{"title":"一种基于随机数矩阵迭代的图像加密方法","authors":"Jialiang Luo, Wanbo Yu","doi":"10.1109/CISP-BMEI56279.2022.9980116","DOIUrl":null,"url":null,"abstract":"There is a demand for more image encryption techniques due to the safety of image transmission and archiving. so a means of encrypting images based on random number matrix iterations is suggested. In the encryption process, the algorithm uses two random number matrices with values ranging from 1 to 256, which are randomly generated. Use two matrices to iterate. During the iteration, take out the elements of the first matrix, then take out the elements in the same position of the second matrix, combining the element values of the two to form a new position index, and get the value of the new position index in the first matrix finally. Iterate over the value multiple times, using it to replace the element value of the current first matrix, and then continue to iterate the other position elements of the matrix. After the iteration of all elements is completed, the first random number matrix will be converted into a new matrix, and it will be used as an encrypted sequence. A plaintext image is XOR with the sequence to generate a ciphertext image. The testing findings demonstrate the algorithm's superior security and encryption performance. It features a big key spacing, strong key sensitivity, and good diffusion and obfuscation capabilities, and are resistant to conventional assaults including differential and brute force assaults.","PeriodicalId":198522,"journal":{"name":"2022 15th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"An image encryption method based on random number matrix iterations\",\"authors\":\"Jialiang Luo, Wanbo Yu\",\"doi\":\"10.1109/CISP-BMEI56279.2022.9980116\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"There is a demand for more image encryption techniques due to the safety of image transmission and archiving. so a means of encrypting images based on random number matrix iterations is suggested. In the encryption process, the algorithm uses two random number matrices with values ranging from 1 to 256, which are randomly generated. Use two matrices to iterate. During the iteration, take out the elements of the first matrix, then take out the elements in the same position of the second matrix, combining the element values of the two to form a new position index, and get the value of the new position index in the first matrix finally. Iterate over the value multiple times, using it to replace the element value of the current first matrix, and then continue to iterate the other position elements of the matrix. After the iteration of all elements is completed, the first random number matrix will be converted into a new matrix, and it will be used as an encrypted sequence. A plaintext image is XOR with the sequence to generate a ciphertext image. The testing findings demonstrate the algorithm's superior security and encryption performance. It features a big key spacing, strong key sensitivity, and good diffusion and obfuscation capabilities, and are resistant to conventional assaults including differential and brute force assaults.\",\"PeriodicalId\":198522,\"journal\":{\"name\":\"2022 15th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI)\",\"volume\":\"74 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-11-05\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 15th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CISP-BMEI56279.2022.9980116\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 15th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CISP-BMEI56279.2022.9980116","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An image encryption method based on random number matrix iterations
There is a demand for more image encryption techniques due to the safety of image transmission and archiving. so a means of encrypting images based on random number matrix iterations is suggested. In the encryption process, the algorithm uses two random number matrices with values ranging from 1 to 256, which are randomly generated. Use two matrices to iterate. During the iteration, take out the elements of the first matrix, then take out the elements in the same position of the second matrix, combining the element values of the two to form a new position index, and get the value of the new position index in the first matrix finally. Iterate over the value multiple times, using it to replace the element value of the current first matrix, and then continue to iterate the other position elements of the matrix. After the iteration of all elements is completed, the first random number matrix will be converted into a new matrix, and it will be used as an encrypted sequence. A plaintext image is XOR with the sequence to generate a ciphertext image. The testing findings demonstrate the algorithm's superior security and encryption performance. It features a big key spacing, strong key sensitivity, and good diffusion and obfuscation capabilities, and are resistant to conventional assaults including differential and brute force assaults.