4.6 Article

A novel image encryption cryptosystem based on true random numbers and chaotic systems

期刊

MULTIMEDIA SYSTEMS
卷 28, 期 1, 页码 95-112

出版社

SPRINGER
DOI: 10.1007/s00530-021-00803-8

关键词

Chaotic system; Image encryption; True random numbers

资金

  1. National Natural Science Foundation of China [61672124]
  2. Password Theory Project of the 13th Five-Year Plan National Cryptography Development Fund [MMJJ20170203]
  3. Liaoning Province Science and Technology Innovation Leading Talents Program Project [XLYC1802013]
  4. Key R&D Projects of Liaoning Province [2019020105-JH2/103]
  5. Jinan City'20 universities' Funding Projects Introducing Innovation Team Program [2019GXRC031]
  6. Research Fund of Guangxi Key Lab of Multi-source Information Mining Security [MIMS20M-02]
  7. Scientific and Technological Research Program of Chongqing Municipal Education Commission [KJ1703056, KJQN201900529]

向作者/读者索取更多资源

A novel image encryption cryptosystem based on true random numbers and chaotic systems is proposed, utilizing hash functions, clustering machine-learning algorithms, and chaotic sequences to enhance security. Compared with existing models, the method is simpler, more secure, and resistant to different classical attacks.
To enhance the security of single-chaotic systems, we propose a novel image encryption cryptosystem based on true random numbers and chaotic systems. First, we select any one of several chaotic systems. Next, the hash function is used to calculate the initial value of the chaotic system using a plaintext image. Then, we obtain a solution of this chaotic system and use the k-medoids clustering machine-learning algorithm and chaotic sequence to scramble the original image. Finally, new random numbers obtained using a chaotic signal and true random numbers are used to perform the exclusive-OR operator on the scrambled results. To illustrate the effectiveness of our method, a one-dimensional (1D) logistic chaotic system is selected for image encryption. The simulation results show that compared with the existing models, such as image encryption based on chaos and image encryption based on the advanced encryption standar (AES), our method is simpler with a higher security and resists different classical attacks.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据