دورية أكاديمية
A Novel Asymmetric Hyperchaotic Image Encryption Scheme Based on Elliptic Curve Cryptography
العنوان: | A Novel Asymmetric Hyperchaotic Image Encryption Scheme Based on Elliptic Curve Cryptography |
---|---|
المؤلفون: | Haotian Liang, Guidong Zhang, Wenjin Hou, Pinyi Huang, Bo Liu, Shouliang Li |
المصدر: | Applied Sciences, Vol 11, Iss 12, p 5691 (2021) |
بيانات النشر: | MDPI AG, 2021. |
سنة النشر: | 2021 |
المجموعة: | LCC:Technology LCC:Engineering (General). Civil engineering (General) LCC:Biology (General) LCC:Physics LCC:Chemistry |
مصطلحات موضوعية: | asymmetric encryption, elliptic curve cryptography, different-sized block permutation, Technology, Engineering (General). Civil engineering (General), TA1-2040, Biology (General), QH301-705.5, Physics, QC1-999, Chemistry, QD1-999 |
الوصف: | Most of the image encryption schemes based on chaos have so far employed symmetric key cryptography, which leads to a situation where the key cannot be transmitted in public channels, thus limiting their extended application. Based on the elliptic curve cryptography (ECC), we proposed a public key image encryption method where the hash value derived from the plain image was encrypted by ECC. Furthermore, during image permutation, a novel algorithm based on different-sized block was proposed. The plain image was firstly divided into five planes according to the amount of information contained in different bits: the combination of the low 4 bits, and other four planes of high 4 bits respectively. Second, for different planes, the corresponding method of block partition was followed by the rule that the higher the bit plane, the smaller the size of the partitioned block as a basic unit for permutation. In the diffusion phase, the used hyperchaotic sequences in permutation were applied to improve the efficiency. Lots of experimental simulations and cryptanalyses were implemented in which the NPCR and UACI are 99.6124% and 33.4600% respectively, which all suggested that it can effectively resist statistical analysis attacks and chosen plaintext attacks. |
نوع الوثيقة: | article |
وصف الملف: | electronic resource |
اللغة: | English |
تدمد: | 11125691 2076-3417 |
Relation: | https://www.mdpi.com/2076-3417/11/12/5691; https://doaj.org/toc/2076-3417 |
DOI: | 10.3390/app11125691 |
URL الوصول: | https://doaj.org/article/cb3e020f4dfe4b7490f33a1bb1f3f52f |
رقم الأكسشن: | edsdoj.b3e020f4dfe4b7490f33a1bb1f3f52f |
قاعدة البيانات: | Directory of Open Access Journals |
تدمد: | 11125691 20763417 |
---|---|
DOI: | 10.3390/app11125691 |