scholarly journals Image encryption algorithm for crowd data based on a new hyperchaotic system and Bernstein polynomial

2021 ◽  
Author(s):  
Donghua Jiang ◽  
Lidong Liu ◽  
Xingyuan Wang ◽  
Xianwei Rong
2019 ◽  
Vol 2019 ◽  
pp. 1-12 ◽  
Author(s):  
Xuncai Zhang ◽  
Lingfei Wang ◽  
Ying Niu ◽  
Guangzhao Cui ◽  
Shengtao Geng

In this paper, an image encryption algorithm based on the H-fractal and dynamic self-invertible matrix is proposed. The H-fractal diffusion encryption method is firstly used in this encryption algorithm. This method crosses the pixels at both ends of the H-fractal, and it can enrich the means of pixel diffusion. The encryption algorithm we propose uses the Lorenz hyperchaotic system to generate pseudorandom sequences for pixel location scrambling and self-invertible matrix construction to scramble and diffuse images. To link the cipher image with the original image, the initial values of the Lorenz hyperchaotic system are determined using the original image, and it can enhance the security of the encryption algorithm. The security analysis shows that this algorithm is easy to implement. It has a large key space and strong key sensitivity and can effectively resist plaintext attacks.


2020 ◽  
Vol 69 (4) ◽  
pp. 040502
Author(s):  
Zhi-Ben Zhuang ◽  
Jun Li ◽  
Jing-Yi Liu ◽  
Shi-Qiang Chen

2019 ◽  
Vol 2019 ◽  
pp. 1-7
Author(s):  
Shu-ying Wang ◽  
Jian-feng Zhao ◽  
Xiao-yan Wang ◽  
Li-tao Zhang

Based on the Adomian decomposition method and Lyapunov stability theory, this paper constructs a fractional-order memristive hyperchaos. Then, the 0–1 test analysis is applied to detect random nature of chaotic sequences exhibited by the fractional-order systems. Comparing with the corresponding integer-order hyperchaotic system, the fractional-order hyperchaos possesses higher complexity. Finally, an image encryption algorithm is proposed based on the fractional-order memristive hyperchaos. Security and performance analysis indicates that the proposed chaos-based image encryption algorithm is highly resistant to statistical attacks.


2019 ◽  
Vol 2019 ◽  
pp. 1-8 ◽  
Author(s):  
Chenghai Li ◽  
Fangzheng Zhao ◽  
Chen Liu ◽  
Lei Lei ◽  
Jie Zhang

The current common color image encryption algorithms applying “scrambling-diffusion” have some problems, such as the small key space, the cumbersome encryption process, and the security vulnerability. Aiming at these problems, this paper proposes a new color image encryption algorithm based on the hyperchaotic system and applying “transforming-scrambling-diffusion” model. Before scrambling, in accordance with the plaintext itself attributes, the number of iterations was calculated, all the pixel values of color image were transformed into gray code iteratively, and then the chaotic sequence was generated from the four-dimensional hyperchaotic system. Pixel matrix after gray code transformation was converted to one-dimensional matrix. The chaotic sequence was sorted and the one-dimensional matrix was changed positions correspondingly to complete the whole domain scrambling. And then, bit-operation was executed for image diffusion. The ciphertext can be obtained by matrix transformation. The key sensitivity, histogram, information entropy, correlation, and other evaluation indexes were calculated and analyzed through the simulation experiment. Compared with other algorithms, it can be proved that the encryption algorithm has the strong antiattack ability.


Entropy ◽  
2014 ◽  
Vol 17 (1) ◽  
pp. 28-38 ◽  
Author(s):  
Xia Huang ◽  
Tiantian Sun ◽  
Yuxia Li ◽  
Jinling Liang

2020 ◽  
Vol 30 (15) ◽  
pp. 2050233
Author(s):  
Guodong Ye ◽  
Kaixin Jiao ◽  
Huishan Wu ◽  
Chen Pan ◽  
Xiaoling Huang

Herein, an asymmetric image encryption algorithm based on RSA cryptosystem and a fractional-order chaotic system is proposed. Its security depends on RSA algorithm. First, a pair of public and private keys is generated by RSA algorithm. Subsequently, a random message shown as plaintext key information is encrypted by the public key and RSA to achieve ciphertext key information. Next, a new transformation map is established to generate the initial key according to the ciphertext key information. Subsequently, the initial key is substituted into a fractional hyperchaotic system equation to calculate the keystream. Finally, permutation and diffusion operations are employed to encrypt a plain image to obtain the final cipher image. In the proposed algorithm, different keys for encryption and decryption are designed under an asymmetric architecture. The RSA algorithm and fractional chaotic system are combined to encrypt images; in particular, a fast algorithm for computing power multiplication is employed, which significantly improves the encryption effect and enhances the security. Simulation results show that the proposed algorithm is effective and applicable to image protection.


Sign in / Sign up

Export Citation Format

Share Document