{"title":"Color Image Encryption Algorithm Based on 2D Skew Tent Map and Chinese Remainder Theorem","authors":"杰彬 苏","doi":"10.12677/jisp.2022.112007","DOIUrl":null,"url":null,"abstract":"An efficient image encryption algorithm based on permutation-diffusion mode is proposed by combining 2D skew tent map with Chinese remainder theorem. In the permutation process, the algorithm uses 2D skew tent map to generate chaotic sequences and arrange the chaotic sequences in ascending order to obtain the position index sequences, which are used for random scrambling of image pixel positions. In the diffusion process, Chinese Remainder Theorem is used to reconstruct the scrambled image color components, and a generalized Arnold map with real parameters is in-troduced to change the gray value distribution of the image color component. All kinds of security analysis show that the image encryption algorithm proposed in this paper is effective and can effectively resist various attacks.","PeriodicalId":69487,"journal":{"name":"图像与信号处理","volume":"1 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"图像与信号处理","FirstCategoryId":"1093","ListUrlMain":"https://doi.org/10.12677/jisp.2022.112007","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
An efficient image encryption algorithm based on permutation-diffusion mode is proposed by combining 2D skew tent map with Chinese remainder theorem. In the permutation process, the algorithm uses 2D skew tent map to generate chaotic sequences and arrange the chaotic sequences in ascending order to obtain the position index sequences, which are used for random scrambling of image pixel positions. In the diffusion process, Chinese Remainder Theorem is used to reconstruct the scrambled image color components, and a generalized Arnold map with real parameters is in-troduced to change the gray value distribution of the image color component. All kinds of security analysis show that the image encryption algorithm proposed in this paper is effective and can effectively resist various attacks.