher efficiency in the operation of the algorithm.
Bibliografia:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ISSN:2192-8029
2192-8010
2192-8029
DOI:10.1515/nleng-2022-0232