Image encryption for offshore wind power based on 2D-LCLM and Zhou Yi eight trigrams

IF 1.7 3区 计算机科学 Q3 COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE International Journal of Bio-Inspired Computation Pub Date : 2023-01-01 DOI:10.1504/ijbic.2023.133505
Lei Kou, Jinbo Wu, Fangfang Zhang, Peng Ji, Wende Ke, Junhe Wan, Hailin Liu, Yang Li, Quande Yuan
{"title":"Image encryption for offshore wind power based on 2D-LCLM and Zhou Yi eight trigrams","authors":"Lei Kou, Jinbo Wu, Fangfang Zhang, Peng Ji, Wende Ke, Junhe Wan, Hailin Liu, Yang Li, Quande Yuan","doi":"10.1504/ijbic.2023.133505","DOIUrl":null,"url":null,"abstract":"Offshore wind power is an important part of the new power system. Due to the complex and changing situation in the oceans, its normal operation and maintenance cannot be done without information such as images; therefore, it is especially important to transmit the correct image in the process of information transmission. In this paper, we propose a new encryption algorithm for offshore wind power based on two-dimensional lagged complex logistic mapping (2D-LCLM) and Zhou Yi eight trigrams. Firstly, the initial value of the 2D-LCLM is constructed by the Sha-256 to associate the 2D-LCLM with the plaintext. Secondly, a new encryption rule is proposed from the Zhou Yi Eight Trigrams to obfuscate the pixel values and generate the round key. Then, 2D-LCLM is combined with the Zigzag to form an S-box. Finally, the simulation experiment of the algorithm is accomplished. The experimental results demonstrate that the algorithm is resistant to common attacks and has prefect encryption performance.","PeriodicalId":49059,"journal":{"name":"International Journal of Bio-Inspired Computation","volume":"27 1","pages":"0"},"PeriodicalIF":1.7000,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Bio-Inspired Computation","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1504/ijbic.2023.133505","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE","Score":null,"Total":0}
引用次数: 12

Abstract

Offshore wind power is an important part of the new power system. Due to the complex and changing situation in the oceans, its normal operation and maintenance cannot be done without information such as images; therefore, it is especially important to transmit the correct image in the process of information transmission. In this paper, we propose a new encryption algorithm for offshore wind power based on two-dimensional lagged complex logistic mapping (2D-LCLM) and Zhou Yi eight trigrams. Firstly, the initial value of the 2D-LCLM is constructed by the Sha-256 to associate the 2D-LCLM with the plaintext. Secondly, a new encryption rule is proposed from the Zhou Yi Eight Trigrams to obfuscate the pixel values and generate the round key. Then, 2D-LCLM is combined with the Zigzag to form an S-box. Finally, the simulation experiment of the algorithm is accomplished. The experimental results demonstrate that the algorithm is resistant to common attacks and has prefect encryption performance.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于2D-LCLM和周易八字的海上风电图像加密
海上风电是新型电力系统的重要组成部分。由于海洋形势复杂多变,其正常运行维护离不开图像等信息;因此,在信息传递的过程中,传递正确的图像就显得尤为重要。本文提出了一种基于二维滞后复杂逻辑映射(2D-LCLM)和周易八元组的海上风电加密算法。首先,通过Sha-256构造2D-LCLM的初始值,将2D-LCLM与明文相关联。其次,根据周易八卦图提出了一种新的加密规则,对像素值进行模糊处理并生成轮密钥;然后,将2D-LCLM与Zigzag结合形成s盒。最后,对该算法进行了仿真实验。实验结果表明,该算法能够抵抗常见的攻击,具有良好的加密性能。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
International Journal of Bio-Inspired Computation
International Journal of Bio-Inspired Computation COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE-COMPUTER SCIENCE, THEORY & METHODS
CiteScore
5.10
自引率
5.70%
发文量
37
审稿时长
>12 weeks
期刊介绍: IJBIC discusses the new bio-inspired computation methodologies derived from the animal and plant world, such as new algorithms mimicking the wolf schooling, the plant survival process, etc. Topics covered include: -New bio-inspired methodologies coming from creatures living in nature artificial society- physical/chemical phenomena- New bio-inspired methodology analysis tools, e.g. rough sets, stochastic processes- Brain-inspired methods: models and algorithms- Bio-inspired computation with big data: algorithms and structures- Applications associated with bio-inspired methodologies, e.g. bioinformatics.
期刊最新文献
Design of optimized lung lobe segmentation and Deep learning model for effective COVID-19 prediction Collaborative manufacturing operation mode and modeling simulation of manufacturing enterprise based on collective intelligence UAV Path Planning in Presence of Occlusions as Noisy Combinatorial Multi-Objective Optimisation On the Effect of Particle Update Modes in Particle Swarm Optimization Improved Whale Social Optimization Algorithm and deep fuzzy clustering for optimal and QoS-aware load balancing in cloud computing
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1