A Novel One-Dimensional Chaotic System for Image Encryption in Network Transmission Through Base64 Encoding

Guardado en:
Detalles Bibliográficos
Publicado en:Entropy vol. 27, no. 5 (2025), p. 513
Autor principal: Huang Linqing
Otros Autores: Huang Qingye, Chen, Han, Cai Shuting, Xiong Xiaoming, Yang, Jian
Publicado:
MDPI AG
Materias:
Acceso en línea:Citation/Abstract
Full Text + Graphics
Full Text - PDF
Etiquetas: Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!

MARC

LEADER 00000nab a2200000uu 4500
001 3211941694
003 UK-CbPIL
022 |a 1099-4300 
024 7 |a 10.3390/e27050513  |2 doi 
035 |a 3211941694 
045 2 |b d20250101  |b d20251231 
084 |a 231460  |2 nlm 
100 1 |a Huang Linqing  |u School of Advanced Manufacturing, Guangdong University of Technology, Jieyang 522000, China; hlq@gdut.edu.cn 
245 1 |a A Novel One-Dimensional Chaotic System for Image Encryption in Network Transmission Through Base64 Encoding 
260 |b MDPI AG  |c 2025 
513 |a Journal Article 
520 3 |a Continuous advancements in digital image transmission technology within network environments have heightened the necessity for secure, convenient, and well-suited image encryption systems. Base64 encoding possesses the ability to convert raw data into printable ASCII characters, facilitating excellent stability transmission across various communication protocols. In this paper, base64 encoding is first used in image encryption to pursue high application value in network transmission. First, a novel one-dimensional discrete chaotic system (1D-LSCM) with complex chaotic behavior is introduced and extensively tested. Second, a new multi-image encryption algorithm based on the proposed 1D-LSCM and base64 encoding is presented. Technically, three original grayscale images are constructed as a color image and encoded in base64 characters. To purse high plaintext sensitivity, the original image is input to the SHA-256 hash function and its output is used to influence the generated keystream employed in the permutation and diffusion process. After scramble and diffusion operations, the base64 ciphertext is obtained. Finally, test results derived from comprehensive tests prove that our proposed algorithm has remarkable security and encryption efficiency. 
653 |a Mapping 
653 |a Encryption 
653 |a Digital imaging 
653 |a Image transmission 
653 |a Data encryption 
653 |a Algorithms 
653 |a Permutations 
653 |a Hash based algorithms 
653 |a Color imagery 
653 |a Data transmission 
653 |a Chaos theory 
653 |a Coding 
700 1 |a Huang Qingye  |u Institute of Collaborative Innovation, University of Macau, Macau, China; 3121009314@mail2.gdut.edu.cn 
700 1 |a Chen, Han  |u School of Marine Science and Technology, Shanwei Institute of Technology, Shanwei 516600, China; hanchengdut@gmail.com 
700 1 |a Cai Shuting  |u School of Integrated Circuits, Guangdong University of Technology, Guangzhou 510006, China; shutingcai@gdut.edu.cn (S.C.); xmxiong@gdut.edu.cn (X.X.) 
700 1 |a Xiong Xiaoming  |u School of Integrated Circuits, Guangdong University of Technology, Guangzhou 510006, China; shutingcai@gdut.edu.cn (S.C.); xmxiong@gdut.edu.cn (X.X.) 
700 1 |a Yang, Jian  |u School of Automation, Guangdong University of Technology, Guangzhou 510006, China 
773 0 |t Entropy  |g vol. 27, no. 5 (2025), p. 513 
786 0 |d ProQuest  |t Engineering Database 
856 4 1 |3 Citation/Abstract  |u https://www.proquest.com/docview/3211941694/abstract/embedded/7BTGNMKEMPT1V9Z2?source=fedsrch 
856 4 0 |3 Full Text + Graphics  |u https://www.proquest.com/docview/3211941694/fulltextwithgraphics/embedded/7BTGNMKEMPT1V9Z2?source=fedsrch 
856 4 0 |3 Full Text - PDF  |u https://www.proquest.com/docview/3211941694/fulltextPDF/embedded/7BTGNMKEMPT1V9Z2?source=fedsrch