Yanxia Zhong, Huayi Liu, Xiyan Sun, Rushi Lan, Xiaonan Luo
{"title":"基于二维正弦分段线性混沌映射的图像加密","authors":"Yanxia Zhong, Huayi Liu, Xiyan Sun, Rushi Lan, Xiaonan Luo","doi":"10.1109/ICWAPR.2018.8521240","DOIUrl":null,"url":null,"abstract":"In this paper, a new image encryption algorithm is proposed by integrating Sine and piecewise linear chaotic maps. In order to realize the effect of encrypted image, the security key and 2D Sine-piecewise linear chaotic map (SPLCM) are used to encrypt the image by using random sequence and random matrix, and then using the replacement operation and the diffusion operation of the original image. The proposed image encryption algorithm is simple and practical, and the simulation results show that this algorithm is able to encrypt different types of digital images into unidentifiable random images. The security analysis also shows that this algorithm has a higher security leve.l","PeriodicalId":385478,"journal":{"name":"2018 International Conference on Wavelet Analysis and Pattern Recognition (ICWAPR)","volume":"29 8","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Image Encryption Using 2D Sine-Piecewise Linear Chaotic Map\",\"authors\":\"Yanxia Zhong, Huayi Liu, Xiyan Sun, Rushi Lan, Xiaonan Luo\",\"doi\":\"10.1109/ICWAPR.2018.8521240\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, a new image encryption algorithm is proposed by integrating Sine and piecewise linear chaotic maps. In order to realize the effect of encrypted image, the security key and 2D Sine-piecewise linear chaotic map (SPLCM) are used to encrypt the image by using random sequence and random matrix, and then using the replacement operation and the diffusion operation of the original image. The proposed image encryption algorithm is simple and practical, and the simulation results show that this algorithm is able to encrypt different types of digital images into unidentifiable random images. The security analysis also shows that this algorithm has a higher security leve.l\",\"PeriodicalId\":385478,\"journal\":{\"name\":\"2018 International Conference on Wavelet Analysis and Pattern Recognition (ICWAPR)\",\"volume\":\"29 8\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 International Conference on Wavelet Analysis and Pattern Recognition (ICWAPR)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICWAPR.2018.8521240\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 International Conference on Wavelet Analysis and Pattern Recognition (ICWAPR)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICWAPR.2018.8521240","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Image Encryption Using 2D Sine-Piecewise Linear Chaotic Map
In this paper, a new image encryption algorithm is proposed by integrating Sine and piecewise linear chaotic maps. In order to realize the effect of encrypted image, the security key and 2D Sine-piecewise linear chaotic map (SPLCM) are used to encrypt the image by using random sequence and random matrix, and then using the replacement operation and the diffusion operation of the original image. The proposed image encryption algorithm is simple and practical, and the simulation results show that this algorithm is able to encrypt different types of digital images into unidentifiable random images. The security analysis also shows that this algorithm has a higher security leve.l