3.8 Article

Research on computer 3D image encryption processing based on the nonlinear algorithm

Journal

NONLINEAR ENGINEERING - MODELING AND APPLICATION
Volume 11, Issue 1, Pages 664-671

Publisher

DE GRUYTER POLAND SP Z O O
DOI: 10.1515/nleng-2022-0232

Keywords

nonlinear algorithm; 3D image; encryption

Ask authors/readers for more resources

This article utilizes a nonlinear digital chaos theory algorithm to generate encryption system parameters, analyzing the correlation degree of image elements to study computer 3D image encryption processing. The use of the nonlinear algorithm weakens the correlation degree in the cypher text, distributing image statistical features into random cypher text, improving performance parameters, and widening key space.
This article uses the nonlinear digital chaos theory algorithm to generate the corresponding encryption system initial parameters, by analysing the correlation degree of image elements from the angles of horizontal, vertical, and diagonal direction, in order to study computer three-dimensional (3D) image encryption processing. The correlation degree of the cypher text obtained by the nonlinear algorithm is weak in the image's adjacent pixels, and the adjacent pixels are not related at all, horizontal angle: 0.915989, vertical angle: 0.968184, diagonal angle: 0.913533. The nonlinear algorithm distributes the image's statistical features into the random cypher text. By applying permutations and replacements in 3D space, the proposed approach improves performance parameters and widens key space in comparison to previous image cryptography investigations. The important qualities of such a secure system are its simplicity and efficacy. Simulations and analysis show that the proposed method can produce a large key space while also surviving standard cipher attacks. Because of its powerful cryptographic properties, it is suited for image applications. The nonlinear algorithm has very high sensitivity to the secret key and plaintext, as well as better statistical performance, higher security, and higher efficiency in the operation of the algorithm.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

3.8
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available