Encryption method based on a new secret key algorithm for color images

被引:16
|
作者
Zhou, Shihua [1 ]
Wei, Ziqi [2 ]
Wang, Bin [1 ]
Zheng, Xuedong [1 ]
Zhou, Changjun [1 ]
Zhang, Qiang [1 ]
机构
[1] Dalian Univ, Key Lab Adv Design & Intelligent Comp, Minist Educ, Dalian 116622, Peoples R China
[2] Univ Alberta, Dept Comp Sci, Edmonton, AB T6E 1P6, Canada
基金
中国国家自然科学基金;
关键词
Color image; Discrete cosine transform; Encryption; Secret key; YUV space; CHAOTIC SYSTEM; SCHEME;
D O I
10.1016/j.aeue.2015.08.010
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In order to improve the security of color image encryption, the secret key of the encryption algorithm must have a strong correlation with the original image, but it should not reveal its information. It is difficult to meet this requirement using the current secret key generation algorithm. Thus, we propose a new secret key generation algorithm based on operations on the DC and AC values in YUV space. These two values are extracted from the process discrete cosine transformation of the data after image color space transformation. By combining the new secret key and the given secret key together as the initial values of chaotic maps, we can encrypt a color image in YUV and RGB space through multi-chaotic maps. Our experimental results indicate that this secret key algorithm is highly effective and the encryption method has a relatively high security. (C) 2015 Elsevier GmbH. All rights reserved.
引用
收藏
页码:1 / 7
页数:7
相关论文
共 50 条
  • [31] A New Quaternion-Based Encryption Method for DICOM Images
    Dzwonkowski, Mariusz
    Papaj, Michal
    Rykaczewski, Roman
    IEEE TRANSACTIONS ON IMAGE PROCESSING, 2015, 24 (11) : 4614 - 4622
  • [32] A New Method Towards Encryption Schemes (Name-Based-Encryption Algorithm)
    Hasan, Aasif
    Sharma, Neeraj
    PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON RELIABILTY, OPTIMIZATION, & INFORMATION TECHNOLOGY (ICROIT 2014), 2014, : 310 - 313
  • [33] Security Scheme for Online Banking Based on Secret Key Encryption
    Hu, Xiangyi
    Zhao, Guifen
    Xu, Guanning
    WKDD: 2009 SECOND INTERNATIONAL WORKSHOP ON KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2009, : 636 - 639
  • [34] A Chaotic Images Encryption Algorithm with The Key Mixing Proportion Factor
    Dong Enzeng
    Chen Zengqiang
    Yuan Zhuzhi
    Chen Zaiping
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT, INNOVATION MANAGEMENT AND INDUSTRIAL ENGINEERING, VOL 1, 2008, : 169 - +
  • [35] New method for improving add round key in the advanced encryption standard algorithm
    Kareem, Suhad Muhajer
    Rahma, Abdul Monem S.
    INFORMATION SECURITY JOURNAL, 2021, 30 (06): : 371 - 383
  • [36] A New Approach in Adaptive Encryption Algorithm for Color Images Based on DNA Sequence Operation and Hyper-Chaotic System
    Amani, Hamid Reza
    Yaghoobi, Mahdi
    MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (15) : 21537 - 21556
  • [37] A new chaos-based encryption algorithm for digital images protection
    Liu, Rui
    International Journal of Digital Content Technology and its Applications, 2012, 6 (21) : 110 - 118
  • [38] Data Encryption Method Using Environmental Secret Key with Server Assistance
    Tsai, Kun-Lin
    Leu, Fang-Yie
    Tsai, Shun-Hung
    INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2016, 22 (03): : 423 - 430
  • [39] Optical Secret Key Sharing Method Based on Diffie-Hellman Key Exchange Algorithm
    Jeon, Seok Hee
    Gil, Sang Keun
    JOURNAL OF THE OPTICAL SOCIETY OF KOREA, 2014, 18 (05) : 477 - 484
  • [40] Encryption for Sharing of Secret Medical Images
    Sangeetha, M.
    Arumugam, C.
    Senthilkumar, K. M.
    RESEARCH JOURNAL OF BIOTECHNOLOGY, 2015, 10 (02): : 19 - 21