4.6 Article

Multi-image encryption scheme with quaternion discrete fractional Tchebyshev moment transform and cross-coupling operation

期刊

SIGNAL PROCESSING
卷 211, 期 -, 页码 -

出版社

ELSEVIER
DOI: 10.1016/j.sigpro.2023.109107

关键词

Quaternion discrete fractional Tchebyshev; moment transform; Chaotic map; Cross-coupling operation; Multi-image encryption

向作者/读者索取更多资源

This paper extends the traditional discrete fractional Tchebyshev transform to the quaternion algebra domain for multi-image processing using quaternion theory. A new multi-image encryption scheme based on quaternion discrete fractional Tchebyshev moment transform (QDFrTMT) and the cross-coupling chaotic system is proposed. Numerical simulations and security analyses show the effectiveness of the algorithm and its ability to resist common attacks.
With quaternion theory, the traditional discrete fractional Tchebyshev transform is extended to the quaternion algebra domain for multi-image processing. A new multi-image encryption scheme based on quaternion discrete fractional Tchebyshev moment transform (QDFrTMT) and the cross-coupling chaotic system is suggested. The original images are first confused by fractal sorting square matrix and sinelogistic exponential chaotic map, and then the resulting image is divided into four matrices. With the quaternion symplectic form representation, a quaternion signal can be formed by the divided matrices, which can reduce the number of the discrete fractional Tchebyshev transforms used and enhance the computational efficiency. Subsequently, the quaternion array is encrypted with the proposed QDFrTMT. To overcome the weakness of the permutation-diffusion operation based on a single chaotic map, a Logisticsine exponential chaotic map and a piece-wise linear chaotic map are cross-coupled. The final ciphertext images can be acquired by carrying out the dual-layer encryption processes in horizontal and vertical directions. Numerical simulations and security analyses verify the effectiveness of the multi-image encryption algorithm and its strong ability to counteract common attacks. (c) 2023 Elsevier B.V. All rights reserved.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据