{"title":"可逆自适应混沌多图像隐私保护方案,用于各种图像的高效批量加密","authors":"Defeng Jiang, Shaohui Yan","doi":"10.1016/j.matcom.2025.05.017","DOIUrl":null,"url":null,"abstract":"<div><div>Addressing the limitations of traditional encryption algorithms with fixed structures, this paper proposes a multi-image encryption scheme based on chaotic map. This scheme allows users to input multiple images of varying sizes and types, which are then encrypted into a single noise-like image stored on a cloud platform. First, a three-dimensional hyperchaotic memristor map with excellent randomness is constructed. Through the proposed key-initial value generation mechanism based on the SHA-384 hash algorithm, the user’s provided key is converted into an initial value to generate the chaotic sequence used for encryption. Subsequently, multiple input images are pre-processed and concatenated into a large plaintext image, which undergoes bit-level adaptive domain diffusion and chaotic index-Zigzag composite scrambling to produce the final ciphertext image. The algorithm introduces adaptive encryption parameter that control the size of the traversal matrix and the rule matrix based on the input images. By transforming large matrix operations into multiple smaller matrix operations, the encryption process is dynamically adjusted and computational resources are optimized, thereby enhancing both the flexibility and efficiency of the algorithm. Finally, security analyses with multiple groups of test images show excellent performance across all metrics. Notably, the scheme can encrypt 50 images in 25.8 seconds, demonstrating remarkable efficiency.</div></div>","PeriodicalId":49856,"journal":{"name":"Mathematics and Computers in Simulation","volume":"238 ","pages":"Pages 201-221"},"PeriodicalIF":4.4000,"publicationDate":"2025-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Reversible adaptive chaotic multi-image privacy protection scheme for efficient batch encryption of various images\",\"authors\":\"Defeng Jiang, Shaohui Yan\",\"doi\":\"10.1016/j.matcom.2025.05.017\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>Addressing the limitations of traditional encryption algorithms with fixed structures, this paper proposes a multi-image encryption scheme based on chaotic map. This scheme allows users to input multiple images of varying sizes and types, which are then encrypted into a single noise-like image stored on a cloud platform. First, a three-dimensional hyperchaotic memristor map with excellent randomness is constructed. Through the proposed key-initial value generation mechanism based on the SHA-384 hash algorithm, the user’s provided key is converted into an initial value to generate the chaotic sequence used for encryption. Subsequently, multiple input images are pre-processed and concatenated into a large plaintext image, which undergoes bit-level adaptive domain diffusion and chaotic index-Zigzag composite scrambling to produce the final ciphertext image. The algorithm introduces adaptive encryption parameter that control the size of the traversal matrix and the rule matrix based on the input images. By transforming large matrix operations into multiple smaller matrix operations, the encryption process is dynamically adjusted and computational resources are optimized, thereby enhancing both the flexibility and efficiency of the algorithm. Finally, security analyses with multiple groups of test images show excellent performance across all metrics. Notably, the scheme can encrypt 50 images in 25.8 seconds, demonstrating remarkable efficiency.</div></div>\",\"PeriodicalId\":49856,\"journal\":{\"name\":\"Mathematics and Computers in Simulation\",\"volume\":\"238 \",\"pages\":\"Pages 201-221\"},\"PeriodicalIF\":4.4000,\"publicationDate\":\"2025-05-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Mathematics and Computers in Simulation\",\"FirstCategoryId\":\"100\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S0378475425002009\",\"RegionNum\":2,\"RegionCategory\":\"数学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Mathematics and Computers in Simulation","FirstCategoryId":"100","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0378475425002009","RegionNum":2,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS","Score":null,"Total":0}
Reversible adaptive chaotic multi-image privacy protection scheme for efficient batch encryption of various images
Addressing the limitations of traditional encryption algorithms with fixed structures, this paper proposes a multi-image encryption scheme based on chaotic map. This scheme allows users to input multiple images of varying sizes and types, which are then encrypted into a single noise-like image stored on a cloud platform. First, a three-dimensional hyperchaotic memristor map with excellent randomness is constructed. Through the proposed key-initial value generation mechanism based on the SHA-384 hash algorithm, the user’s provided key is converted into an initial value to generate the chaotic sequence used for encryption. Subsequently, multiple input images are pre-processed and concatenated into a large plaintext image, which undergoes bit-level adaptive domain diffusion and chaotic index-Zigzag composite scrambling to produce the final ciphertext image. The algorithm introduces adaptive encryption parameter that control the size of the traversal matrix and the rule matrix based on the input images. By transforming large matrix operations into multiple smaller matrix operations, the encryption process is dynamically adjusted and computational resources are optimized, thereby enhancing both the flexibility and efficiency of the algorithm. Finally, security analyses with multiple groups of test images show excellent performance across all metrics. Notably, the scheme can encrypt 50 images in 25.8 seconds, demonstrating remarkable efficiency.
期刊介绍:
The aim of the journal is to provide an international forum for the dissemination of up-to-date information in the fields of the mathematics and computers, in particular (but not exclusively) as they apply to the dynamics of systems, their simulation and scientific computation in general. Published material ranges from short, concise research papers to more general tutorial articles.
Mathematics and Computers in Simulation, published monthly, is the official organ of IMACS, the International Association for Mathematics and Computers in Simulation (Formerly AICA). This Association, founded in 1955 and legally incorporated in 1956 is a member of FIACC (the Five International Associations Coordinating Committee), together with IFIP, IFAV, IFORS and IMEKO.
Topics covered by the journal include mathematical tools in:
•The foundations of systems modelling
•Numerical analysis and the development of algorithms for simulation
They also include considerations about computer hardware for simulation and about special software and compilers.
The journal also publishes articles concerned with specific applications of modelling and simulation in science and engineering, with relevant applied mathematics, the general philosophy of systems simulation, and their impact on disciplinary and interdisciplinary research.
The journal includes a Book Review section -- and a "News on IMACS" section that contains a Calendar of future Conferences/Events and other information about the Association.