Image Privacy Protection Communication Scheme by Fibonacci Interleaved Diffusion and Non-Degenerate Discrete Chaos

Sábháilte in:
Sonraí bibleagrafaíochta
Foilsithe in:Entropy vol. 27, no. 8 (2025), p. 790-813
Príomhchruthaitheoir: Xie Zhiyu
Rannpháirtithe: Xie Weihong, Cheng Xiyuan, Yuan Zhengqin, Cheng, Wenbin, Lin, Yiting
Foilsithe / Cruthaithe:
MDPI AG
Ábhair:
Rochtain ar líne:Citation/Abstract
Full Text + Graphics
Full Text - PDF
Clibeanna: Cuir clib leis
Níl clibeanna ann, Bí ar an gcéad duine le clib a chur leis an taifead seo!
Cur síos
Achoimre:The rapid development of network communication technology has led to an increased focus on the security of image storage and transmission in multimedia information. This paper proposes an enhanced image security communication scheme based on Fibonacci interleaved diffusion and non-degenerate chaotic system to address the inadequacy of current image encryption technology. The scheme utilizes a hash function to extract the hash characteristic values of the plaintext image, generating initial perturbation keys to drive the chaotic system to generate initial pseudo-random sequences. Subsequently, the input image is subjected to a light scrambling process at the bit level. The Q matrix generated by the Fibonacci sequence is then employed to diffuse the obtained intermediate cipher image. The final ciphertext image is then generated by random direction confusion. Throughout the encryption process, plaintext correlation mechanisms are employed. Consequently, due to the feedback loop of the plaintext, this algorithm is capable of resisting known-plaintext attacks and chosen-plaintext attacks. Theoretical analysis and empirical results demonstrate that the algorithm fulfils the cryptographic requirements of confusion, diffusion, and avalanche effects, while also exhibiting a robust password space and excellent numerical statistical properties. Consequently, the security enhancement mechanism based on Fibonacci interleaved diffusion and non-degenerate chaotic system proposed in this paper effectively enhances the algorithm’s resistance to cryptographic attacks.
ISSN:1099-4300
DOI:10.3390/e27080790
Foinse:Engineering Database