color image encryption
Recently Published Documents


TOTAL DOCUMENTS

433
(FIVE YEARS 183)

H-INDEX

43
(FIVE YEARS 10)

2022 ◽  
Author(s):  
Jingbo Zhao ◽  
Tian Zhang ◽  
Jianwei Jiang ◽  
Tong Fang ◽  
Hongyang Ma

Abstract Aiming at solving the trouble that digital image information is easily intercepted and tampered during transmission, we proposed a color image encryption scheme based on alternate quantum random walk and controlled Rubik’s Cube transformation. At the first, the color image is separated into three channels: channel R, channel G and channel B. Besides, a random sequence is generated by alternate quantum walk. Then the six faces of the Rubik’s Cube are decomposed and arranged in a specific order on a two-dimensional plane, and each pixel of the image is randomly mapped to the Rubik’s Cube. The whirling of the Rubik’s Cube is controlled by a random sequence to realize image scrambling and encryption. The scrambled image acquired by Rubik’s Cube whirling and the random sequence received by alternate quantum walk are bitwise-XORed to obtain a single-channel encrypted image. Finally the three-channel image is merged to acquire the final encrypted image. The decryption procedure is the reverse procedure of the encryption procedure. The key space of this scheme is theoretically infinite. After simulation experiments, the information entropy after encryption reaches 7.999, the NPCR is 99.5978%, and the UACI is 33.4317%. The encryption scheme with high robustness and security has a excellent encryption effect which is effective to resist statistical attacks, force attacks, and other differential attacks.


2022 ◽  
Author(s):  
Dongyuan Lin ◽  
Qiangqiang Zhang ◽  
Xiaofeng Chen ◽  
Zhongshan Li ◽  
Shiyuan Wang

IEEE Access ◽  
2022 ◽  
pp. 1-1
Author(s):  
Hira Nazir ◽  
Imran Sarwar Bajwa ◽  
Saima Abdullah ◽  
Rafaqut Kazmi ◽  
Muhammad Sami ullah

Author(s):  
Hao Zhang ◽  
Zhenyu Li ◽  
Pengfei Yan ◽  
Xiaoqing Wang ◽  
Xingyuan Wang

In this paper, we present a novel multi-threaded parallel permutation and channel-combined diffusion for image encryption which is independent of plain text. In our proposed method, the coupled map lattice is used to generate the key sequences for multi-thread permutation and diffusion. Then intra- and inter-thread permutations are achieved using multi-threading in combination with the tent mapping. For the subsequent diffusion, this paper introduces a method based on channel-combined diffusing which simultaneously diffuses three channels. Experimental results indicate a high encryption performance with the capability of effectively resisting the known plain text and differential attacks. Our proposed method also has a lower computational complexity which enables its applicability in practical scenarios.


Electronics ◽  
2021 ◽  
Vol 10 (23) ◽  
pp. 2890
Author(s):  
Heba G. Mohamed ◽  
Fadwa Alrowais ◽  
Dalia H. ElKamchouchi

Security standards have been raised through modern multimedia communications technology, which allows for enormous progress in security. Modern multimedia communication technologies are concerned with fault tolerance technique and information security. As a primary method, there is widespread use of image encryption to protect image information security. Over the past few years, image encryption has paid more attention to combining DNA technologies in order to increase security. The objective here is to provide a new method for correcting color image encryption errors due to the uncertainty of DNA computing by using the fractional order hyperchaotic Lorenz system. To increase randomness, the proposed cryptosystem is applied to the three plain image channels: Red, Green, and Blue. Several methods were compared including the following: entropy, correlation, key sensitivity, key space, data loss attacks, speed computation, Number of Pixel changing rate (NPCR), and Unified Average Change Intensity randomness (UACI) tests. Consequently, the proposed scheme is very secure against a variety of cryptographic attacks.


Optik ◽  
2021 ◽  
pp. 168290
Author(s):  
Amina Yahi ◽  
Tewfik Bekkouche ◽  
Mohamed El Hossine Daachi ◽  
Nacira Diffellah

Sign in / Sign up

Export Citation Format

Share Document