一种基于时滞捕食者-猎物模型的高效图像加密算法

IF 2 3区 物理与天体物理 Q3 OPTICS
Jian Wang, Haixiao Wang, Jialin Chen, Wenjing Jiang, Runqiao Peng, Junseok Kim
{"title":"一种基于时滞捕食者-猎物模型的高效图像加密算法","authors":"Jian Wang,&nbsp;Haixiao Wang,&nbsp;Jialin Chen,&nbsp;Wenjing Jiang,&nbsp;Runqiao Peng,&nbsp;Junseok Kim","doi":"10.1007/s00340-025-08412-3","DOIUrl":null,"url":null,"abstract":"<div><p>An image encryption algorithm enhances the security of an image by transforming its content into a scrambled format. This process employs mathematical techniques, including chaos theory, permutation, and diffusion, to prevent unauthorized access or tampering. To improve the security of images during transmission, we introduce an efficient and innovative image encryption algorithm based on a time-delay predator–prey model, integrating principles from ecological dynamics into cryptography. By appropriately selecting parameters of the proposed predator–prey model, chaotic phenomena are generated. We use these chaotic sequences for image encryption and combine them with the Arnold scrambling algorithm to rearrange pixel positions within the image. Additionally, a diffusion algorithm is employed to alter pixel values, achieving the encryption effect. Various experimental analyses, such as initial value sensitivity, histogram analysis, adjacent pixel correlation, and overall robustness evaluations, are conducted. The computational experiments indicate that the chaotic sequence generated by the proposed predator–prey model can effectively implement image encryption with a favorable encryption effect. We present the results of the model on the best Number of Pixel Change Rate (NPCR) and Unified Average Change Intensity (UACI) scores for various selected test images. In the end, the average NPCR and average UACI are 99.6067% and 33.4687% respectively. We also calculated the value of the information entropy indicator, which reaches 7.9986. Through these empirical validations, the numerical results highlight the robustness and viability of using chaotic sequences in the context of image encryption, offering promising prospects for enhancing data security in digital transmission systems.</p></div>","PeriodicalId":474,"journal":{"name":"Applied Physics B","volume":"131 3","pages":""},"PeriodicalIF":2.0000,"publicationDate":"2025-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00340-025-08412-3.pdf","citationCount":"0","resultStr":"{\"title\":\"An efficient image encryption algorithm based on a time-delay predator–prey model\",\"authors\":\"Jian Wang,&nbsp;Haixiao Wang,&nbsp;Jialin Chen,&nbsp;Wenjing Jiang,&nbsp;Runqiao Peng,&nbsp;Junseok Kim\",\"doi\":\"10.1007/s00340-025-08412-3\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><p>An image encryption algorithm enhances the security of an image by transforming its content into a scrambled format. This process employs mathematical techniques, including chaos theory, permutation, and diffusion, to prevent unauthorized access or tampering. To improve the security of images during transmission, we introduce an efficient and innovative image encryption algorithm based on a time-delay predator–prey model, integrating principles from ecological dynamics into cryptography. By appropriately selecting parameters of the proposed predator–prey model, chaotic phenomena are generated. We use these chaotic sequences for image encryption and combine them with the Arnold scrambling algorithm to rearrange pixel positions within the image. Additionally, a diffusion algorithm is employed to alter pixel values, achieving the encryption effect. Various experimental analyses, such as initial value sensitivity, histogram analysis, adjacent pixel correlation, and overall robustness evaluations, are conducted. The computational experiments indicate that the chaotic sequence generated by the proposed predator–prey model can effectively implement image encryption with a favorable encryption effect. We present the results of the model on the best Number of Pixel Change Rate (NPCR) and Unified Average Change Intensity (UACI) scores for various selected test images. In the end, the average NPCR and average UACI are 99.6067% and 33.4687% respectively. We also calculated the value of the information entropy indicator, which reaches 7.9986. Through these empirical validations, the numerical results highlight the robustness and viability of using chaotic sequences in the context of image encryption, offering promising prospects for enhancing data security in digital transmission systems.</p></div>\",\"PeriodicalId\":474,\"journal\":{\"name\":\"Applied Physics B\",\"volume\":\"131 3\",\"pages\":\"\"},\"PeriodicalIF\":2.0000,\"publicationDate\":\"2025-02-19\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://link.springer.com/content/pdf/10.1007/s00340-025-08412-3.pdf\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Applied Physics B\",\"FirstCategoryId\":\"4\",\"ListUrlMain\":\"https://link.springer.com/article/10.1007/s00340-025-08412-3\",\"RegionNum\":3,\"RegionCategory\":\"物理与天体物理\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"OPTICS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Applied Physics B","FirstCategoryId":"4","ListUrlMain":"https://link.springer.com/article/10.1007/s00340-025-08412-3","RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"OPTICS","Score":null,"Total":0}
引用次数: 0

摘要

图像加密算法通过将图像内容转换为加密格式来增强图像的安全性。这个过程采用数学技术,包括混沌理论、排列和扩散,以防止未经授权的访问或篡改。为了提高图像在传输过程中的安全性,我们引入了一种基于时滞捕食者-猎物模型的高效创新图像加密算法,将生态动力学原理融入密码学。通过对所提出的捕食者-猎物模型参数的适当选择,产生了混沌现象。我们使用这些混沌序列进行图像加密,并将其与Arnold置乱算法相结合,重新排列图像中的像素位置。此外,采用扩散算法改变像素值,实现加密效果。进行了各种实验分析,如初始值敏感性、直方图分析、相邻像素相关性和总体稳健性评估。计算实验表明,该模型生成的混沌序列能够有效地实现图像加密,并具有良好的加密效果。我们给出了该模型对各种选定的测试图像的最佳像素变化率(NPCR)和统一平均变化强度(UACI)分数的结果。最终NPCR平均值为99.6067%,UACI平均值为33.4687%。我们还计算了信息熵指标的值,达到7.9986。通过这些经验验证,数值结果突出了在图像加密背景下使用混沌序列的鲁棒性和可行性,为提高数字传输系统的数据安全性提供了广阔的前景。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
An efficient image encryption algorithm based on a time-delay predator–prey model

An image encryption algorithm enhances the security of an image by transforming its content into a scrambled format. This process employs mathematical techniques, including chaos theory, permutation, and diffusion, to prevent unauthorized access or tampering. To improve the security of images during transmission, we introduce an efficient and innovative image encryption algorithm based on a time-delay predator–prey model, integrating principles from ecological dynamics into cryptography. By appropriately selecting parameters of the proposed predator–prey model, chaotic phenomena are generated. We use these chaotic sequences for image encryption and combine them with the Arnold scrambling algorithm to rearrange pixel positions within the image. Additionally, a diffusion algorithm is employed to alter pixel values, achieving the encryption effect. Various experimental analyses, such as initial value sensitivity, histogram analysis, adjacent pixel correlation, and overall robustness evaluations, are conducted. The computational experiments indicate that the chaotic sequence generated by the proposed predator–prey model can effectively implement image encryption with a favorable encryption effect. We present the results of the model on the best Number of Pixel Change Rate (NPCR) and Unified Average Change Intensity (UACI) scores for various selected test images. In the end, the average NPCR and average UACI are 99.6067% and 33.4687% respectively. We also calculated the value of the information entropy indicator, which reaches 7.9986. Through these empirical validations, the numerical results highlight the robustness and viability of using chaotic sequences in the context of image encryption, offering promising prospects for enhancing data security in digital transmission systems.

求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Applied Physics B
Applied Physics B 物理-光学
CiteScore
4.00
自引率
4.80%
发文量
202
审稿时长
3.0 months
期刊介绍: Features publication of experimental and theoretical investigations in applied physics Offers invited reviews in addition to regular papers Coverage includes laser physics, linear and nonlinear optics, ultrafast phenomena, photonic devices, optical and laser materials, quantum optics, laser spectroscopy of atoms, molecules and clusters, and more 94% of authors who answered a survey reported that they would definitely publish or probably publish in the journal again Publishing essential research results in two of the most important areas of applied physics, both Applied Physics sections figure among the top most cited journals in this field. In addition to regular papers Applied Physics B: Lasers and Optics features invited reviews. Fields of topical interest are covered by feature issues. The journal also includes a rapid communication section for the speedy publication of important and particularly interesting results.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信