{"title":"Research on Design of Chaotic Symmetrical Digital Image Encryption System","authors":"","doi":"10.23977/acss.2023.070811","DOIUrl":null,"url":null,"abstract":"With the widespread dissemination of digital information, the security encryption of digital images has become particularly critical. This study deeply discusses the chaotic symmetric digital image encryption system based on chaos theory and symmetric encryption technology. By combining the technologies of these two fields, an efficient and safe encryption method is provided for digital images. Experimental evaluations show that the system is capable of effectively encrypting images so that they are visually distinct from the original content. At the same time, the system shows strong resistance to differential attacks, and has a high encryption speed, which is suitable for real-time applications.","PeriodicalId":495216,"journal":{"name":"Advances in computer, signals and systems","volume":"26 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Advances in computer, signals and systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.23977/acss.2023.070811","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
With the widespread dissemination of digital information, the security encryption of digital images has become particularly critical. This study deeply discusses the chaotic symmetric digital image encryption system based on chaos theory and symmetric encryption technology. By combining the technologies of these two fields, an efficient and safe encryption method is provided for digital images. Experimental evaluations show that the system is capable of effectively encrypting images so that they are visually distinct from the original content. At the same time, the system shows strong resistance to differential attacks, and has a high encryption speed, which is suitable for real-time applications.