改进了基于Nahrain混沌映射的图像加密模型,实现了有效的图像加密过程

Fazly Salleh Abas , R Arulmurugan
{"title":"改进了基于Nahrain混沌映射的图像加密模型,实现了有效的图像加密过程","authors":"Fazly Salleh Abas ,&nbsp;R Arulmurugan","doi":"10.1016/j.ijin.2022.08.002","DOIUrl":null,"url":null,"abstract":"<div><p>As the intrinsic features of images include huge size and additional correlation prevailing among pixels, it is tedious to accomplish by using outdated models. The cryptographic features of Chaotic Maps (CM), including early criteria and random nature, aid in designing novel Image Encryption (IE) methods. In this paper, Nahrain Map with Radix Trie-based Image Encryption (NMRTIE) model is proposed to guarantee image encryption that resists known attacks that could be launched during its transmission in the cloud environment. The propounded NMRTIE model includes three essential phases: NCM-based Image Encryption (IE), Radix Trie (RT) based scrambling, and incessant diffusion. Initially, the NCM model uses more than one chaotic function to produce a sequence of keys. The RT model eases scrambling, where the rows and columns' pixels are swapped substantially. Lastly, the propounded diffusion scheme cooperates with NCM to produce key streams for remarkably hastening diffusion and dispersing effect. The propounded NMRTIE model is evaluated, and the results are confirmed based on numerous characteristics. The investigational consequence confirms that the propounded NMRTIE scheme is more appropriate than the associated approaches.</p></div>","PeriodicalId":100702,"journal":{"name":"International Journal of Intelligent Networks","volume":"3 ","pages":"Pages 102-108"},"PeriodicalIF":0.0000,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666603022000100/pdfft?md5=a6ab2c96f5980eb523a11448d7bb76b4&pid=1-s2.0-S2666603022000100-main.pdf","citationCount":"2","resultStr":"{\"title\":\"Radix Trie improved Nahrain chaotic map-based image encryption model for effective image encryption process\",\"authors\":\"Fazly Salleh Abas ,&nbsp;R Arulmurugan\",\"doi\":\"10.1016/j.ijin.2022.08.002\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><p>As the intrinsic features of images include huge size and additional correlation prevailing among pixels, it is tedious to accomplish by using outdated models. The cryptographic features of Chaotic Maps (CM), including early criteria and random nature, aid in designing novel Image Encryption (IE) methods. In this paper, Nahrain Map with Radix Trie-based Image Encryption (NMRTIE) model is proposed to guarantee image encryption that resists known attacks that could be launched during its transmission in the cloud environment. The propounded NMRTIE model includes three essential phases: NCM-based Image Encryption (IE), Radix Trie (RT) based scrambling, and incessant diffusion. Initially, the NCM model uses more than one chaotic function to produce a sequence of keys. The RT model eases scrambling, where the rows and columns' pixels are swapped substantially. Lastly, the propounded diffusion scheme cooperates with NCM to produce key streams for remarkably hastening diffusion and dispersing effect. The propounded NMRTIE model is evaluated, and the results are confirmed based on numerous characteristics. The investigational consequence confirms that the propounded NMRTIE scheme is more appropriate than the associated approaches.</p></div>\",\"PeriodicalId\":100702,\"journal\":{\"name\":\"International Journal of Intelligent Networks\",\"volume\":\"3 \",\"pages\":\"Pages 102-108\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://www.sciencedirect.com/science/article/pii/S2666603022000100/pdfft?md5=a6ab2c96f5980eb523a11448d7bb76b4&pid=1-s2.0-S2666603022000100-main.pdf\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Intelligent Networks\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S2666603022000100\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Intelligent Networks","FirstCategoryId":"1085","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2666603022000100","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

摘要

由于图像的固有特征包括巨大的尺寸和像素之间普遍存在的额外相关性,使用过时的模型来完成是繁琐的。混沌映射(CM)的密码学特征,包括早期准则和随机性,有助于设计新的图像加密(IE)方法。为了保证图像加密能够抵抗在云环境中传输过程中可能受到的已知攻击,本文提出了带有基于基数trie的图像加密(NMRTIE)模型的Nahrain Map。提出的NMRTIE模型包括三个基本阶段:基于ncm的图像加密(IE),基于基数Trie (RT)的置乱和不间断扩散。最初,NCM模型使用多个混沌函数来产生一个键序列。RT模型简化了置乱,其中行和列的像素被大量交换。最后,提出的扩散方案与NCM相结合,产生了显著加速扩散和分散效果的关键流。对提出的NMRTIE模型进行了评估,并根据许多特征对结果进行了验证。研究结果证实,所提出的NMRTIE方案比相关方法更合适。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Radix Trie improved Nahrain chaotic map-based image encryption model for effective image encryption process

As the intrinsic features of images include huge size and additional correlation prevailing among pixels, it is tedious to accomplish by using outdated models. The cryptographic features of Chaotic Maps (CM), including early criteria and random nature, aid in designing novel Image Encryption (IE) methods. In this paper, Nahrain Map with Radix Trie-based Image Encryption (NMRTIE) model is proposed to guarantee image encryption that resists known attacks that could be launched during its transmission in the cloud environment. The propounded NMRTIE model includes three essential phases: NCM-based Image Encryption (IE), Radix Trie (RT) based scrambling, and incessant diffusion. Initially, the NCM model uses more than one chaotic function to produce a sequence of keys. The RT model eases scrambling, where the rows and columns' pixels are swapped substantially. Lastly, the propounded diffusion scheme cooperates with NCM to produce key streams for remarkably hastening diffusion and dispersing effect. The propounded NMRTIE model is evaluated, and the results are confirmed based on numerous characteristics. The investigational consequence confirms that the propounded NMRTIE scheme is more appropriate than the associated approaches.

求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
CiteScore
12.00
自引率
0.00%
发文量
0
期刊最新文献
Personal internet of things networks: An overview of 3GPP architecture, applications, key technologies, and future trends Machine Learning-enhanced loT and Wireless Sensor Networks for predictive analysis and maintenance in wind turbine systems Research on secure Official Document Management and intelligent Information Retrieval System based on recommendation algorithm A method of vehicle networking environment information sharing based on distributed fountain code Introducing a high-throughput energy-efficient anti-collision (HT-EEAC) protocol for RFID systems
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1