Lei Kou, Jinbo Wu, Fangfang Zhang, Peng Ji, Wende Ke, Junhe Wan, Hailin Liu, Yang Li, Quande Yuan
{"title":"基于2D-LCLM和周易八字的海上风电图像加密","authors":"Lei Kou, Jinbo Wu, Fangfang Zhang, Peng Ji, Wende Ke, Junhe Wan, Hailin Liu, Yang Li, Quande Yuan","doi":"10.1504/ijbic.2023.133505","DOIUrl":null,"url":null,"abstract":"Offshore wind power is an important part of the new power system. Due to the complex and changing situation in the oceans, its normal operation and maintenance cannot be done without information such as images; therefore, it is especially important to transmit the correct image in the process of information transmission. In this paper, we propose a new encryption algorithm for offshore wind power based on two-dimensional lagged complex logistic mapping (2D-LCLM) and Zhou Yi eight trigrams. Firstly, the initial value of the 2D-LCLM is constructed by the Sha-256 to associate the 2D-LCLM with the plaintext. Secondly, a new encryption rule is proposed from the Zhou Yi Eight Trigrams to obfuscate the pixel values and generate the round key. Then, 2D-LCLM is combined with the Zigzag to form an S-box. Finally, the simulation experiment of the algorithm is accomplished. The experimental results demonstrate that the algorithm is resistant to common attacks and has prefect encryption performance.","PeriodicalId":49059,"journal":{"name":"International Journal of Bio-Inspired Computation","volume":"27 1","pages":"0"},"PeriodicalIF":1.7000,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":"{\"title\":\"Image encryption for offshore wind power based on 2D-LCLM and Zhou Yi eight trigrams\",\"authors\":\"Lei Kou, Jinbo Wu, Fangfang Zhang, Peng Ji, Wende Ke, Junhe Wan, Hailin Liu, Yang Li, Quande Yuan\",\"doi\":\"10.1504/ijbic.2023.133505\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Offshore wind power is an important part of the new power system. Due to the complex and changing situation in the oceans, its normal operation and maintenance cannot be done without information such as images; therefore, it is especially important to transmit the correct image in the process of information transmission. In this paper, we propose a new encryption algorithm for offshore wind power based on two-dimensional lagged complex logistic mapping (2D-LCLM) and Zhou Yi eight trigrams. Firstly, the initial value of the 2D-LCLM is constructed by the Sha-256 to associate the 2D-LCLM with the plaintext. Secondly, a new encryption rule is proposed from the Zhou Yi Eight Trigrams to obfuscate the pixel values and generate the round key. Then, 2D-LCLM is combined with the Zigzag to form an S-box. Finally, the simulation experiment of the algorithm is accomplished. The experimental results demonstrate that the algorithm is resistant to common attacks and has prefect encryption performance.\",\"PeriodicalId\":49059,\"journal\":{\"name\":\"International Journal of Bio-Inspired Computation\",\"volume\":\"27 1\",\"pages\":\"0\"},\"PeriodicalIF\":1.7000,\"publicationDate\":\"2023-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"12\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Bio-Inspired Computation\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1504/ijbic.2023.133505\",\"RegionNum\":3,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Bio-Inspired Computation","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1504/ijbic.2023.133505","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE","Score":null,"Total":0}
Image encryption for offshore wind power based on 2D-LCLM and Zhou Yi eight trigrams
Offshore wind power is an important part of the new power system. Due to the complex and changing situation in the oceans, its normal operation and maintenance cannot be done without information such as images; therefore, it is especially important to transmit the correct image in the process of information transmission. In this paper, we propose a new encryption algorithm for offshore wind power based on two-dimensional lagged complex logistic mapping (2D-LCLM) and Zhou Yi eight trigrams. Firstly, the initial value of the 2D-LCLM is constructed by the Sha-256 to associate the 2D-LCLM with the plaintext. Secondly, a new encryption rule is proposed from the Zhou Yi Eight Trigrams to obfuscate the pixel values and generate the round key. Then, 2D-LCLM is combined with the Zigzag to form an S-box. Finally, the simulation experiment of the algorithm is accomplished. The experimental results demonstrate that the algorithm is resistant to common attacks and has prefect encryption performance.
期刊介绍:
IJBIC discusses the new bio-inspired computation methodologies derived from the animal and plant world, such as new algorithms mimicking the wolf schooling, the plant survival process, etc.
Topics covered include:
-New bio-inspired methodologies coming from
creatures living in nature
artificial society-
physical/chemical phenomena-
New bio-inspired methodology analysis tools, e.g. rough sets, stochastic processes-
Brain-inspired methods: models and algorithms-
Bio-inspired computation with big data: algorithms and structures-
Applications associated with bio-inspired methodologies, e.g. bioinformatics.