登录    注册    忘记密码

详细信息

Chaotic Image Encryption Using Piecewise-Logistic-Sine Map  ( SCI-EXPANDED收录 EI收录)  

文献类型:期刊文献

英文题名:Chaotic Image Encryption Using Piecewise-Logistic-Sine Map

作者:Shao, Shanwu[1];Li, Ji[1];Shao, Ping[2];Xu, Gang[3]

第一作者:Shao, Shanwu

通讯作者:Shao, P[1]

机构:[1]Guilin Univ Elect Technol, Sch Comp & Informat Secur, Guilin 541000, Peoples R China;[2]Zhaoqing Univ, Sch Comp Sci & Software, Zhaoqing 526000, Peoples R China;[3]Henan Univ Econ & Law, Sch Comp & Informat Engn, Zhengzhou 450000, Henan, Peoples R China

第一机构:Guilin Univ Elect Technol, Sch Comp & Informat Secur, Guilin 541000, Peoples R China

通讯机构:[1]corresponding author), Zhaoqing Univ, Sch Comp Sci & Software, Zhaoqing 526000, Peoples R China.

年份:2023

卷号:11

起止页码:27477-27488

外文期刊名:IEEE ACCESS

收录:;EI(收录号:20231413842652);Scopus(收录号:2-s2.0-85151364082);WOS:【SCI-EXPANDED(收录号:WOS:000966256200001)】;

基金:This work was supported in part by the Special Program of Key Fields for Ordinary Colleges and Universities in Guangdong Province under Grant 2021ZDZX1028, and in part by the Innovation Key Project of Guangxi Province under Grant AA22068059.

语种:英文

外文关键词:Encryption; Time complexity; Bifurcation; Security; Behavioral sciences; Logistics; Histograms; Piecewise chaotic map; image security; chaos-based encryption; image encryption

摘要:The classical one-dimension chaotic maps are not adequately secure, and some improved maps usually have a high time complexity. To address these problems, this paper presents a new Piecewise-Logistic-Sine map (PLSM). The bifurcation diagrams, Lyapunov exponent, and running time of the proposed PLSM are analyzed, and the outcomes show that it has better chaotic behavior with low time complexity. Furthermore, diffusion by certain rules is vulnerable to attack, so a PLSM-based image encryption scheme with random exclusive OR diffusion is proposed. Using a 256-bit secret key, the initial value and parameters of PLSM are calculated by the key distribution method. Then four chaotic sequences are generated by PLSM, they are used in three rounds of random exclusive OR diffusion. This scheme can spread a small change in the original image to all pixels, and the performance evaluation shows the security of this image encryption scheme.

参考文献:

正在载入数据...

版权所有©河南财经政法大学 重庆维普资讯有限公司 渝B2-20050021-8 
渝公网安备 50019002500408号 违法和不良信息举报中心