{"title":"基于Lucas序列、S-Box和混沌理论的图像加密","authors":"Wassim Alexan, Mohamed ElBeltagy, Amr Aboshousha","doi":"10.1109/NICS54270.2021.9701533","DOIUrl":null,"url":null,"abstract":"The need for image encryption schemes that are of low computation complexity is ever increasing. Meanwhile, the use of chaotic functions and mathematical sequences to administer security has been shown to provide very good results in recent literature. This paper proposes a lightweight image encryption scheme that is based on 3 stages. The first stage incorporates the use of the Lucas sequence, the second stage incorporates the use of an S-box, while the third stage makes use of the Sin Logistic map. Performance evaluation of the proposed encryption scheme indicates great resistivity to various forms of attacks, attained at a low computation cost. This renders the proposed image encryption ideal for real-time applications. Furthermore, a comparison of the proposed scheme with the state-of-the-art indicates its superiority.","PeriodicalId":296963,"journal":{"name":"2021 8th NAFOSTED Conference on Information and Computer Science (NICS)","volume":"126 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"14","resultStr":"{\"title\":\"Image Encryption Through Lucas Sequence, S-Box and Chaos Theory\",\"authors\":\"Wassim Alexan, Mohamed ElBeltagy, Amr Aboshousha\",\"doi\":\"10.1109/NICS54270.2021.9701533\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The need for image encryption schemes that are of low computation complexity is ever increasing. Meanwhile, the use of chaotic functions and mathematical sequences to administer security has been shown to provide very good results in recent literature. This paper proposes a lightweight image encryption scheme that is based on 3 stages. The first stage incorporates the use of the Lucas sequence, the second stage incorporates the use of an S-box, while the third stage makes use of the Sin Logistic map. Performance evaluation of the proposed encryption scheme indicates great resistivity to various forms of attacks, attained at a low computation cost. This renders the proposed image encryption ideal for real-time applications. Furthermore, a comparison of the proposed scheme with the state-of-the-art indicates its superiority.\",\"PeriodicalId\":296963,\"journal\":{\"name\":\"2021 8th NAFOSTED Conference on Information and Computer Science (NICS)\",\"volume\":\"126 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-12-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"14\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 8th NAFOSTED Conference on Information and Computer Science (NICS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/NICS54270.2021.9701533\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 8th NAFOSTED Conference on Information and Computer Science (NICS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NICS54270.2021.9701533","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Image Encryption Through Lucas Sequence, S-Box and Chaos Theory
The need for image encryption schemes that are of low computation complexity is ever increasing. Meanwhile, the use of chaotic functions and mathematical sequences to administer security has been shown to provide very good results in recent literature. This paper proposes a lightweight image encryption scheme that is based on 3 stages. The first stage incorporates the use of the Lucas sequence, the second stage incorporates the use of an S-box, while the third stage makes use of the Sin Logistic map. Performance evaluation of the proposed encryption scheme indicates great resistivity to various forms of attacks, attained at a low computation cost. This renders the proposed image encryption ideal for real-time applications. Furthermore, a comparison of the proposed scheme with the state-of-the-art indicates its superiority.