• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
搜索

Author:

Duan, Lijuan (Duan, Lijuan.) (Scholars:段立娟) | Zhang, Dongkui (Zhang, Dongkui.) | Ning, Zhenhu (Ning, Zhenhu.) | Xu, Fan (Xu, Fan.) | Cui, Guoqin (Cui, Guoqin.) | Liang, Peng (Liang, Peng.)

Indexed by:

EI Scopus

Abstract:

In recent years, a variety of image encryption methods based on chaotic systems has been proposed, and has achieved good results. In order to improve the security of image encryption, this paper proposes a new image encryption method with a dynamic key, based on a hyperchaotic system and the association of pixel information, and designs the three-level encryption structure with diffusion encryption, scrambling encryption and re-diffusion encryption. The innovation of this method is to add the whole information of the image and the position information of the pixels in the diffusion encryption, and add the data information of the pixels in the scrambling encryption. The plaintext information of the image is added to the encryption process, which can enhance the security of encryption. Experiments demonstrate that the image encryption method proposed in this paper has the characteristics of strong sensitivity, low correlation between adjacent pixels, anti-differential attack and high security. Copyright © 2018 Inderscience Enterprises Ltd.

Keyword:

Image enhancement Cryptography Diffusion Pixels Chaotic systems

Author Community:

  • [ 1 ] [Duan, Lijuan]Faculty of Information Technology, Beijing University of Technology, Beijing Key Laboratory of Trusted Computing, National Engineering Laboratory for Critical Technologies of Information Security Classified Protection, Beijing; 100124, China
  • [ 2 ] [Zhang, Dongkui]Faculty of Information Technology, Beijing University of Technology, Beijing Key Laboratory of Trusted Computing, National Engineering Laboratory for Critical Technologies of Information Security Classified Protection, Beijing; 100124, China
  • [ 3 ] [Ning, Zhenhu]Faculty of Information Technology, Beijing University of Technology, Beijing Key Laboratory of Trusted Computing, National Engineering Laboratory for Critical Technologies of Information Security Classified Protection, Beijing; 100124, China
  • [ 4 ] [Xu, Fan]Faculty of Information Technology, Beijing University of Technology, Beijing Key Laboratory of Trusted Computing, National Engineering Laboratory for Critical Technologies of Information Security Classified Protection, Beijing; 100124, China
  • [ 5 ] [Cui, Guoqin]State Key Laboratory of Digital Multi-Media Chip Technology, Vimicro Corporation, Beijing; 100191, China
  • [ 6 ] [Liang, Peng]State Information Center, National Engineering Laboratory for e-Government Integration and Application, Beijing; 100045, China

Reprint Author's Address:

  • [ning, zhenhu]faculty of information technology, beijing university of technology, beijing key laboratory of trusted computing, national engineering laboratory for critical technologies of information security classified protection, beijing; 100124, china

Show more details

Related Keywords:

Related Article:

Source :

International Journal of Wireless and Mobile Computing

ISSN: 1741-1084

Year: 2018

Issue: 3

Volume: 15

Page: 207-214

Cited Count:

WoS CC Cited Count:

SCOPUS Cited Count:

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 0

Affiliated Colleges:

Online/Total:174/5505962
Address:BJUT Library(100 Pingleyuan,Chaoyang District,Beijing 100124, China Post Code:100124) Contact Us:010-67392185
Copyright:BJUT Library Technical Support:Beijing Aegean Software Co., Ltd.