Image Encryption Algorithm Based on Adaptive Wavelet Chaos

被引:18
|
作者
An, Feng-Ping [1 ,2 ]
Liu, Jun-e [3 ]
机构
[1] Huaiyin Normal Univ, Sch Phys & Elect Elect Engn, JS-223300 Huaian, Peoples R China
[2] Beijing Inst Technol, Sch Informat & Elect, BJ-100081 Beijing, Peoples R China
[3] Beijing Wuzi Univ, Sch Informat, BJ-100081 Beijing, Peoples R China
基金
中国博士后科学基金; 中国国家自然科学基金;
关键词
SCHEME; CRYPTANALYSIS;
D O I
10.1155/2019/2768121
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Images, as one of the important carriers for information exchange, play an important role in work and daily life. Image encryption technology has received a lot of attention, and varieties of encryption technologies for images have emerged. Early image encryption technologies have shortcomings such as simple algorithm structure, small key space, and poor resistance to plaintext attacks. These algorithms have been unable to meet the needs of information security at this stage. Based on the wavelet algorithm, chaos algorithm, and cyclic encryption algorithm, combined with frequency domain encryption and spatial domain encryption, a digital image encryption algorithm based on adaptive wavelet is proposed in this paper. In terms of frequency, this paper enhances the adaptive ability of the wavelet algorithm by convex optimization-particle swarm optimization (PSO). At the same time, the chaotic algorithm is used to scramble the low-frequency coefficients. In the aspect of airspace, this paper uses the block-encryption adaptive encryption algorithm to rescramble the wavelet-reconstructed image. And the SHA-1 algorithm is introduced into the plaintext image generation key sequence as a cyclic index value for cyclic encryption. The key composition of the encryption algorithm proposed in this paper is complex, and the idea of a one-time pad is used, which makes the improved algorithm increase the key space and improve the ability to resist the choice of plaintext attack. In each cyclic encryption of the airspace, mutual encryption is performed by image subblocks, and the algorithm adaptability is improved. Through the experimental test of statistical characteristics, key space, and key sensitivity, the encryption performance of the algorithm is verified, and it has strong antiattack and interference ability. It is a relatively secure encryption algorithm.
引用
收藏
页数:12
相关论文
共 50 条
  • [22] Image chaos encryption technology based on interval wavelet coding
    Mei, Shuli
    Gao, Wanlin
    Jisuanji Gongcheng/Computer Engineering, 2006, 32 (16): : 203 - 204
  • [23] Image Encryption Algorithm Based on Arnold Transform and Chaos Theory in the Multi-wavelet Domain
    Abdul-Kareem A.A.
    Al-Jawher W.A.M.
    International Journal of Computers and Applications, 2023, 45 (04) : 306 - 322
  • [24] Multiple Digital Image Encryption Algorithm Based on Chaos Algorithm
    Ying Zhang
    Yi He
    Jing Zhang
    Xiaobo Liu
    Mobile Networks and Applications, 2022, 27 : 1349 - 1358
  • [25] Multiple Digital Image Encryption Algorithm Based on Chaos Algorithm
    Zhang, Ying
    He, Yi
    Zhang, Jing
    Liu, Xiaobo
    MOBILE NETWORKS & APPLICATIONS, 2022, 27 (04): : 1349 - 1358
  • [26] An improved chaos-based image encryption algorithm
    Cao Yingyu
    Fu Chong
    Zhang Zhenchuan
    Advanced Computer Technology, New Education, Proceedings, 2007, : 675 - 679
  • [27] An encryption algorithm for image based on affine and composed chaos
    Department of Computer Science and Technology, University of Science and Technology Beijing, Beijing 100083, China
    不详
    不详
    Jisuanji Yanjiu yu Fazhan, 2013, 2 (319-324):
  • [28] A novel parallel image encryption algorithm based on chaos
    Ünal Çavuşoğlu
    Sezgin Kaçar
    Cluster Computing, 2019, 22 : 1211 - 1223
  • [29] A new image encryption algorithm based on chaos system
    Zhang, H
    Feng, WX
    Hui, LZ
    Hai, LD
    Chou, LY
    2003 IEEE INTERNATIONAL CONFERENCE ON ROBOTICS, INTELLIGENT SYSTEMS AND SIGNAL PROCESSING, VOLS 1 AND 2, PROCEEDINGS, 2003, : 778 - 782
  • [30] The image encryption algorithm based on chaos and DNA computing
    Yong Zhang
    Multimedia Tools and Applications, 2018, 77 : 21589 - 21615