{"title":"Research on a more safe image encryption communication algorithm","authors":"Lu Liu, Yuhui Li, Ting Wang, Yuhan Qin, Yuhan Ren","doi":"10.1117/12.3032082","DOIUrl":null,"url":null,"abstract":"Image encryption has become one of the key techniques for information protection in today's context of increasing number and rising importance of digital communication. The purpose of this paper is to explore a creative image encryption method based on Rijndael algorithm and chaos algorithm, which disambiguates the image, hash value calculation. Then encrypted by Rijndael algorithm and generates a secure ciphertext. Compared to traditional encryption, this algorithm greatly improves the security and speed of encryption by combining multiple encryption techniques, and by conducting several encryption and decryption experiments on this algorithm, we prove that this method has a great prospect for security applications.","PeriodicalId":198425,"journal":{"name":"Other Conferences","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2024-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Other Conferences","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1117/12.3032082","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Image encryption has become one of the key techniques for information protection in today's context of increasing number and rising importance of digital communication. The purpose of this paper is to explore a creative image encryption method based on Rijndael algorithm and chaos algorithm, which disambiguates the image, hash value calculation. Then encrypted by Rijndael algorithm and generates a secure ciphertext. Compared to traditional encryption, this algorithm greatly improves the security and speed of encryption by combining multiple encryption techniques, and by conducting several encryption and decryption experiments on this algorithm, we prove that this method has a great prospect for security applications.