A novel image encryption algorithm based on self-adaptive wave transmission

2010 ◽  
Vol 90 (9) ◽  
pp. 2714-2722 ◽  
Author(s):  
Xiaofeng Liao ◽  
Shiyue Lai ◽  
Qing Zhou
2009 ◽  
Vol 29 (8) ◽  
pp. 2210-2212
Author(s):  
Shi-yue LAI ◽  
Xiao-feng LIAO ◽  
Qing ZHOU

2017 ◽  
Vol 11 ◽  
pp. 06002 ◽  
Author(s):  
Rui-Song Ye ◽  
Hui-Qing Huang ◽  
Yu-Cheng Li ◽  
Chang Wang ◽  
Min-Yu Liao

2011 ◽  
Vol 467-469 ◽  
pp. 231-235
Author(s):  
Hong Ye Zhang

An image encryption algorithm based on self-adaptive and chaos theory is presented. The scrambling transformation is completed with Logistic chaos and S-box first. Then self-adaptive image encryption scheme is used to deal with gray transformation for each pixel and image encryption is finished at last. Theoretical analyses and simulated experiment show that the proposed image encryption algorithm provides perfect results, larger key space, simple and easy to be implemented and fast running speed, so this encryption algorithm has excellent performance against many kinds of attacks and has strong practicality.


2021 ◽  
Vol 2021 ◽  
pp. 1-12
Author(s):  
Youxia Dong ◽  
Xiaoling Huang ◽  
Qixiang Mei ◽  
Yuanju Gan

This study proposes a self-adaptive image encryption algorithm based on the quantum logistic map. First, the initial values are substituted into the quantum logistic map based on an iteration process to generate three random sequences. After preprocessing, three new random sequences with better randomicity were obtained from the generated random sequences. In particular, the correlation coefficients for random sequences before and after preprocessing are compared to determine the best model to make the correlation coefficients closer to zero. Second, one random sequence in the scrambling stage is selected with respect to the plain image. The selected random sequence is then used to perform row-column perturbation on the plain image. Finally, the remaining two random sequences are used to perform forward and reverse diffusion to obtain the final cipher image. Because of the dependence on the plain image, the algorithm can frustrate the chosen-plaintext and known-plaintext attacks. Experimental results show that the proposed encryption algorithm can achieve secure communications.


2012 ◽  
Vol 31 (6) ◽  
pp. 1502-1504 ◽  
Author(s):  
Shao-jiang DENG ◽  
Gui-chao HUANG ◽  
Zhi-jian CHEN ◽  
Xiao XIAO

Sign in / Sign up

Export Citation Format

Share Document