scholarly journals Visually asymmetric image encryption algorithm based on SHA-3 and compressive sensing by embedding encrypted image

Author(s):  
Xiaoling Huang ◽  
Youxia Dong ◽  
Hongyong Zhu ◽  
Guodong Ye
2018 ◽  
Vol 148 ◽  
pp. 124-144 ◽  
Author(s):  
Xiuli Chai ◽  
Xiaoyu Zheng ◽  
Zhihua Gan ◽  
Daojun Han ◽  
Yiran Chen

Entropy ◽  
2021 ◽  
Vol 23 (9) ◽  
pp. 1159
Author(s):  
Zeming Wu ◽  
Ping Pan ◽  
Chunyang Sun ◽  
Bing Zhao

To address the problems of the high complexity and low security of the existing image encryption algorithms, this paper proposes a dynamic key chaotic image encryption algorithm with low complexity and high security associated with plaintext. Firstly, the RGB components of the color image are read, and the RGB components are normalized to obtain the key that is closely related to the plaintext, and then the Arnold transform is used to stretch and fold the RGB components of the color image to change the position of the pixel points in space, so as to destroy the correlation between the adjacent pixel points of the image. Next, the generated sequences are independently encrypted with the Arnold-transformed RGB matrix. Finally, the three encrypted images are combined to obtain the final encrypted image. Since the key acquisition of this encryption algorithm is related to the plaintext, it is possible to achieve one key per image, so the key acquisition is dynamic. This encryption algorithm introduces chaotic mapping, so that the key space size is 10180. The key acquisition is closely related to the plaintext, which makes the ciphertext more random and resistant to differential attacks, and ensures that the ciphertext is more secure after encryption. The experiments show that the algorithm can encrypt the image effectively and can resist attack on the encrypted image.


2012 ◽  
Vol 532-533 ◽  
pp. 1512-1516
Author(s):  
Gui Liang Zhu ◽  
Wei Ping Wang ◽  
Xiao Qiang Zhang

According to the idea of genetic algorithm, a new image encryption algorithm is proposed. Define each pixel of the image as a gene, each row of the image as a chromosome, the whole image as an organism. Then we design a selection operator, which based on SVD. After the operation of selection, crossover and mutation of the image, we can get the encrypted image. The simulation results show that very nice encryption effects and good robustness are obtained and the high safety of the new algorithm are analyzed.


2019 ◽  
Vol 161 ◽  
pp. 227-247 ◽  
Author(s):  
Yuling Luo ◽  
Jia Lin ◽  
Junxiu Liu ◽  
Duqu Wei ◽  
Lvchen Cao ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document