Image Privacy Protection Communication Scheme by Fibonacci Interleaved Diffusion and Non-Degenerate Discrete Chaos

Guardado en:
Detalles Bibliográficos
Publicado en:Entropy vol. 27, no. 8 (2025), p. 790-813
Autor principal: Xie Zhiyu
Otros Autores: Xie Weihong, Cheng Xiyuan, Yuan Zhengqin, Cheng, Wenbin, Lin, Yiting
Publicado:
MDPI AG
Materias:
Acceso en línea:Citation/Abstract
Full Text + Graphics
Full Text - PDF
Etiquetas: Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!

MARC

LEADER 00000nab a2200000uu 4500
001 3244012809
003 UK-CbPIL
022 |a 1099-4300 
024 7 |a 10.3390/e27080790  |2 doi 
035 |a 3244012809 
045 2 |b d20250101  |b d20251231 
084 |a 231460  |2 nlm 
100 1 |a Xie Zhiyu  |u School of Electronic Information, University of Electronic Science and Technology of China Zhongshan Institute, Zhongshan 528402, China; zhiyuxie@ieee.org (Z.X.); 2022010002053@stu.zsc.edu.cn (W.X.); zhengqinyuancs@gmail.com (Z.Y.); 
245 1 |a Image Privacy Protection Communication Scheme by Fibonacci Interleaved Diffusion and Non-Degenerate Discrete Chaos 
260 |b MDPI AG  |c 2025 
513 |a Journal Article 
520 3 |a The rapid development of network communication technology has led to an increased focus on the security of image storage and transmission in multimedia information. This paper proposes an enhanced image security communication scheme based on Fibonacci interleaved diffusion and non-degenerate chaotic system to address the inadequacy of current image encryption technology. The scheme utilizes a hash function to extract the hash characteristic values of the plaintext image, generating initial perturbation keys to drive the chaotic system to generate initial pseudo-random sequences. Subsequently, the input image is subjected to a light scrambling process at the bit level. The Q matrix generated by the Fibonacci sequence is then employed to diffuse the obtained intermediate cipher image. The final ciphertext image is then generated by random direction confusion. Throughout the encryption process, plaintext correlation mechanisms are employed. Consequently, due to the feedback loop of the plaintext, this algorithm is capable of resisting known-plaintext attacks and chosen-plaintext attacks. Theoretical analysis and empirical results demonstrate that the algorithm fulfils the cryptographic requirements of confusion, diffusion, and avalanche effects, while also exhibiting a robust password space and excellent numerical statistical properties. Consequently, the security enhancement mechanism based on Fibonacci interleaved diffusion and non-degenerate chaotic system proposed in this paper effectively enhances the algorithm’s resistance to cryptographic attacks. 
653 |a Encryption 
653 |a Fibonacci numbers 
653 |a Security 
653 |a Hash based algorithms 
653 |a Image storage 
653 |a Scrambling (communication) 
653 |a Chaos theory 
653 |a Feedback loops 
653 |a Data encryption 
653 |a Cryptography 
653 |a Algorithms 
653 |a Pseudorandom sequences 
653 |a Privacy 
653 |a Efficiency 
653 |a Statistical analysis 
700 1 |a Xie Weihong  |u School of Electronic Information, University of Electronic Science and Technology of China Zhongshan Institute, Zhongshan 528402, China; zhiyuxie@ieee.org (Z.X.); 2022010002053@stu.zsc.edu.cn (W.X.); zhengqinyuancs@gmail.com (Z.Y.); 
700 1 |a Cheng Xiyuan  |u School of Automation, Guangdong University of Technology, Guangzhou 510006, China; 2112304365@mail2.gdut.edu.cn 
700 1 |a Yuan Zhengqin  |u School of Electronic Information, University of Electronic Science and Technology of China Zhongshan Institute, Zhongshan 528402, China; zhiyuxie@ieee.org (Z.X.); 2022010002053@stu.zsc.edu.cn (W.X.); zhengqinyuancs@gmail.com (Z.Y.); 
700 1 |a Cheng, Wenbin  |u School of Electronic Information, University of Electronic Science and Technology of China Zhongshan Institute, Zhongshan 528402, China; zhiyuxie@ieee.org (Z.X.); 2022010002053@stu.zsc.edu.cn (W.X.); zhengqinyuancs@gmail.com (Z.Y.); 
700 1 |a Lin, Yiting  |u School of Electronic Information, University of Electronic Science and Technology of China Zhongshan Institute, Zhongshan 528402, China; zhiyuxie@ieee.org (Z.X.); 2022010002053@stu.zsc.edu.cn (W.X.); zhengqinyuancs@gmail.com (Z.Y.); 
773 0 |t Entropy  |g vol. 27, no. 8 (2025), p. 790-813 
786 0 |d ProQuest  |t Engineering Database 
856 4 1 |3 Citation/Abstract  |u https://www.proquest.com/docview/3244012809/abstract/embedded/7BTGNMKEMPT1V9Z2?source=fedsrch 
856 4 0 |3 Full Text + Graphics  |u https://www.proquest.com/docview/3244012809/fulltextwithgraphics/embedded/7BTGNMKEMPT1V9Z2?source=fedsrch 
856 4 0 |3 Full Text - PDF  |u https://www.proquest.com/docview/3244012809/fulltextPDF/embedded/7BTGNMKEMPT1V9Z2?source=fedsrch