A Novel One-Dimensional Chaotic System for Image Encryption in Network Transmission Through Base64 Encoding
Guardado en:
| Publicado en: | Entropy vol. 27, no. 5 (2025), p. 513 |
|---|---|
| Autor principal: | |
| Otros Autores: | , , , , |
| Publicado: |
MDPI AG
|
| Materias: | |
| Acceso en línea: | Citation/Abstract Full Text + Graphics Full Text - PDF |
| Etiquetas: |
Sin Etiquetas, Sea el primero en etiquetar este registro!
|
MARC
| LEADER | 00000nab a2200000uu 4500 | ||
|---|---|---|---|
| 001 | 3211941694 | ||
| 003 | UK-CbPIL | ||
| 022 | |a 1099-4300 | ||
| 024 | 7 | |a 10.3390/e27050513 |2 doi | |
| 035 | |a 3211941694 | ||
| 045 | 2 | |b d20250101 |b d20251231 | |
| 084 | |a 231460 |2 nlm | ||
| 100 | 1 | |a Huang Linqing |u School of Advanced Manufacturing, Guangdong University of Technology, Jieyang 522000, China; hlq@gdut.edu.cn | |
| 245 | 1 | |a A Novel One-Dimensional Chaotic System for Image Encryption in Network Transmission Through Base64 Encoding | |
| 260 | |b MDPI AG |c 2025 | ||
| 513 | |a Journal Article | ||
| 520 | 3 | |a Continuous advancements in digital image transmission technology within network environments have heightened the necessity for secure, convenient, and well-suited image encryption systems. Base64 encoding possesses the ability to convert raw data into printable ASCII characters, facilitating excellent stability transmission across various communication protocols. In this paper, base64 encoding is first used in image encryption to pursue high application value in network transmission. First, a novel one-dimensional discrete chaotic system (1D-LSCM) with complex chaotic behavior is introduced and extensively tested. Second, a new multi-image encryption algorithm based on the proposed 1D-LSCM and base64 encoding is presented. Technically, three original grayscale images are constructed as a color image and encoded in base64 characters. To purse high plaintext sensitivity, the original image is input to the SHA-256 hash function and its output is used to influence the generated keystream employed in the permutation and diffusion process. After scramble and diffusion operations, the base64 ciphertext is obtained. Finally, test results derived from comprehensive tests prove that our proposed algorithm has remarkable security and encryption efficiency. | |
| 653 | |a Mapping | ||
| 653 | |a Encryption | ||
| 653 | |a Digital imaging | ||
| 653 | |a Image transmission | ||
| 653 | |a Data encryption | ||
| 653 | |a Algorithms | ||
| 653 | |a Permutations | ||
| 653 | |a Hash based algorithms | ||
| 653 | |a Color imagery | ||
| 653 | |a Data transmission | ||
| 653 | |a Chaos theory | ||
| 653 | |a Coding | ||
| 700 | 1 | |a Huang Qingye |u Institute of Collaborative Innovation, University of Macau, Macau, China; 3121009314@mail2.gdut.edu.cn | |
| 700 | 1 | |a Chen, Han |u School of Marine Science and Technology, Shanwei Institute of Technology, Shanwei 516600, China; hanchengdut@gmail.com | |
| 700 | 1 | |a Cai Shuting |u School of Integrated Circuits, Guangdong University of Technology, Guangzhou 510006, China; shutingcai@gdut.edu.cn (S.C.); xmxiong@gdut.edu.cn (X.X.) | |
| 700 | 1 | |a Xiong Xiaoming |u School of Integrated Circuits, Guangdong University of Technology, Guangzhou 510006, China; shutingcai@gdut.edu.cn (S.C.); xmxiong@gdut.edu.cn (X.X.) | |
| 700 | 1 | |a Yang, Jian |u School of Automation, Guangdong University of Technology, Guangzhou 510006, China | |
| 773 | 0 | |t Entropy |g vol. 27, no. 5 (2025), p. 513 | |
| 786 | 0 | |d ProQuest |t Engineering Database | |
| 856 | 4 | 1 | |3 Citation/Abstract |u https://www.proquest.com/docview/3211941694/abstract/embedded/7BTGNMKEMPT1V9Z2?source=fedsrch |
| 856 | 4 | 0 | |3 Full Text + Graphics |u https://www.proquest.com/docview/3211941694/fulltextwithgraphics/embedded/7BTGNMKEMPT1V9Z2?source=fedsrch |
| 856 | 4 | 0 | |3 Full Text - PDF |u https://www.proquest.com/docview/3211941694/fulltextPDF/embedded/7BTGNMKEMPT1V9Z2?source=fedsrch |