基于多小波域Arnold变换和混沌理论的图像加密算法

Q2 Computer Science
Ali Akram Abdul-Kareem, W. A. M. Al-Jawher
{"title":"基于多小波域Arnold变换和混沌理论的图像加密算法","authors":"Ali Akram Abdul-Kareem, W. A. M. Al-Jawher","doi":"10.1080/1206212X.2023.2196902","DOIUrl":null,"url":null,"abstract":"Image encryption is essential for ensuring data transmission security over open public networks. Using Multi-Wavelet Transform, Arnold transform, and two chaotic systems, a novel color image encryption technology is designed in this paper. In the proposed algorithm, the primary color components of the input image undergo a multi-wave transform before the Arnold Transform confounds the sub-bands of each color component. Each color component is then divided into blocks shuffled in a predetermined order. Finally, the encrypted image is generated using secret keys derived from Nahrain’s and WAM’s chaotic systems. Notably, the initial conditions of the chaotic maps are generated using image data to increase the algorithm’s sensitivity to the input image. Security analyses conducted to validate the practicability of the new algorithm reveal that it possesses excellent encryption efficiency, high key sensitivity, and the ability to withstand a wide variety of attacks.","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"5 5 1","pages":"306 - 322"},"PeriodicalIF":0.0000,"publicationDate":"2023-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Image Encryption Algorithm Based on Arnold Transform and Chaos Theory in the Multi-wavelet Domain\",\"authors\":\"Ali Akram Abdul-Kareem, W. A. M. Al-Jawher\",\"doi\":\"10.1080/1206212X.2023.2196902\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Image encryption is essential for ensuring data transmission security over open public networks. Using Multi-Wavelet Transform, Arnold transform, and two chaotic systems, a novel color image encryption technology is designed in this paper. In the proposed algorithm, the primary color components of the input image undergo a multi-wave transform before the Arnold Transform confounds the sub-bands of each color component. Each color component is then divided into blocks shuffled in a predetermined order. Finally, the encrypted image is generated using secret keys derived from Nahrain’s and WAM’s chaotic systems. Notably, the initial conditions of the chaotic maps are generated using image data to increase the algorithm’s sensitivity to the input image. Security analyses conducted to validate the practicability of the new algorithm reveal that it possesses excellent encryption efficiency, high key sensitivity, and the ability to withstand a wide variety of attacks.\",\"PeriodicalId\":39673,\"journal\":{\"name\":\"International Journal of Computers and Applications\",\"volume\":\"5 5 1\",\"pages\":\"306 - 322\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-04-03\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Computers and Applications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1080/1206212X.2023.2196902\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"Computer Science\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Computers and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1080/1206212X.2023.2196902","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"Computer Science","Score":null,"Total":0}
引用次数: 2

摘要

在开放的公共网络中,图像加密是保证数据传输安全的关键。利用多小波变换、阿诺德变换和两个混沌系统,设计了一种新的彩色图像加密技术。该算法首先对输入图像的原色分量进行多波变换,然后用阿诺德变换混淆每个颜色分量的子带。然后将每种颜色成分按预先确定的顺序分成不同的块。最后,使用从Nahrain和WAM的混沌系统中导出的密钥生成加密图像。值得注意的是,混沌映射的初始条件是使用图像数据生成的,以提高算法对输入图像的灵敏度。为验证新算法的实用性而进行的安全分析表明,它具有出色的加密效率、高密钥灵敏度和承受各种攻击的能力。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Image Encryption Algorithm Based on Arnold Transform and Chaos Theory in the Multi-wavelet Domain
Image encryption is essential for ensuring data transmission security over open public networks. Using Multi-Wavelet Transform, Arnold transform, and two chaotic systems, a novel color image encryption technology is designed in this paper. In the proposed algorithm, the primary color components of the input image undergo a multi-wave transform before the Arnold Transform confounds the sub-bands of each color component. Each color component is then divided into blocks shuffled in a predetermined order. Finally, the encrypted image is generated using secret keys derived from Nahrain’s and WAM’s chaotic systems. Notably, the initial conditions of the chaotic maps are generated using image data to increase the algorithm’s sensitivity to the input image. Security analyses conducted to validate the practicability of the new algorithm reveal that it possesses excellent encryption efficiency, high key sensitivity, and the ability to withstand a wide variety of attacks.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
International Journal of Computers and Applications
International Journal of Computers and Applications Computer Science-Computer Graphics and Computer-Aided Design
CiteScore
4.70
自引率
0.00%
发文量
20
期刊介绍: The International Journal of Computers and Applications (IJCA) is a unique platform for publishing novel ideas, research outcomes and fundamental advances in all aspects of Computer Science, Computer Engineering, and Computer Applications. This is a peer-reviewed international journal with a vision to provide the academic and industrial community a platform for presenting original research ideas and applications. IJCA welcomes four special types of papers in addition to the regular research papers within its scope: (a) Papers for which all results could be easily reproducible. For such papers, the authors will be asked to upload "instructions for reproduction'''', possibly with the source codes or stable URLs (from where the codes could be downloaded). (b) Papers with negative results. For such papers, the experimental setting and negative results must be presented in detail. Also, why the negative results are important for the research community must be explained clearly. The rationale behind this kind of paper is that this would help researchers choose the correct approaches to solve problems and avoid the (already worked out) failed approaches. (c) Detailed report, case study and literature review articles about innovative software / hardware, new technology, high impact computer applications and future development with sufficient background and subject coverage. (d) Special issue papers focussing on a particular theme with significant importance or papers selected from a relevant conference with sufficient improvement and new material to differentiate from the papers published in a conference proceedings.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信