4.5 Article

A Fast Hyperchaotic Image Encryption Scheme

出版社

WORLD SCIENTIFIC PUBL CO PTE LTD
DOI: 10.1142/S021812742350061X

关键词

Image encryption; step-by-step scrambling-diffusion; conservative hyperchaotic system; RSVM

向作者/读者索取更多资源

In this paper, a fast hyperchaotic image encryption scheme based on RSVM and step-by-step scrambling-diffusion is proposed. The scheme utilizes the RSVM algorithm to generate random one-dimensional arrays of the pixel matrix, which are then used to scramble-diffuse the rows/columns of the pixel matrix. The control parameters of the RSVM algorithm are determined by the SHA-256 of the plaintext pixels, ensuring that even small changes in the plaintext pixels result in significant differences in the ciphertext images. Additionally, the overall time complexity of the scheme is quite low, reducing the time cost significantly.
In this paper, we propose a fast hyperchaotic image encryption scheme based on RSVM and step-by-step scrambling-diffusion. In this scheme, we firstly propose a new algorithm named ring shrinkage with variable modulo (RSVM), which can randomly scramble the elements in a one-dimensional array, which are composed of the row numbers or column numbers of the pixel matrix to be encrypted. Before encryption, we use RSVM algorithm to generate two random one-dimensional arrays of pixel matrix (i.e. row array A(s )and column array B-s), and each element in the A(s)/B-s represents the row/column number in the pixel matrix. Then the rows/columns of the pixel matrix are scrambled-diffused step-by-step according to the row/column numbers in the A(s)/B-s. The initial control parameters of RSVM algorithm are controlled by SHA-256 of plaintext pixels, and RSVM algorithm controls the step-by-step scrambling-diffusion process of pixel matrix, rows and columns, so the small changes of plaintext pixels will lead to great differences in ciphertext images. In addition, the overall time complexity of the image encryption scheme is only T(1.5(M + N)), which can greatly reduce the time cost. Finally, the experimental results and extensive security analysis prove the efficiency and feasibility of this image encryption method.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.5
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据