Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Research on Chaotic Image Encryption Method Based on Three Dimensional Linear Function

View through CrossRef
Abstract Image as an essential carrier of data transmission, more and more people pay attention to its security. Although researchers have developed many encryption methods to enhance image transmission security, some have problems such as poor security, long-time complexity, and complicated algorithms. Therefore, this paper proposes a simple and secure encryption method. This method mainly combines chaotic systems with a three-dimensional(3D) linear function iterative system to encrypt images. First, a new chaotic system of 3D linear function iterations is constructed. Then, multiple 3D linear function iterative systems are invoked according to the sequences generated by the disorganized system iteration; finally, the chaotic lines generated by the 3D linear function iteration are operated with color images and gray images, respectively, by dissimilarity. The experimental results show that the scheme has a simple and efficient, low computational cost, good encryption effect, difficult to decipher, and strong key sensitivity encryption effect.
Title: Research on Chaotic Image Encryption Method Based on Three Dimensional Linear Function
Description:
Abstract Image as an essential carrier of data transmission, more and more people pay attention to its security.
Although researchers have developed many encryption methods to enhance image transmission security, some have problems such as poor security, long-time complexity, and complicated algorithms.
Therefore, this paper proposes a simple and secure encryption method.
This method mainly combines chaotic systems with a three-dimensional(3D) linear function iterative system to encrypt images.
First, a new chaotic system of 3D linear function iterations is constructed.
Then, multiple 3D linear function iterative systems are invoked according to the sequences generated by the disorganized system iteration; finally, the chaotic lines generated by the 3D linear function iteration are operated with color images and gray images, respectively, by dissimilarity.
The experimental results show that the scheme has a simple and efficient, low computational cost, good encryption effect, difficult to decipher, and strong key sensitivity encryption effect.

Related Results

Image Encryption Scheme Based on Newly Designed Chaotic Map and Parallel DNA Coding
Image Encryption Scheme Based on Newly Designed Chaotic Map and Parallel DNA Coding
In this paper, a new one-dimensional fractional chaotic map is proposed and an image encryption scheme based on parallel DNA coding is designed by using the chaotic map. The mathem...
Research on Image Encryption Method based on the Chaotic Iteration of a Ternary Nonlinear Function
Research on Image Encryption Method based on the Chaotic Iteration of a Ternary Nonlinear Function
Objective: Considering that some image encryption algorithms have the disadvantages of complex structure and high computational cost, and there are not many commonly used chaotic s...
Extractraction of non-stationary harmonic from chaotic background based on synchrosqueezed wavelet transform
Extractraction of non-stationary harmonic from chaotic background based on synchrosqueezed wavelet transform
The signal detection in chaotic background has gradually become one of the research focuses in recent years. Previous research showed that the measured signals were often unavoidab...
Fuzzy Chaotic Neural Networks
Fuzzy Chaotic Neural Networks
An understanding of the human brain’s local function has improved in recent years. But the cognition of human brain’s working process as a whole is still obscure. Both fuzzy logic ...
Application of Arnold’s Cat Map and Bülban Map for Image Encryption in Chaotic Cryptography
Application of Arnold’s Cat Map and Bülban Map for Image Encryption in Chaotic Cryptography
Abstract This study examines the use of chaos theory to image encryption by proposing a unique algorithm for image encryption based on two chaotic maps: Arnold’s CatMap and...
Dynamic Multi-Layered Image Encryption scheme using User Driven Chaotic Sequences
Dynamic Multi-Layered Image Encryption scheme using User Driven Chaotic Sequences
Abstract With technological advances, sharing sensitive information, such as multimedia data, especially images, is common. To protect the integrity of such data, advanced ...
Digital Image Encryption Using Logistic Map
Digital Image Encryption Using Logistic Map
This study focuses on the application of the logistic map algorithm in the Python programming language for digital image encryption and decryption. It investigates the impact of im...
An Authorized Scheme Service Privately Shared Data
An Authorized Scheme Service Privately Shared Data
In the modern digital landscape, the secure sharing of data across distributed systems remains a critical challenge. This paper proposes a blockchain-based architecture that levera...

Back to Top