Zhiqiang Cheng, Wencheng Wang, Yuezhang Dai, Lun Li
{"title":"一种基于混沌和双重加密策略的高安全隐私图像加密算法","authors":"Zhiqiang Cheng, Wencheng Wang, Yuezhang Dai, Lun Li","doi":"10.1155/2022/9040702","DOIUrl":null,"url":null,"abstract":"Faces are widely used in information recognition and other fields. Due to the openness of the Internet, ensuring that face information is not stolen by criminals is a hot issue. The traditional encryption method only encrypts the whole area of the image and ignores some features of the face. This paper proposes a double-encrypted face image encryption algorithm. The contour features of the face are extracted, followed by two rounds of encryption. The first round of encryption algorithm encrypts the identified face image, and the second round of encryption algorithm encrypts the entire image. The encryption algorithm used is scrambling and diffusion at the same time, and the keystream of the cryptosystem is generated by 2D SF-SIMM. The design structure of this cryptosystem increases security, and the attacker needs to crack two rounds of the algorithm to get the original face image.","PeriodicalId":14766,"journal":{"name":"J. Appl. Math.","volume":"19 1","pages":"9040702:1-9040702:14"},"PeriodicalIF":0.0000,"publicationDate":"2022-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"A High-Security Privacy Image Encryption Algorithm Based on Chaos and Double Encryption Strategy\",\"authors\":\"Zhiqiang Cheng, Wencheng Wang, Yuezhang Dai, Lun Li\",\"doi\":\"10.1155/2022/9040702\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Faces are widely used in information recognition and other fields. Due to the openness of the Internet, ensuring that face information is not stolen by criminals is a hot issue. The traditional encryption method only encrypts the whole area of the image and ignores some features of the face. This paper proposes a double-encrypted face image encryption algorithm. The contour features of the face are extracted, followed by two rounds of encryption. The first round of encryption algorithm encrypts the identified face image, and the second round of encryption algorithm encrypts the entire image. The encryption algorithm used is scrambling and diffusion at the same time, and the keystream of the cryptosystem is generated by 2D SF-SIMM. The design structure of this cryptosystem increases security, and the attacker needs to crack two rounds of the algorithm to get the original face image.\",\"PeriodicalId\":14766,\"journal\":{\"name\":\"J. Appl. Math.\",\"volume\":\"19 1\",\"pages\":\"9040702:1-9040702:14\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-07-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"J. Appl. Math.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1155/2022/9040702\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"J. Appl. Math.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1155/2022/9040702","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A High-Security Privacy Image Encryption Algorithm Based on Chaos and Double Encryption Strategy
Faces are widely used in information recognition and other fields. Due to the openness of the Internet, ensuring that face information is not stolen by criminals is a hot issue. The traditional encryption method only encrypts the whole area of the image and ignores some features of the face. This paper proposes a double-encrypted face image encryption algorithm. The contour features of the face are extracted, followed by two rounds of encryption. The first round of encryption algorithm encrypts the identified face image, and the second round of encryption algorithm encrypts the entire image. The encryption algorithm used is scrambling and diffusion at the same time, and the keystream of the cryptosystem is generated by 2D SF-SIMM. The design structure of this cryptosystem increases security, and the attacker needs to crack two rounds of the algorithm to get the original face image.