4.6 Article

A multidimensional chaotic image encryption algorithm based on the region of interest

期刊

MULTIMEDIA TOOLS AND APPLICATIONS
卷 79, 期 25-26, 页码 17669-17705

出版社

SPRINGER
DOI: 10.1007/s11042-020-08645-8

关键词

Chaos; Histogram of oriented gradients; Region of interest; Support vector machine; Henon sequence; Unified chaotic sequence

资金

  1. National Key Research and Development Program of China [2017YFB0102500]
  2. Natural Science Foundation of Jilin province [20170101133JC]
  3. Korea Foundation for Advanced Studies' International Scholar Exchange Fellowship for the academic year of 2017-2018
  4. Fundamental Research Funds for the Central Universities
  5. Jilin University [5157050847, 2017XYB252, 2017A53216]

向作者/读者索取更多资源

Most image encryption algorithms encrypt the whole image, but only part of the data is important in the image. In this paper, we propose a multidimensional chaotic image encryption algorithm based on the region of interest (ROI). The histogram of oriented gradients (HOG) feature extraction and support vector machine (SVM) are used to separate the region of interest from the whole image. Then, the region of interest pixels is messed up by using the improved Henon sequence, Joseph sequence and the region of interest pixels are diffused by using the unified chaotic sequence to hide the sensitive information in the image, so as to achieve the purpose of private protection. Furthermore, the improved logistic sequence is used to hide the edge information of the target image to achieve the tradeoff between the secrecy of information and the complexity of encryption. A series of analyses are carried out including key space analysis, key sensitivity analysis, statistical analysis, information entropy analysis, analysis of the fixed-point obscuration analysis, quality analysis and image decryption for our encryption algorithm. Through experiments and comparisons, the proposed algorithm has good performance in encrypting image and coping with various invasions. The image encryption algorithm based on ROI has a good performance of security, moreover through the main encryption of ROI can effectively shorten the encryption time, so as to achieve the compromise of security and computational complexity.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据