Image Encryption with Variable Length Key

被引:1
|
作者
Cao Guanghui [1 ]
Zhang Xing [1 ]
Liu Yanjun [1 ]
机构
[1] Liaoning Univ Technol, Sch Elect & Informat Engn, Jinzhou, Peoples R China
关键词
chaos; image encryption; pseudo-random number; variable length key; COLOR IMAGE; CHAOTIC SYSTEM; MAPS; SCHEME; ALGORITHM;
D O I
10.1080/02564602.2015.1088412
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
We propose a new image encryption algorithm with variable length running key based on a modified tent map. This modified tent map can generate uniform distribution pseudo-random number sequence. In the proposed image encryption, we employ the strategy of variable length running key which enlarges key value space, the strategy of one-time running key which is resilient to known/chosen plaintext attack, the strategy of cipher disturbance which minimizes dynamical degradation of digital chaos. Simulations have been carried out and the results demonstrate the strong survival ability of our scheme.
引用
收藏
页码:297 / 309
页数:13
相关论文
共 50 条
  • [41] Text encryption by image encryption key with based on Generalized Singular Value Decomposition (GSVD)
    Abdul-Hameed, Mohammed
    JOURNAL OF INTERDISCIPLINARY MATHEMATICS, 2023, 26 (06) : 1319 - 1327
  • [42] Image Encryption Using Dynamic Image as a Key Based on Multilayers of Chaotic Permutation
    Jirjees, Seerwan W.
    Alkalid, Farah F.
    Shareef, Waleed F.
    SYMMETRY-BASEL, 2023, 15 (02):
  • [43] Image authentication with a time-stamped signature of the image and secret key encryption
    Cheng, JY
    Chang, LW
    ELECTRONIC IMAGING AND MULTIMEDIA TECHNOLOGY III, 2002, 4925 : 91 - 98
  • [44] Cumulative Image Encryption Approach based on User Defined Operation, Character Repositioning, Text Key and Image Key Encryption Technique and Secret Sharing Scheme
    Das, Ramkrishna
    Manna, Sarbajit
    Dutta, Saurabh
    2017 IEEE INTERNATIONAL CONFERENCE ON POWER, CONTROL, SIGNALS AND INSTRUMENTATION ENGINEERING (ICPCSI), 2017, : 748 - 753
  • [45] Image Steganographic Method with Variable Embedding Length
    Kim, Ki-Jong
    Jung, Ki-Hyun
    Yoo, Kee-Young
    INTERNATIONAL SYMPOSIUM ON UBIQUITOUS MULTIMEDIA COMPUTING, PROCEEDINGS, 2008, : 210 - +
  • [46] Adaptive Key Length Based Encryption Algorithm using DNA Approach
    Jain, Anchal
    Rajpal, Navin
    2013 INTERNATIONAL CONFERENCE ON MACHINE INTELLIGENCE AND RESEARCH ADVANCEMENT (ICMIRA 2013), 2013, : 140 - 144
  • [47] Authentication of variable length messages in quantum key distribution
    Khodakhast Bibak
    Bruce M. Kapron
    Venkatesh Srinivasan
    EPJ Quantum Technology, 2022, 9
  • [48] Performance Evaluation of Encryption Algorithms' Key Length Size on Web Browsers
    Idrus, Syed Zulkarnain Syed
    Aljunid, Syed Alwee
    Asi, Salina Mohd
    Sudin, Suhizaz
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2012, 12 (05): : 10 - 13
  • [49] Variable Length Valve Key Saves Trips to the Shop
    Salyer, Jesse Clinton
    Opflow, 1983, 9 (04)
  • [50] Authentication of variable length messages in quantum key distribution
    Bibak, Khodakhast
    Kapron, Bruce M.
    Srinivasan, Venkatesh
    EPJ QUANTUM TECHNOLOGY, 2022, 9 (01)