A Novel Image Encryption Algorithm Based on Voice Key and Chaotic Map

被引:7
|
作者
Li, Jing [1 ]
Fu, Tianshu [2 ]
Fu, Changfeng [3 ]
Han, Lianfu [3 ]
机构
[1] Heilongjiang Bayi Agr Univ, Coll Humanities & Social Sci, Daqing 163319, Peoples R China
[2] Northeast Petr Univ, Sch Phys & Elect Engn, Daqing 163318, Peoples R China
[3] Changshu Inst Technol, Coll Elect & Informat Engn, Changshu 215506, Jiangsu, Peoples R China
来源
APPLIED SCIENCES-BASEL | 2022年 / 12卷 / 11期
基金
中国国家自然科学基金; 中国博士后科学基金;
关键词
chaotic map; image encryption; voice key; authentication; SYSTEMS; RECOGNITION;
D O I
10.3390/app12115452
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
Featured Application In this article, an encryption algorithm is proposed that can be used for remote identity authentication. The specific application method is described in the third section of this article. Initially, the user's voice information is extracted as data, which is subsequently used as the key for image encryption. The encrypted image can be successfully decrypted during identity verification only when the user's voice data are correct, which leads to successful identity verification. This is a new application scheme, and no similar application method has been described in the existing literature, to the best of our knowledge. This paper proposes a new image encryption algorithm. First, time-domain and frequency-domain features of the user's voice are extracted to generate a voice key. Second, the key is iterated through a chaotic map multiple times to map the key data to the chaotic oscillation region, and, subsequently, the parameters of the oscillation area are used to encrypt the user's image. Third, at the time of decryption, the user's latest voice data are re-extracted to generate a new voice key and decrypt the encrypted image. The encrypted image cannot be successfully decrypted if there are differences between the two extracted voices in the time or frequency domain. Finally, the experiments are performed using 80 groups of face images and voice data, all of which pass the encryption and decryption experiments. In addition, various safety tests have been carried out on the algorithm. The key sensitivity of the algorithm is verified by the normalized cross-correlation parameter C-ncc. The effective anti-attack ability of the algorithm is verified by measuring the correlation between adjacent pixels, the number of changing pixel rate (NPCR) and the unified averaged changed intensity (UACI). The key space of the proposed algorithm is greater than 2(100), and it has good anti-cracking ability.
引用
收藏
页数:19
相关论文
共 50 条
  • [11] A fast image encryption algorithm based on chaotic map
    Liu, Wenhao
    Sun, Kehui
    Zhu, Congxu
    OPTICS AND LASERS IN ENGINEERING, 2016, 84 : 26 - 36
  • [12] An image layered scrambling encryption algorithm based on a novel discrete chaotic map
    Tang, Jianeng
    Zhang, Zezong
    Chen, Peiyang
    Zhang, Feng
    Ni, Hui
    Huang, Zhongming
    IET IMAGE PROCESSING, 2023, 17 (02) : 518 - 532
  • [13] A novel image encryption algorithm based on a 3D chaotic map
    Kanso, A.
    Ghebleh, M.
    COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2012, 17 (07) : 2943 - 2959
  • [14] A novel image encryption algorithm based on hybrid chaotic maps using a key image
    Benaissi, Sellami
    Chikouche, Noureddine
    Hamza, Rafik
    OPTIK, 2023, 272
  • [15] Session key based novel lightweight image encryption algorithm using a hybrid of Chebyshev chaotic map and crossover
    Gupta, Manish
    Gupta, Kamlesh Kumar
    Shukla, Piyush Kumar
    MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (25) : 33843 - 33863
  • [16] Session key based novel lightweight image encryption algorithm using a hybrid of Chebyshev chaotic map and crossover
    Manish Gupta
    Kamlesh Kumar Gupta
    Piyush Kumar Shukla
    Multimedia Tools and Applications, 2021, 80 : 33843 - 33863
  • [17] A new image alternate encryption algorithm based on chaotic map
    Xingyuan Wang
    Kang Guo
    Nonlinear Dynamics, 2014, 76 : 1943 - 1950
  • [18] A bit transformation image encryption algorithm based on chaotic map
    Pan, Tian-Gong
    Li, Da-Yong
    Dianji yu Kongzhi Xuebao/Electric Machines and Control, 2013, 17 (10): : 97 - 100
  • [19] An image encryption algorithm based on modified logistic chaotic map
    Han, Chunyan
    OPTIK, 2019, 181 : 779 - 785
  • [20] A new image alternate encryption algorithm based on chaotic map
    Wang, Xingyuan
    Guo, Kang
    NONLINEAR DYNAMICS, 2014, 76 (04) : 1943 - 1950