Image encryption scheme based on blind signature and an improved Lorenz system

被引:64
作者
Ye, Guodong [1 ]
Wu, Huishan [1 ]
Liu, Min [1 ]
Shi, Yang [2 ]
机构
[1] Guangdong Ocean Univ, Fac Math & Comp Sci, Zhanjiang 524088, Peoples R China
[2] Tongji Univ, Sch Software Engn, Shanghai 200092, Peoples R China
关键词
Asymmetric image encryption; RSA algorithm; ImproLS; Signature; CHAOS-BASED IMAGE; MAP;
D O I
10.1016/j.eswa.2022.117709
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, a new improved Lorenz system (ImproLS) is designed with a better behavior due to a larger positive Lyapunov exponent. Then, an asymmetric image encryption scheme is presented based on blind signature and the ImproLS. First, the sender uses the public key from the receiver to produce the cipher keys in conjunction with the Rivest-Shamir-Adleman (RSA) algorithm. Then, a new mathematical model is established to convert both the plain keys and the cipher keys to generate the initial values for ImproLS. After doing preprocess to the secret plain image, its statistical characteristics is changed greatly. Then, by employing permutation and diffusion operations, the cipher image can be obtained and sent to the receiver and the signer. Second, the signer encrypts the digital signature image using Arnold transform in conjunction with the RSA algorithm, and applies the discrete wavelet transform (DWT) to the cipher image. The scrambled signature image is then embedded into the wavelet domain of cipher image blindly. Then, the cipher image containing signature is sent to the receiver for authentication. Third, the receiver uses the private key to check the signature and recover the cipher image. After comparing the decrypted images from both the sender and the signer, the receiver can judge the source of the secret plain image. Experimental results show that the information entropy is high and closer to the theoretical value. In addition, both unsigned and signed cipher images can effectively resist salt and pepper attack, and clipping attack.
引用
收藏
页数:11
相关论文
共 37 条
[1]   An efficient image encryption scheme based on chaotic and Deoxyribonucleic acid sequencing [J].
Alghafis, Abdullah ;
Firdousi, Faiza ;
Khan, Majid ;
Batool, Syeda Iram ;
Amin, Muhammad .
MATHEMATICS AND COMPUTERS IN SIMULATION, 2020, 177 :441-466
[2]   A novel chaos based optical image encryption using fractional Fourier transform and DNA sequence operation [J].
Ben Farah, M. A. ;
Guesmi, R. ;
Kachouri, A. ;
Samet, M. .
OPTICS AND LASER TECHNOLOGY, 2020, 121
[3]   Combining improved genetic algorithm and matrix semi-tensor product (STP) in color image encryption [J].
Chai, Xiuli ;
Zhi, Xiangcheng ;
Gan, Zhihua ;
Zhang, Yushu ;
Chen, Yiran ;
Fu, Jiangyu .
SIGNAL PROCESSING, 2021, 183
[4]   An efficient approach for encrypting double color images into a visually meaningful cipher image using 2D compressive sensing [J].
Chai, Xiuli ;
Wu, Haiyang ;
Gan, Zhihua ;
Han, Daojun ;
Zhang, Yushu ;
Chen, Yiran .
INFORMATION SCIENCES, 2021, 556 :305-340
[5]   A proposed mode for triple-DES encryption [J].
Coppersmith, D ;
Johnson, DB ;
Matyas, SM .
IBM JOURNAL OF RESEARCH AND DEVELOPMENT, 1996, 40 (02) :253-262
[6]   Triple DES: Privacy Preserving in Big Data Healthcare [J].
Devi, R. Ramya ;
Chamundeeswari, V. Vijaya .
INTERNATIONAL JOURNAL OF PARALLEL PROGRAMMING, 2020, 48 (03) :515-533
[7]   Random property enhancement of a 1D chaotic PRNG with finite precision implementation [J].
Elmanfaloty, Rania A. ;
Abou-Bakr, Ehab .
CHAOS SOLITONS & FRACTALS, 2019, 118 :134-144
[8]   A Novel DWT Domain Watermarking Scheme Based On a Discrete-Time Chaotic System [J].
Hannoun, Katia ;
Hamiche, Hamid ;
Lahdir, Mourad ;
Laghrouche, Mourad ;
Kassim, Sarah .
IFAC PAPERSONLINE, 2018, 51 (33) :50-55
[9]   Advanced Encryption Standard (AES) [J].
Network Box .
Netw. Secur., 2009, 12 (8-12) :8-12
[10]   2D Logistic-Sine-coupling map for image encryption [J].
Hua, Zhongyun ;
Jin, Fan ;
Xu, Binxuan ;
Huang, Hejiao .
SIGNAL PROCESSING, 2018, 149 :148-161