Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Research on Image Encryption Method based on the Chaotic Iteration of a Ternary Nonlinear Function

View through CrossRef
Objective: Considering that some image encryption algorithms have the disadvantages of complex structure and high computational cost, and there are not many commonly used chaotic systems, which are easy to crack by attacks, to solve these problems, this paper proposes an image encryption algorithm based on three-dimensional nonlinear functions to solve these problems. Methods: The algorithm mainly combines the sinusoidal chaotic map with the ternary nonlinear function system to encrypt the image. Firstly, multiple ternary nonlinear function chaotic systems are designed. Then, the function iteration system is changed to invoke the computation of a specific expression under a random number; it is a chaotic sequence generated according to a chaotic mapping such as sine, and then the value of this chaotic sequence is used to select a ternary nonlinear function for iteration to obtain a chaotic sequence. Finally, the chaotic sequence performs the XOR and scrambling operations on the grey image Results: The algorithm has a simple structure, a better encryption effect, and more incredible difficulty deciphering. Moreover, through the phase diagram and bifurcation diagram, it can be seen that the system has good chaotic characteristics Conclusion: The method in this paper is novel; this method is a random variable order composite operation, which can not only be applied to image encryption but also can be used for fractal map generation and so on, and in some other chaotic fields will have a wide range of applications. It has essential research value.
Title: Research on Image Encryption Method based on the Chaotic Iteration of a Ternary Nonlinear Function
Description:
Objective: Considering that some image encryption algorithms have the disadvantages of complex structure and high computational cost, and there are not many commonly used chaotic systems, which are easy to crack by attacks, to solve these problems, this paper proposes an image encryption algorithm based on three-dimensional nonlinear functions to solve these problems.
Methods: The algorithm mainly combines the sinusoidal chaotic map with the ternary nonlinear function system to encrypt the image.
Firstly, multiple ternary nonlinear function chaotic systems are designed.
Then, the function iteration system is changed to invoke the computation of a specific expression under a random number; it is a chaotic sequence generated according to a chaotic mapping such as sine, and then the value of this chaotic sequence is used to select a ternary nonlinear function for iteration to obtain a chaotic sequence.
Finally, the chaotic sequence performs the XOR and scrambling operations on the grey image Results: The algorithm has a simple structure, a better encryption effect, and more incredible difficulty deciphering.
Moreover, through the phase diagram and bifurcation diagram, it can be seen that the system has good chaotic characteristics Conclusion: The method in this paper is novel; this method is a random variable order composite operation, which can not only be applied to image encryption but also can be used for fractal map generation and so on, and in some other chaotic fields will have a wide range of applications.
It has essential research value.

Related Results

Image Encryption Scheme Based on Newly Designed Chaotic Map and Parallel DNA Coding
Image Encryption Scheme Based on Newly Designed Chaotic Map and Parallel DNA Coding
In this paper, a new one-dimensional fractional chaotic map is proposed and an image encryption scheme based on parallel DNA coding is designed by using the chaotic map. The mathem...
Extractraction of non-stationary harmonic from chaotic background based on synchrosqueezed wavelet transform
Extractraction of non-stationary harmonic from chaotic background based on synchrosqueezed wavelet transform
The signal detection in chaotic background has gradually become one of the research focuses in recent years. Previous research showed that the measured signals were often unavoidab...
Application of Arnold’s Cat Map and Bülban Map for Image Encryption in Chaotic Cryptography
Application of Arnold’s Cat Map and Bülban Map for Image Encryption in Chaotic Cryptography
Abstract This study examines the use of chaos theory to image encryption by proposing a unique algorithm for image encryption based on two chaotic maps: Arnold’s CatMap and...
Fuzzy Chaotic Neural Networks
Fuzzy Chaotic Neural Networks
An understanding of the human brain’s local function has improved in recent years. But the cognition of human brain’s working process as a whole is still obscure. Both fuzzy logic ...
Dynamic Multi-Layered Image Encryption scheme using User Driven Chaotic Sequences
Dynamic Multi-Layered Image Encryption scheme using User Driven Chaotic Sequences
Abstract With technological advances, sharing sensitive information, such as multimedia data, especially images, is common. To protect the integrity of such data, advanced ...
Digital Image Encryption Using Logistic Map
Digital Image Encryption Using Logistic Map
This study focuses on the application of the logistic map algorithm in the Python programming language for digital image encryption and decryption. It investigates the impact of im...
Research on Chaotic Image Encryption Method Based on Three Dimensional Linear Function
Research on Chaotic Image Encryption Method Based on Three Dimensional Linear Function
Abstract Image as an essential carrier of data transmission, more and more people pay attention to its security. Although researchers have developed many encryption methods...
An Authorized Scheme Service Privately Shared Data
An Authorized Scheme Service Privately Shared Data
In the modern digital landscape, the secure sharing of data across distributed systems remains a critical challenge. This paper proposes a blockchain-based architecture that levera...

Back to Top