Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (24)

Search Parameters:
Keywords = bit-level scramble

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
26 pages, 12944 KB  
Article
A 5D Fractional-Order Memristive Neural Network for Satellite Image Encryption Using Dynamic DNA Encoding and Bidirectional Diffusion
by Jinghui Ding, Yanping Zhu, Weiquan Yin, Dazhe He, Fayu Wan and Gangyi Tu
Fractal Fract. 2026, 10(4), 216; https://doi.org/10.3390/fractalfract10040216 - 26 Mar 2026
Viewed by 337
Abstract
To address the high redundancy and weak security inherent in satellite image transmission, this paper proposes an image encryption algorithm founded on a novel five-dimensional fractional-order cosine memristive Hopfield neural network (5D-FOCMHNN). The constructed hyperchaotic system exhibits long-term memory and multistability, capable of [...] Read more.
To address the high redundancy and weak security inherent in satellite image transmission, this paper proposes an image encryption algorithm founded on a novel five-dimensional fractional-order cosine memristive Hopfield neural network (5D-FOCMHNN). The constructed hyperchaotic system exhibits long-term memory and multistability, capable of generating reconfigurable multi-scroll attractors. A multivariate bit-level scrambling strategy effectively disrupts pixel correlations using neuron state sequences. Furthermore, the system’s chaotic output dynamically governs DNA encoding rules, while a bidirectional diffusion mechanism ensures strong randomization and resistance to differential attacks. Comprehensive experiments demonstrate that the 5D-FOCMHNN-based scheme provides a key space of 2256, has an information entropy approaching the ideal value of 8, and exhibits robust resilience against cropping, noise, and statistical cryptanalysis, thereby providing a highly secure solution for satellite image transmission. Full article
Show Figures

Figure 1

37 pages, 25662 KB  
Article
A Hyperspectral Remote Sensing Image Encryption Algorithm Based on a Novel Two-Dimensional Hyperchaotic Map
by Zongyue Bai, Qingzhan Zhao, Wenzhong Tian, Xuewen Wang, Jingyang Li and Yuzhen Wu
Entropy 2025, 27(11), 1117; https://doi.org/10.3390/e27111117 - 30 Oct 2025
Cited by 2 | Viewed by 833
Abstract
With the rapid advancement of hyperspectral remote sensing technology, the security of hyperspectral images (HSIs) has become a critical concern. However, traditional image encryption methods—designed primarily for grayscale or RGB images—fail to address the high dimensionality, large data volume, and spectral-domain characteristics inherent [...] Read more.
With the rapid advancement of hyperspectral remote sensing technology, the security of hyperspectral images (HSIs) has become a critical concern. However, traditional image encryption methods—designed primarily for grayscale or RGB images—fail to address the high dimensionality, large data volume, and spectral-domain characteristics inherent to HSIs. Existing chaotic encryption schemes often suffer from limited chaotic performance, narrow parameter ranges, and inadequate spectral protection, leaving HSIs vulnerable to spectral feature extraction and statistical attacks. To overcome these limitations, this paper proposes a novel hyperspectral image encryption algorithm based on a newly designed two-dimensional cross-coupled hyperchaotic map (2D-CSCM), which synergistically integrates Cubic, Sinusoidal, and Chebyshev maps. The 2D-CSCM exhibits superior hyperchaotic behavior, including a wider hyperchaotic parameter range, enhanced randomness, and higher complexity, as validated by Lyapunov exponents, sample entropy, and NIST tests. Building on this, a layered encryption framework is introduced: spectral-band scrambling to conceal spectral curves while preserving spatial structure, spatial pixel permutation to disrupt correlation, and a bit-level diffusion mechanism based on dynamic DNA encoding, specifically designed to secure high bit-depth digital number (DN) values (typically >8 bits). Experimental results on multiple HSI datasets demonstrate that the proposed algorithm achieves near-ideal information entropy (up to 15.8107 for 16-bit data), negligible adjacent-pixel correlation (below 0.01), and strong resistance to statistical, cropping, and differential attacks (NPCR ≈ 99.998%, UACI ≈ 33.30%). The algorithm not only ensures comprehensive encryption of both spectral and spatial information but also supports lossless decryption, offering a robust and practical solution for secure storage and transmission of hyperspectral remote sensing imagery. Full article
(This article belongs to the Section Signal and Data Analysis)
Show Figures

Figure 1

23 pages, 16115 KB  
Article
Image Privacy Protection Communication Scheme by Fibonacci Interleaved Diffusion and Non-Degenerate Discrete Chaos
by Zhiyu Xie, Weihong Xie, Xiyuan Cheng, Zhengqin Yuan, Wenbin Cheng and Yiting Lin
Entropy 2025, 27(8), 790; https://doi.org/10.3390/e27080790 - 25 Jul 2025
Cited by 4 | Viewed by 1061
Abstract
The rapid development of network communication technology has led to an increased focus on the security of image storage and transmission in multimedia information. This paper proposes an enhanced image security communication scheme based on Fibonacci interleaved diffusion and non-degenerate chaotic system to [...] Read more.
The rapid development of network communication technology has led to an increased focus on the security of image storage and transmission in multimedia information. This paper proposes an enhanced image security communication scheme based on Fibonacci interleaved diffusion and non-degenerate chaotic system to address the inadequacy of current image encryption technology. The scheme utilizes a hash function to extract the hash characteristic values of the plaintext image, generating initial perturbation keys to drive the chaotic system to generate initial pseudo-random sequences. Subsequently, the input image is subjected to a light scrambling process at the bit level. The Q matrix generated by the Fibonacci sequence is then employed to diffuse the obtained intermediate cipher image. The final ciphertext image is then generated by random direction confusion. Throughout the encryption process, plaintext correlation mechanisms are employed. Consequently, due to the feedback loop of the plaintext, this algorithm is capable of resisting known-plaintext attacks and chosen-plaintext attacks. Theoretical analysis and empirical results demonstrate that the algorithm fulfils the cryptographic requirements of confusion, diffusion, and avalanche effects, while also exhibiting a robust password space and excellent numerical statistical properties. Consequently, the security enhancement mechanism based on Fibonacci interleaved diffusion and non-degenerate chaotic system proposed in this paper effectively enhances the algorithm’s resistance to cryptographic attacks. Full article
Show Figures

Figure 1

33 pages, 10379 KB  
Article
A DNA Encoding Image Encryption Algorithm Based on Chaos
by Li Huang, Cong Ding, Zhenjie Bao, Haitao Chen and Changsheng Wan
Mathematics 2025, 13(8), 1330; https://doi.org/10.3390/math13081330 - 18 Apr 2025
Cited by 12 | Viewed by 2369
Abstract
With the development of society and the Internet, images have become an important medium for information exchange. To improve the security of image encryption and transmission, a new image encryption algorithm based on bit-plane decomposition, DNA encoding and the 5D Hamiltonian conservative chaotic [...] Read more.
With the development of society and the Internet, images have become an important medium for information exchange. To improve the security of image encryption and transmission, a new image encryption algorithm based on bit-plane decomposition, DNA encoding and the 5D Hamiltonian conservative chaotic system is proposed. This encryption scheme is different from the traditional scrambling and diffusion methods at the level of image spatial pixels but encodes images into DNA strands and completely scrambles and diffuses operations on the DNA strands to ensure the security of images and improve the efficiency of image encryption. Firstly, the initial value sequence and convolution kernel of the five-dimensional Hamiltonian conservative chaotic system are obtained using SHA-256. Secondly, the bit-plane decomposition is used to decompose the image into high-bit and low-bit-planes, combine with DNA encoding to generate DNA strands, hide the large amount of valid information contained in the high-bit-planes, and preliminarily complete the hiding of the image information. In order to further ensure the effect of image encryption, seven DNA operation index tables controlling the diffusion process of the DNA strands are constructed based on the DNA operation rules. Finally, the scrambled and diffused DNA strand is decomposed into multiple bit-planes to reconstruct an encrypted image. The experimental results and security analysis show that this algorithm has a large enough key space, strong key sensitivity, high image encryption quality, strong robustness and high encryption efficiency. In addition, it can resist statistical attacks, differential attacks, and common attacks such as cropping attack, noise attack and classical attack. Full article
(This article belongs to the Special Issue Information Security and Image Processing)
Show Figures

Figure 1

22 pages, 26819 KB  
Article
A New Chaotic Color Image Encryption Algorithm Based on Memristor Model and Random Hybrid Transforms
by Yexia Yao, Xuemei Xu and Zhaohui Jiang
Appl. Sci. 2025, 15(2), 913; https://doi.org/10.3390/app15020913 - 17 Jan 2025
Cited by 8 | Viewed by 2137
Abstract
This paper skillfully incorporates the memristor model into a chaotic system, creating a two-dimensional (2D) hyperchaotic map. The system’s exceptional chaotic performance is verified through methods such as phase diagrams, bifurcation diagrams, and Lyapunov exponential spectrum. Additionally, a universal framework corresponding to the [...] Read more.
This paper skillfully incorporates the memristor model into a chaotic system, creating a two-dimensional (2D) hyperchaotic map. The system’s exceptional chaotic performance is verified through methods such as phase diagrams, bifurcation diagrams, and Lyapunov exponential spectrum. Additionally, a universal framework corresponding to the chaotic system is proposed. To enhance encryption security, the pixel values of the image are preprocessed, and a hash function is used to generate a hash value, which is then incorporated into the secret keys generation process. Existing algorithms typically encrypt the three channels of a color image separately or perform encryption only at the pixel level, resulting in certain limitations in encryption effectiveness. To address this, this paper proposes a novel encryption algorithm based on 2D hyperchaotic maps that extends from single-channel encryption to multi-channel encryption (SEME-TDHM). The SEME-TDHM algorithm combines single-channel and multi-channel random scrambling, followed by local cross-diffusion of pixel values across different planes. By integrating both pixel-level and bit-level diffusion, the randomness of the image information distribution is significantly increased. Finally, the diffusion matrix is decomposed and restored to generate the encrypted color image. Simulation results and comparative analyses demonstrate that the SEME-TDHM algorithm outperforms existing algorithms in terms of encryption effectiveness. The encrypted image maintains a stable information entropy around 7.999, with average NPCR and UACI values close to the ideal benchmarks of 99.6169% and 33.4623%, respectively, further affirming its outstanding encryption effectiveness. Additionally, the histogram of the encrypted image shows a uniform distribution, and the correlation coefficient is nearly zero. These findings indicate that the SEME-TDHM algorithm successfully encrypts color images, providing strong security and practical utility. Full article
(This article belongs to the Special Issue Signal and Image Processing: From Theory to Applications)
Show Figures

Figure 1

24 pages, 14297 KB  
Article
Image Encryption Method Based on Three-Dimensional Chaotic Systems and V-Shaped Scrambling
by Lei Wang, Wenjun Song, Jiali Di, Xuncai Zhang and Chengye Zou
Entropy 2025, 27(1), 84; https://doi.org/10.3390/e27010084 - 17 Jan 2025
Cited by 12 | Viewed by 2126
Abstract
With the increasing importance of securing images during network transmission, this paper introduces a novel image encryption algorithm that integrates a 3D chaotic system with V-shaped scrambling techniques. The proposed method begins by constructing a unique 3D chaotic system to generate chaotic sequences [...] Read more.
With the increasing importance of securing images during network transmission, this paper introduces a novel image encryption algorithm that integrates a 3D chaotic system with V-shaped scrambling techniques. The proposed method begins by constructing a unique 3D chaotic system to generate chaotic sequences for encryption. These sequences determine a random starting point for V-shaped scrambling, which facilitates the transformation of image pixels into quaternary numbers. Subsequently, four innovative bit-level scrambling strategies are employed to enhance encryption strength. To further improve randomness, DNA encoding is applied to both the image and chaotic sequences, with chaotic sequences directing crossover and DNA operations. Ciphertext feedback is then utilized to propagate changes across the image, ensuring increased complexity and security. Extensive simulation experiments validate the algorithm’s robust encryption performance for grayscale images, yielding uniformly distributed histograms, near-zero correlation values, and an information entropy value of 7.9975, approaching the ideal threshold. The algorithm also features a large key space, providing robust protection against brute force attacks while effectively resisting statistical, differential, noise, and cropping attacks. These results affirm the algorithm’s reliability and security for image communication and transmission. Full article
Show Figures

Figure 1

31 pages, 28677 KB  
Article
Color Image Encryption Based on an Evolutionary Codebook and Chaotic Systems
by Yuan Cao and Yinglei Song
Entropy 2024, 26(7), 597; https://doi.org/10.3390/e26070597 - 12 Jul 2024
Cited by 2 | Viewed by 1827
Abstract
Encryption of images is an important method that can effectively improve the security and privacy of crucial image data. Existing methods generally encrypt an image with a combination of scrambling and encoding operations. Currently, many applications require highly secure results for image encryption. [...] Read more.
Encryption of images is an important method that can effectively improve the security and privacy of crucial image data. Existing methods generally encrypt an image with a combination of scrambling and encoding operations. Currently, many applications require highly secure results for image encryption. New methods that can achieve improved randomness for both the scrambling and encoding processes in encryption are thus needed to further enhance the security of a cipher image. This paper proposes a new method that can securely encrypt color images. As the first step of the proposed method, a complete bit-level operation is utilized to scramble the binary bits in a color image to a full extent. For the second step, the bits in the scrambled image are processed with a sweeping operation to improve the encryption security. In the final step of encryption, a codebook that varies with evolutionary operations based on several chaotic systems is utilized to encrypt the partially encrypted image obtained in the second step. Experimental results on benchmark color images suggest that this new approach can securely encrypt color images and generate cipher images that remain secure under different types of attacks. The proposed approach is compared with several other state-of-the-art encryption approaches and the results show that it can achieve improved encryption security for cipher images. Experimental results thus suggest that this new approach can possibly be utilized practically in applications where color images need to be encrypted for content protection. Full article
Show Figures

Figure 1

15 pages, 7046 KB  
Article
Fast Encryption Algorithm Based on Chaotic System and Cyclic Shift in Integer Wavelet Domain
by Yuan-Min Li, Yang Deng, Mingjie Jiang and Deyun Wei
Fractal Fract. 2024, 8(2), 75; https://doi.org/10.3390/fractalfract8020075 - 24 Jan 2024
Cited by 16 | Viewed by 2596
Abstract
This paper introduces a new fast image encryption scheme based on a chaotic system and cyclic shift in the integer wavelet domain. In order to increase the effectiveness and security of encryption, we propose a new diffusion scheme by using bidirectional diffusion and [...] Read more.
This paper introduces a new fast image encryption scheme based on a chaotic system and cyclic shift in the integer wavelet domain. In order to increase the effectiveness and security of encryption, we propose a new diffusion scheme by using bidirectional diffusion and cyclic shift and apply it to our encryption scheme. First, a two-level integer wavelet transform is used to split the plaintext picture into four low-frequency components. Second, we use random sequences generated by Chen’s hyper-chaotic system to scramble four low-frequency components. The initial value is determined by Secure Hash Algorithm 256-bit (SHA256) and user-defined parameters, which increases the plaintext sensitivity. Then, the new diffusion scheme is applied to the matrix containing most of the information and matrices are transformed by a one-level inverse integer wavelet. Finally, to create the ciphertext image, the diffused matrices are subjected to the one-level inverse integer wavelet transform. In the simulation part, we examine the suggested algorithm’s encryption impact. The findings demonstrate that the suggested technique has a sufficient key space and can successfully fend off common attacks. Full article
(This article belongs to the Special Issue Recent Advances in Fractional Fourier Transforms and Applications)
Show Figures

Figure 1

25 pages, 6529 KB  
Article
Image Encryption Using Quantum 3D Mobius Scrambling and 3D Hyper-Chaotic Henon Map
by Ling Wang, Qiwen Ran and Junrong Ding
Entropy 2023, 25(12), 1629; https://doi.org/10.3390/e25121629 - 6 Dec 2023
Cited by 4 | Viewed by 2235
Abstract
In encryption technology, image scrambling is a common processing operation. This paper proposes a quantum version of the 3D Mobius scrambling transform based on the QRCI model, which changes not only the position of pixels but also the gray values. The corresponding quantum [...] Read more.
In encryption technology, image scrambling is a common processing operation. This paper proposes a quantum version of the 3D Mobius scrambling transform based on the QRCI model, which changes not only the position of pixels but also the gray values. The corresponding quantum circuits are devised. Furthermore, an encryption scheme combining the quantum 3D Mobius transform with the 3D hyper-chaotic Henon map is suggested to protect the security of image information. To facilitate subsequent processing, the RGB color image is first represented with QRCI. Then, to achieve the pixel-level permutation effect, the quantum 3D Mobius transform is applied to scramble bit-planes and pixel positions. Ultimately, to increase the diffusion effect, the scrambled image is XORed with a key image created by the 3D hyper-chaotic Henon map to produce the encrypted image. Numerical simulations and result analyses indicate that our designed encryption scheme is secure and reliable. It offers better performance in the aspect of key space, histogram variance, and correlation coefficient than some of the latest algorithms. Full article
(This article belongs to the Special Issue Advanced Technology in Quantum Cryptography)
Show Figures

Figure 1

25 pages, 13072 KB  
Article
An Image Encryption Algorithm Based on Improved Hilbert Curve Scrambling and Dynamic DNA Coding
by Shengtao Geng, Jiahao Li, Xuncai Zhang and Yanfeng Wang
Entropy 2023, 25(8), 1178; https://doi.org/10.3390/e25081178 - 8 Aug 2023
Cited by 19 | Viewed by 3032
Abstract
As an effective method for image security protection, image encryption is widely used in data hiding and content protection. This paper proposes an image encryption algorithm based on an improved Hilbert curve with DNA coding. Firstly, the discrete wavelet transform (DWT) decomposes the [...] Read more.
As an effective method for image security protection, image encryption is widely used in data hiding and content protection. This paper proposes an image encryption algorithm based on an improved Hilbert curve with DNA coding. Firstly, the discrete wavelet transform (DWT) decomposes the plaintext image by three-level DWT to obtain the high-frequency and low-frequency components. Secondly, different modes of the Hilbert curve are selected to scramble the high-frequency and low-frequency components. Then, the high-frequency and low-frequency components are reconstructed separately using the inverse discrete wavelet transform (IDWT). Then, the bit matrix of the image pixels is scrambled, changing the pixel value while changing the pixel position and weakening the strong correlation between adjacent pixels to a more significant correlation. Finally, combining dynamic DNA coding and ciphertext feedback to diffuse the pixel values improves the encryption effect. The encryption algorithm performs the scrambling and diffusion in alternating transformations of space, frequency, and spatial domains, breaking the limitations of conventional scrambling. The experimental simulation results and security analysis show that the encryption algorithm can effectively resist statistical attacks and differential attacks with good security and robustness. Full article
(This article belongs to the Special Issue Image Encryption and Privacy Protection Based on Chaotic Systems)
Show Figures

Figure 1

28 pages, 19499 KB  
Article
Color Image Encryption Algorithm Based on Cross-Spiral Transformation and Zone Diffusion
by Xiaoqiang Zhang, Mi Liu and Xiaochang Yang
Mathematics 2023, 11(14), 3228; https://doi.org/10.3390/math11143228 - 22 Jul 2023
Cited by 15 | Viewed by 3389
Abstract
Due to their rich information, color images are frequently utilized in many different industries, but the network’s security in handling their delivery of images must be taken into account. To improve the security and efficiency of color images, this paper proposed a color [...] Read more.
Due to their rich information, color images are frequently utilized in many different industries, but the network’s security in handling their delivery of images must be taken into account. To improve the security and efficiency of color images, this paper proposed a color image encryption algorithm based on cross-spiral transformation and zone diffusion. The proposed algorithm is based on Chen’s system and the piecewise linear chaotic map, and uses the chaotic sequences generated by them for related operations. Firstly, the R, G and B planes are extracted, and the spiral starting point of each plane is randomly selected by the chaotic sequence to implement the cross-spiral transformation. Secondly, the bit-level image matrix is constructed by the scrambled image matrix, and the bit-level chaotic matrix is constructed by the chaotic sequence. Finally, the three-dimensional matrix is divided into four zones by a dividing line, and partition diffusion is carried out to obtain the encrypted image. Simulation results and algorithm analyses indicate that the proposed algorithm has superior performance and can resist a wide range of attacks. Full article
(This article belongs to the Special Issue Chaos-Based Secure Communication and Cryptography)
Show Figures

Figure 1

28 pages, 23361 KB  
Article
Encryption of Color Images with an Evolutionary Framework Controlled by Chaotic Systems
by Xinpeng Man and Yinglei Song
Entropy 2023, 25(4), 631; https://doi.org/10.3390/e25040631 - 7 Apr 2023
Cited by 12 | Viewed by 2346
Abstract
In the past decade, a large amount of important digital data has been created and stored in the form of color images; the protection of such data from undesirable accesses has become an important problem in information security. In this paper, a new [...] Read more.
In the past decade, a large amount of important digital data has been created and stored in the form of color images; the protection of such data from undesirable accesses has become an important problem in information security. In this paper, a new approach based on an evolutionary framework is proposed for the secure encryption of color images. The image contents in a color image are first fully scrambled with a sequence of bit-level operations determined by a number of integer keys. A scrambled image is then encrypted with keys generated from an evolutionary process controlled by a set of chaotic systems. Analysis and experiments show that the proposed approach can generate encrypted color images with high security. In addition, the performance of the proposed approach is compared with that of a few state-of-the-art approaches for color image encryption. The results of the comparison suggest that the proposed approach outperforms the other approaches in the overall security of encrypted images. The proposed approach is thus potentially useful for applications that require color image encryption. Full article
(This article belongs to the Special Issue Image Encryption and Privacy Protection Based on Chaotic Systems)
Show Figures

Figure 1

17 pages, 2198 KB  
Article
Cryptanalyzing and Improving an Image Encryption Algorithm Based on Chaotic Dual Scrambling of Pixel Position and Bit
by Shuqin Zhu, Congxu Zhu and Hanyu Yan
Entropy 2023, 25(3), 400; https://doi.org/10.3390/e25030400 - 22 Feb 2023
Cited by 11 | Viewed by 3572
Abstract
An image encryption algorithm for the double scrambling of the pixel position and bit was cryptanalyzed. In the original image encryption algorithm, the positions of pixels were shuffled totally with the chaotic sequence. Then, the 0 and 1-bit positions of image pixels were [...] Read more.
An image encryption algorithm for the double scrambling of the pixel position and bit was cryptanalyzed. In the original image encryption algorithm, the positions of pixels were shuffled totally with the chaotic sequence. Then, the 0 and 1-bit positions of image pixels were scrambled through the use of another chaotic sequence generated by the input key. The authors claimed that the algorithm was able to resist the chosen-plaintext attack. However, through the analysis of the encryption algorithm, it was found that the equivalent key of the whole encryption algorithm was the scrambling sequence T in the global scrambling stage, the pixel bit level scrambling sequence WT and the diffusion sequence S. The generation of scrambling sequence T is related to the sum of all pixel values of the plaintext image, while the generation of WT and S is not associated with the image to be encrypted. By using a chosen-plaintext attack, these equivalent key streams can be cracked so as to realize the decoding of the original chaotic encryption algorithm. Both theoretical analysis and experimental results verify the feasibility of the chosen-plaintext attack strategy. Finally, an improved algorithm was proposed to overcome the defect, which can resist the chosen-plaintext attack and has the encryption effect of a “one time pad”. Full article
(This article belongs to the Special Issue Image Encryption and Privacy Protection Based on Chaotic Systems)
Show Figures

Figure 1

23 pages, 10047 KB  
Article
Dual-Domain Image Encryption in Unsecure Medium—A Secure Communication Perspective
by Hemalatha Mahalingam, Thanikaiselvan Veeramalai, Anirudh Rajiv Menon, Subashanthini S. and Rengarajan Amirtharajan
Mathematics 2023, 11(2), 457; https://doi.org/10.3390/math11020457 - 15 Jan 2023
Cited by 62 | Viewed by 3967
Abstract
With the growing demand for digitalization, multimedia data transmission through wireless networks has become more prominent. These multimedia data include text, images, audio, and video. Therefore, a secure method is needed to modify them so that such images, even if intercepted, will not [...] Read more.
With the growing demand for digitalization, multimedia data transmission through wireless networks has become more prominent. These multimedia data include text, images, audio, and video. Therefore, a secure method is needed to modify them so that such images, even if intercepted, will not be interpreted accurately. Such encryption is proposed with a two-layer image encryption scheme involving bit-level encryption in the time-frequency domain. The top layer consists of a bit of plane slicing the image, and each plane is then scrambled using a chaotic map and encrypted with a key generated from the same chaotic map. Next, image segmentation, followed by a Lifting Wavelet Transform, is used to scramble and encrypt each segment’s low-frequency components. Then, a chaotic hybrid map is used to scramble and encrypt the final layer. Multiple analyses were performed on the algorithm, and this proposed work achieved a maximum entropy of 7.99 and near zero correlation, evidencing the resistance towards statistical attacks. Further, the keyspace of the cryptosystem is greater than 2128, which can effectively resist a brute force attack. In addition, this algorithm requires only 2.1743 s to perform the encryption of a 256 × 256 sized 8-bit image on a host system with a Windows 10 operating system of 64-bit Intel(R) Core(TM) i5-7200U CPU at 2.5 GHz with 8 GB RAM. Full article
(This article belongs to the Special Issue Recent Advances in Security, Privacy, and Applied Cryptography)
Show Figures

Figure 1

32 pages, 67364 KB  
Article
Color Image Encryption Algorithm Based on Dynamic Block Zigzag Transformation and Six-Sided Star Model
by Xiaoqiang Zhang, Mi Liu, Jingxi Tian and Zhengjun Gong
Electronics 2022, 11(16), 2512; https://doi.org/10.3390/electronics11162512 - 11 Aug 2022
Cited by 5 | Viewed by 2564
Abstract
As a result of the rise in network technology, information security has become particularly important. Digital images play an important role in network transmission. To improve their security and efficiency, a new color image encryption algorithm is proposed. The proposed algorithm adopts a [...] Read more.
As a result of the rise in network technology, information security has become particularly important. Digital images play an important role in network transmission. To improve their security and efficiency, a new color image encryption algorithm is proposed. The proposed algorithm adopts a classical scrambling–diffusion framework. In the scrambling stage, the dynamic block Zigzag transformation is designed by combining the chaotic sequence with the standard Zigzag transformation, which can dynamically select the transformation range and the number of times. It is used to scramble the pixel positions in the R, G, and B components. In the diffusion stage, the six-sided star model is established by combining the chaotic sequence and the six-sided star structure characteristics, which can store the 24 bits of the pixel in a defined order to realize bit-level diffusion operation. Experimental analyses indicate that our algorithm has the characteristics of high key sensitivity, large key space, high efficiency, and resistance to plaintext attacks, statistical attacks, etc. Full article
(This article belongs to the Special Issue Security Governance & Information Security Management Systems)
Show Figures

Figure 1

Back to TopTop