基于2D-LCLM和周易八字的海上风电图像加密

IF 1.7 3区 计算机科学 Q3 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE
Lei Kou, Jinbo Wu, Fangfang Zhang, Peng Ji, Wende Ke, Junhe Wan, Hailin Liu, Yang Li, Quande Yuan
{"title":"基于2D-LCLM和周易八字的海上风电图像加密","authors":"Lei Kou, Jinbo Wu, Fangfang Zhang, Peng Ji, Wende Ke, Junhe Wan, Hailin Liu, Yang Li, Quande Yuan","doi":"10.1504/ijbic.2023.133505","DOIUrl":null,"url":null,"abstract":"Offshore wind power is an important part of the new power system. Due to the complex and changing situation in the oceans, its normal operation and maintenance cannot be done without information such as images; therefore, it is especially important to transmit the correct image in the process of information transmission. In this paper, we propose a new encryption algorithm for offshore wind power based on two-dimensional lagged complex logistic mapping (2D-LCLM) and Zhou Yi eight trigrams. Firstly, the initial value of the 2D-LCLM is constructed by the Sha-256 to associate the 2D-LCLM with the plaintext. Secondly, a new encryption rule is proposed from the Zhou Yi Eight Trigrams to obfuscate the pixel values and generate the round key. Then, 2D-LCLM is combined with the Zigzag to form an S-box. Finally, the simulation experiment of the algorithm is accomplished. The experimental results demonstrate that the algorithm is resistant to common attacks and has prefect encryption performance.","PeriodicalId":49059,"journal":{"name":"International Journal of Bio-Inspired Computation","volume":"27 1","pages":"0"},"PeriodicalIF":1.7000,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":"{\"title\":\"Image encryption for offshore wind power based on 2D-LCLM and Zhou Yi eight trigrams\",\"authors\":\"Lei Kou, Jinbo Wu, Fangfang Zhang, Peng Ji, Wende Ke, Junhe Wan, Hailin Liu, Yang Li, Quande Yuan\",\"doi\":\"10.1504/ijbic.2023.133505\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Offshore wind power is an important part of the new power system. Due to the complex and changing situation in the oceans, its normal operation and maintenance cannot be done without information such as images; therefore, it is especially important to transmit the correct image in the process of information transmission. In this paper, we propose a new encryption algorithm for offshore wind power based on two-dimensional lagged complex logistic mapping (2D-LCLM) and Zhou Yi eight trigrams. Firstly, the initial value of the 2D-LCLM is constructed by the Sha-256 to associate the 2D-LCLM with the plaintext. Secondly, a new encryption rule is proposed from the Zhou Yi Eight Trigrams to obfuscate the pixel values and generate the round key. Then, 2D-LCLM is combined with the Zigzag to form an S-box. Finally, the simulation experiment of the algorithm is accomplished. The experimental results demonstrate that the algorithm is resistant to common attacks and has prefect encryption performance.\",\"PeriodicalId\":49059,\"journal\":{\"name\":\"International Journal of Bio-Inspired Computation\",\"volume\":\"27 1\",\"pages\":\"0\"},\"PeriodicalIF\":1.7000,\"publicationDate\":\"2023-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"12\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Bio-Inspired Computation\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1504/ijbic.2023.133505\",\"RegionNum\":3,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Bio-Inspired Computation","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1504/ijbic.2023.133505","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE","Score":null,"Total":0}
引用次数: 12

摘要

海上风电是新型电力系统的重要组成部分。由于海洋形势复杂多变,其正常运行维护离不开图像等信息;因此,在信息传递的过程中,传递正确的图像就显得尤为重要。本文提出了一种基于二维滞后复杂逻辑映射(2D-LCLM)和周易八元组的海上风电加密算法。首先,通过Sha-256构造2D-LCLM的初始值,将2D-LCLM与明文相关联。其次,根据周易八卦图提出了一种新的加密规则,对像素值进行模糊处理并生成轮密钥;然后,将2D-LCLM与Zigzag结合形成s盒。最后,对该算法进行了仿真实验。实验结果表明,该算法能够抵抗常见的攻击,具有良好的加密性能。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Image encryption for offshore wind power based on 2D-LCLM and Zhou Yi eight trigrams
Offshore wind power is an important part of the new power system. Due to the complex and changing situation in the oceans, its normal operation and maintenance cannot be done without information such as images; therefore, it is especially important to transmit the correct image in the process of information transmission. In this paper, we propose a new encryption algorithm for offshore wind power based on two-dimensional lagged complex logistic mapping (2D-LCLM) and Zhou Yi eight trigrams. Firstly, the initial value of the 2D-LCLM is constructed by the Sha-256 to associate the 2D-LCLM with the plaintext. Secondly, a new encryption rule is proposed from the Zhou Yi Eight Trigrams to obfuscate the pixel values and generate the round key. Then, 2D-LCLM is combined with the Zigzag to form an S-box. Finally, the simulation experiment of the algorithm is accomplished. The experimental results demonstrate that the algorithm is resistant to common attacks and has prefect encryption performance.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
International Journal of Bio-Inspired Computation
International Journal of Bio-Inspired Computation COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE-COMPUTER SCIENCE, THEORY & METHODS
CiteScore
5.10
自引率
5.70%
发文量
37
审稿时长
>12 weeks
期刊介绍: IJBIC discusses the new bio-inspired computation methodologies derived from the animal and plant world, such as new algorithms mimicking the wolf schooling, the plant survival process, etc. Topics covered include: -New bio-inspired methodologies coming from creatures living in nature artificial society- physical/chemical phenomena- New bio-inspired methodology analysis tools, e.g. rough sets, stochastic processes- Brain-inspired methods: models and algorithms- Bio-inspired computation with big data: algorithms and structures- Applications associated with bio-inspired methodologies, e.g. bioinformatics.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信