Bl-IEA: A Bit-Level Image Encryption Algorithm for Cognitive Services in Intelligent Transportation Systems

被引:25
作者
Sun, Yi [1 ,2 ]
Yu, Keping [3 ]
Bashir, Ali Kashif [4 ,5 ]
Liao, Xin [6 ]
机构
[1] Beijing Univ Posts & Telecommun, Natl Pilot Software Engn Sch, Sch Comp Sci, Beijing 100876, Peoples R China
[2] Natl Engn Lab Mobile Network Technol, Beijing 100876, Peoples R China
[3] Waseda Univ, Global Informat & Telecommun Inst, Tokyo 1698050, Japan
[4] Manchester Metropolitan Univ, Dept Comp & Math, Manchester M15 6BH, Lancs, England
[5] Natl Univ Sci & Technol NUST, Sch Elect Engn & Comp Sci SEECS, Islamabad 24090, Pakistan
[6] Hunan Univ, Coll Comp Sci & Elect Engn, Changsha 410082, Peoples R China
基金
中国国家自然科学基金;
关键词
Encryption; Cats; Logistics; Security; Intelligent transportation systems; Resists; Correlation; cognitive services; image encryption; re-arrangement; logistic chaotic map; CHAOS; MAP; CRYPTOSYSTEM;
D O I
10.1109/TITS.2021.3129598
中图分类号
TU [建筑科学];
学科分类号
0813 ;
摘要
In Intelligent Transportation Systems, images are the main data sources to be analyzed for providing intelligent and precision cognitive services. Therefore, how to protect the privacy of sensitive images in the process of information transmission has become an important research issue, especially in future no non-private data era. In this article, we design the Rearrangement-Arnold Cat Map (R-ACM) to disturb the relationship between adjacent pixels and further propose an efficient Bit-level Image Encryption Algorithm(Bl-IEA) based on R-ACM. Experiments show that the correlation coefficients of two adjacent pixels are 0.0022 in the horizontal direction, -0.0105 in the vertical direction, and -0.0035 in the diagonal direction respectively, which are obviously weaker than that of the original image with high correlations of adjacent pixels. What's more, the NPCR is 0.996120172, and the UACI is 0.334613406, which indicate that Bl-IEA has stronger ability to resist different attacks compared with other solutions. Especially, the lower time complexity and only one round permutation make it particularly suitable to be used in the time-limited intelligent transportation field.
引用
收藏
页码:1062 / 1074
页数:13
相关论文
共 43 条
  • [11] Attribute-Based Encryption With Parallel Outsourced Decryption for Edge Intelligent IoV
    Feng, Chaosheng
    Yu, Keping
    Aloqaily, Moayad
    Alazab, Mamoun
    Lv, Zhihan
    Mumtaz, Shahid
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (11) : 13784 - 13795
  • [12] 2D Logistic-Sine-coupling map for image encryption
    Hua, Zhongyun
    Jin, Fan
    Xu, Binxuan
    Huang, Hejiao
    [J]. SIGNAL PROCESSING, 2018, 149 : 148 - 161
  • [13] Image encryption using 2D Logistic-adjusted-Sine map
    Hua, Zhongyun
    Zhou, Yicong
    [J]. INFORMATION SCIENCES, 2016, 339 : 237 - 253
  • [14] Triple color image encryption based on 2D multiple parameter fractional discrete Fourier transform and 3D Arnold transform
    Joshi, Anand B.
    Kumar, Dhanesh
    Gaffar, Abdul
    Mishra, D. C.
    [J]. OPTICS AND LASERS IN ENGINEERING, 2020, 133
  • [15] An efficient and noise resistive selective image encryption scheme for gray images based on chaotic maps and DNA complementary rules
    Kulsoom, Ayesha
    Xiao, Di
    Aqeel-Ur-Rehman
    Abbas, Syed Ali
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (01) : 1 - 23
  • [16] An Efficient Ciphertext-Policy Weighted Attribute-Based Encryption for the Internet of Health Things
    Li, Hang
    Yu, Keping
    Liu, Bin
    Feng, Chaosheng
    Qin, Zhiguang
    Srivastava, Gautam
    [J]. IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, 2022, 26 (05) : 1949 - 1960
  • [17] Image encryption using DNA complementary rule and chaotic maps
    Liu, Hongjun
    Wang, Xingyuan
    Kadir, Abdurahman
    [J]. APPLIED SOFT COMPUTING, 2012, 12 (05) : 1457 - 1466
  • [18] User-Oriented Virtual Mobile Network Resource Management for Vehicle Communications
    Lu, Huimin
    Zhang, Yin
    Li, Yujie
    Jiang, Chi
    Abbas, Haider
    [J]. IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2021, 22 (06) : 3521 - 3532
  • [19] A novel chaotic image encryption algorithm based on improved baker map and logistic map
    Luo, Yuqin
    Yu, Jin
    Lai, Wenrui
    Liu, Lingfeng
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (15) : 22023 - 22043
  • [20] Optical multi-image encryption scheme based on discrete cosine transform and nonlinear fractional Mellin transform
    Pan, Shu Min
    Wen, Ru Hong
    Zhou, Zhi Hong
    Zhou, Nan Run
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (02) : 2933 - 2953