Next Article in Journal
Principal Connection Between Typical Heart Rate Variability Parameters as Revealed by a Comparative Analysis of Their Heart Rate and Age Dependence
Previous Article in Journal
Hybrid Galam–Bass Model for Technology Innovation
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
This is an early access version, the complete PDF, HTML, and XML versions will be available soon.
Article

Image Privacy Protection Communication Scheme by Fibonacci Interleaved Diffusion and Non-Degenerate Discrete Chaos

1
School of Electronic Information, University of Electronic Science and Technology of China Zhongshan Institute, Zhongshan 528402, China
2
School of Information and Communication Engineering, University of Electronic Science and Technology of China, Chengdu 611731, China
3
School of Automation, Guangdong University of Technology, Guangzhou 510006, China
*
Author to whom correspondence should be addressed.
Entropy 2025, 27(8), 790; https://doi.org/10.3390/e27080790
Submission received: 23 June 2025 / Revised: 21 July 2025 / Accepted: 24 July 2025 / Published: 25 July 2025

Abstract

The rapid development of network communication technology has led to an increased focus on the security of image storage and transmission in multimedia information. This paper proposes an enhanced image security communication scheme based on Fibonacci interleaved diffusion and non-degenerate chaotic system to address the inadequacy of current image encryption technology. The scheme utilizes a hash function to extract the hash characteristic values of the plaintext image, generating initial perturbation keys to drive the chaotic system to generate initial pseudo-random sequences. Subsequently, the input image is subjected to a light scrambling process at the bit level. The Q matrix generated by the Fibonacci sequence is then employed to diffuse the obtained intermediate cipher image. The final ciphertext image is then generated by random direction confusion. Throughout the encryption process, plaintext correlation mechanisms are employed. Consequently, due to the feedback loop of the plaintext, this algorithm is capable of resisting known-plaintext attacks and chosen-plaintext attacks. Theoretical analysis and empirical results demonstrate that the algorithm fulfils the cryptographic requirements of confusion, diffusion, and avalanche effects, while also exhibiting a robust password space and excellent numerical statistical properties. Consequently, the security enhancement mechanism based on Fibonacci interleaved diffusion and non-degenerate chaotic system proposed in this paper effectively enhances the algorithm’s resistance to cryptographic attacks.
Keywords: nonlinear dynamics; image encryption; privacy-preserving; information security; cryptography nonlinear dynamics; image encryption; privacy-preserving; information security; cryptography

Share and Cite

MDPI and ACS Style

Xie, Z.; Xie, W.; Cheng, X.; Yuan, Z.; Cheng, W.; Lin, Y. Image Privacy Protection Communication Scheme by Fibonacci Interleaved Diffusion and Non-Degenerate Discrete Chaos. Entropy 2025, 27, 790. https://doi.org/10.3390/e27080790

AMA Style

Xie Z, Xie W, Cheng X, Yuan Z, Cheng W, Lin Y. Image Privacy Protection Communication Scheme by Fibonacci Interleaved Diffusion and Non-Degenerate Discrete Chaos. Entropy. 2025; 27(8):790. https://doi.org/10.3390/e27080790

Chicago/Turabian Style

Xie, Zhiyu, Weihong Xie, Xiyuan Cheng, Zhengqin Yuan, Wenbin Cheng, and Yiting Lin. 2025. "Image Privacy Protection Communication Scheme by Fibonacci Interleaved Diffusion and Non-Degenerate Discrete Chaos" Entropy 27, no. 8: 790. https://doi.org/10.3390/e27080790

APA Style

Xie, Z., Xie, W., Cheng, X., Yuan, Z., Cheng, W., & Lin, Y. (2025). Image Privacy Protection Communication Scheme by Fibonacci Interleaved Diffusion and Non-Degenerate Discrete Chaos. Entropy, 27(8), 790. https://doi.org/10.3390/e27080790

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop