基于Lorenz吸引子和分数阶傅里叶变换的图像加密

Ökkeş Erdem Tekerek, Adem Tekerek
{"title":"基于Lorenz吸引子和分数阶傅里叶变换的图像加密","authors":"Ökkeş Erdem Tekerek, Adem Tekerek","doi":"10.1109/iisec54230.2021.9672362","DOIUrl":null,"url":null,"abstract":"In this study, a new image encryption and decoding algorithm is developed using fractional fourier transform, lorenz attractor and masking. In the proposed algorithm, firstly, the image is masked with a randomly generated mask and fractional fourier transform is applied to the masked image. These two processes were applied 3 times in a row, making the image more complex. The resulting image was then decomposed into 256 parts. 16 chaotic outputs were obtained from lorenz attractor. These outputs are calculated in base 256. The parts with the same index number as the output were selected and mixed among themselves. The scrambled image parts are combined and the encryption process is completed. The degree of the function applied in the algorithm is a rational number. The use of lorenz attractor provides chaotic outputs. These 2 features make the algorithm resistant to attacks. The use of a chaotic set of differential equations is reduced the probability of finding the scrambled method by an analytical approach and the linear predictability of the method for attacks on the scrambled image. The analysis of chaotically generated random numbers was made and produced successful results. The algorithm is confidential and usable against most common attacks such as brute force. The data contained in the key is encrypted using the RSA algorithm.","PeriodicalId":344273,"journal":{"name":"2021 2nd International Informatics and Software Engineering Conference (IISEC)","volume":"189 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Image Encryption Using Lorenz's Attractor and Fractional Fourier Transform\",\"authors\":\"Ökkeş Erdem Tekerek, Adem Tekerek\",\"doi\":\"10.1109/iisec54230.2021.9672362\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this study, a new image encryption and decoding algorithm is developed using fractional fourier transform, lorenz attractor and masking. In the proposed algorithm, firstly, the image is masked with a randomly generated mask and fractional fourier transform is applied to the masked image. These two processes were applied 3 times in a row, making the image more complex. The resulting image was then decomposed into 256 parts. 16 chaotic outputs were obtained from lorenz attractor. These outputs are calculated in base 256. The parts with the same index number as the output were selected and mixed among themselves. The scrambled image parts are combined and the encryption process is completed. The degree of the function applied in the algorithm is a rational number. The use of lorenz attractor provides chaotic outputs. These 2 features make the algorithm resistant to attacks. The use of a chaotic set of differential equations is reduced the probability of finding the scrambled method by an analytical approach and the linear predictability of the method for attacks on the scrambled image. The analysis of chaotically generated random numbers was made and produced successful results. The algorithm is confidential and usable against most common attacks such as brute force. The data contained in the key is encrypted using the RSA algorithm.\",\"PeriodicalId\":344273,\"journal\":{\"name\":\"2021 2nd International Informatics and Software Engineering Conference (IISEC)\",\"volume\":\"189 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-12-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 2nd International Informatics and Software Engineering Conference (IISEC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/iisec54230.2021.9672362\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 2nd International Informatics and Software Engineering Conference (IISEC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/iisec54230.2021.9672362","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

本文提出了一种基于分数阶傅立叶变换、洛伦兹吸引子和掩模的图像加解码算法。该算法首先用随机生成的掩码对图像进行掩码,并对掩码图像进行分数阶傅里叶变换。这两个过程连续应用3次,使图像更加复杂。然后将得到的图像分解为256个部分。利用洛伦兹吸引子得到16个混沌输出。这些输出以256为基数计算。选取与输出指标号相同的零件进行混合。将打乱后的图像部分组合起来,完成加密过程。该算法中应用的函数的度数是有理数。洛伦兹吸引子的使用提供了混沌输出。这两个特征使算法能够抵抗攻击。利用一组混沌微分方程,降低了用解析方法找到打乱方法的概率和打乱方法对打乱图像攻击的线性可预测性。对混沌产生的随机数进行了分析,并取得了成功的结果。该算法是保密的,可用于对付最常见的攻击,如暴力破解。密钥中包含的数据使用RSA算法加密。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Image Encryption Using Lorenz's Attractor and Fractional Fourier Transform
In this study, a new image encryption and decoding algorithm is developed using fractional fourier transform, lorenz attractor and masking. In the proposed algorithm, firstly, the image is masked with a randomly generated mask and fractional fourier transform is applied to the masked image. These two processes were applied 3 times in a row, making the image more complex. The resulting image was then decomposed into 256 parts. 16 chaotic outputs were obtained from lorenz attractor. These outputs are calculated in base 256. The parts with the same index number as the output were selected and mixed among themselves. The scrambled image parts are combined and the encryption process is completed. The degree of the function applied in the algorithm is a rational number. The use of lorenz attractor provides chaotic outputs. These 2 features make the algorithm resistant to attacks. The use of a chaotic set of differential equations is reduced the probability of finding the scrambled method by an analytical approach and the linear predictability of the method for attacks on the scrambled image. The analysis of chaotically generated random numbers was made and produced successful results. The algorithm is confidential and usable against most common attacks such as brute force. The data contained in the key is encrypted using the RSA algorithm.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信