期刊
MATHEMATICS
卷 11, 期 3, 页码 -出版社
MDPI
DOI: 10.3390/math11030767
关键词
artificial fish swarm algorithm; hyper-chaotic system; image encryption; DNA
类别
In this paper, we propose a chaotic digital image encryption scheme based on an optimized artificial fish swarm algorithm and DNA coding to address the problems of small key space and weak resistance to differential attacks in existing encryption algorithms. The key is associated with the ordinary image pixel through the MD5 hash operation, and the hash value generated by the ordinary image is used to increase the sensitivity of the key. The artificial fish school algorithm is used to scramble the positions of pixels in the block, and scrambling operation between blocks is proposed to increase the scrambling effect. Operations based on DNA encoding, obfuscation, and decoding technologies are performed in the diffusion stage to obtain encrypted images.
Aiming at the problems of small key space and weak resistance to differential attacks in existing encryption algorithms, we proposed a chaotic digital image encryption scheme based on an optimized artificial fish swarm algorithm and DNA coding. First, the key is associated with the ordinary image pixel through the MD5 hash operation, and the hash value generated by the ordinary image is used as the initial value of the hyper-chaotic system to increase the sensitivity of the key. Next, the artificial fish school algorithm is used to scramble the positions of pixels in the block. In addition, scrambling operation between blocks is proposed to increase the scrambling effect. In the diffusion stage, operations are performed based on DNA encoding, obfuscation, and decoding technologies to obtain encrypted images. The research results show that the optimized artificial fish swarm algorithm has good convergence and can obtain the global optimal solution to the greatest extent. In addition, simulation experiments and security analysis show that compared with other encryption schemes, the scheme proposed in this paper has a larger key space and better resistance to differential attacks, indicating that the proposed algorithm has better encryption performance and higher security.
作者
我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。
推荐
暂无数据