logo
    Fully chaotic medical image encryption scheme based on dynamic DNA and block rotation
    9
    Citation
    32
    Reference
    10
    Related Paper
    Citation Trend
    Abstract:
    Abstract As an important application of image encryption, digital medical image encryption plays an important role in the field of medical health and privacy protection. This paper put forwards a fully chaotic and strongly plaintext associated image encryption framework based on an improved chaotic system, block rotation and DNA computing. The algorithm generates multiple chaotic sequences by using different one-dimensional seed chaotic maps under the sine transform framework for subsequent block rotation, DNA dynamic encoding and decoding, generating key images for DNA XOR calculation. Simulation experiments and comparative analysis have shown that this algorithm can achieve fantastic encryption performance, resist various attacks, and have higher security levels and good generalization performance.
    Keywords:
    Plain text
    Key space
    A new image encryption theme based on dual chaotic systems is proposed. Three-dimensional secret key sequences are generated by combining Chen’s system with Logistic map, and the new encryption sequences are obtained from the three-dimensional secret key sequences by sampling. Then image scrambling algorithm and encryption algorithm are proposed, scrambling algorithm shuffle the positions of the image pixels by using one-dimensional Logistic chaotic sequence, encryption algorithm uses packet encryption and the double encryption to encrypt the value of the pixel. The experimental and theoretical results demonstrate that the algorithm has well properties of confusion and diffusion. The algorithm has strong ability against statistical attacks and enough key space. For the encrypted image the distribution of grey values has a random-like behavior and the adjacent pixels satisfy zero correlation. These results show that the proposed scheme has high security.
    Scrambling
    Key space
    Logistic map
    Watermarking attack
    Citations (1)
    An image encryption algorithm based on a four-dimensional chaotic system is presented in this paper, in view of the existing problems in the image encryption. Firstly, the characteristics of the chaotic system are analyzed. This system has more parameters and is more complex than the low-dimensional chaotic systems. The chaotic sequences are improved to be suitable for image encryption. Secondly, a generation method of the binary sequence is reported in accordance with the requirement of the encryption algorithm. Through theoretical and statistical analysis, we can see the binary sequence generated by the chaotic system meets the requirement of the pseudo-random sequence and has the high security. Finally, a mixed airspace encryption algorithm is presented. The chaotic sequences are used to the image encryption. The algorithm has very good effect because of increasing the key space and resisting the exhaustive attacks and statistical attacks.
    Key space
    Sequence (biology)
    Pseudorandom binary sequence
    Disk encryption theory
    Citations (4)
    We introduce the concept of quantum chaos encryption and submit a new method of chaos encryption. The new encryption scheme has a simple form and strong security and its performance characteristics remain very good. The experimental results demonstrated that the key space is large enough to resist the attacks and the distribution of grey values of the encrypted image has a random-like behavior, which makes it a potential candidate for encrypting multimedia data such as images, audio and even videos.
    Key space
    Disk encryption theory
    Watermarking attack
    In recent years, the application of chaos in the field of encryption is increasing. The chaotic characteristics of chaotic sequences make the encryption effect greatly improved compared with other encryption methods, mainly in encryption time, space and security. This paper mainly applies chaotic system to encrypt data stream hierarchically and continuously. Layers can be modified according to different scenarios, keys are one-dimensional arrays. At the beginning, use the function to generate the KEY1. Generate KEY2 using random function. KEY1. and KEY2 iterate to generate a new key END1 to encrypt the first layer of data. Using the encrypted first layer data as the KEY3. KEY3 and KEY2 iterate to generate a new key END2 to encrypt the next layer of data. Repeat the above operations to achieve hierarchical continuous encryption of data, the key also changes with the content. The encryption time, key space, anti-attack performance and various encryption indexes of the algorithm are analyzed by experiments. It is proved that the algorithm is an encryption method suitable for various situations, with small storage space, energy saving and high security.
    Key space
    Functional encryption
    A digital image encryption algorithm by using random numbers as keys is proposed and two kinds of encryption program are designed for the problems that the traditional image encryption algorithm is only applicable to square image and has a small amount of the encryption key.The algorithm encrypts the pixels of the image with the randomly generated key,which increases the image encryption key space,and realizes image encryption for any shape.Simulation results show that the algorithm has enough key space to ensure its good safety,meanwhile its scrambling degree reaches 0.0821 after one encryption to ensure its effectiveness.
    Scrambling
    Key space
    Watermarking attack
    Disk encryption theory
    Citations (0)
    Image encryption can ensure the safe transmission of image data in the network.In this paper,an image encryption and decryption algorithm was presented based on scrambling of low-frequency coefficient matrix of wavelet domain and pixels alternative on airspace domain.It was combined with the characteristics of transform domain and the airspace encrypted scheme.During encryption process,two kinds of classical chaotic models were used to generate the matrix of key flow and desig two kinds of reversible transforms based on XOR and mod to do scrambling and replacing operation.It makes the encryption process clear and operation easier,at the same time,improves the efficiency of encryption by using the modular thought and parallel encryption.Through the simulation test,the encryption algorithm was applied in color images,and attained ideal effect of encryption.Finally,the analysis of encryption performance shows that it can meet the requirements of the image information security transfer for encryption algorithm,including the factors such as bigger key space,capacity of strong resistance statistical analysis and malicious attacks and so on.These capacity can ensure the transmission of image data without hidden dangers.
    Scrambling
    Key space
    Bitwise operation
    Disk encryption theory
    Watermarking attack
    Citations (1)
    The image encryption algorithm based on chaotic system has been widely used at present. For this kind of algorithm, the encryption mechanism of "scrambling - diffusion" and multiple iterations are mainly adopted. In this paper, the common one-dimensional logistic chaotic mapping is taken as an example to analyze the influence of "scrambling - diffusion" and the number of iterations on the encryption effect. The simulation results show that, when only the chaotic system is used to complete the encryption operation, except for the key space, the contribution of "scrambling - diffusion" and single diffusion operation to the image encryption effect is basically the same, and the number of iterations has no significant effect on the encryption. When a "scrambling - diffusion" mechanism and multiple iterations are employed, the encryption effect may be enhanced by combining other cryptographic operations.
    Scrambling
    Key space
    Logistic map
    Citations (2)
    In order to improve the security of image encryption,this paper analyzed the image encryption based on two-dimensional chaotic maps and proposed a new image encryption algorithm.Methods including adding diffusion mechanism,changing the design of key and developing composite encryption system were used to solve the problems in the image encryption of two-dimensional chaotic maps,such as beriodicity no diffusion and the real key space littler than the theoretical value.This paper formulized the Baker map.Then it proposed a new image encryption based on Baker map.The simulation results show that the proposed encryption algorithm is valid and fit for other two-dimensional chaotic map.
    Key space
    Disk encryption theory
    Watermarking attack
    Citations (0)