Abstract
Images, as one of the important carriers for information exchange, play an important role in work and daily life. Image encryption technology has received a lot of attention, and varieties of encryption technologies for images have emerged. Early image encryption technologies have shortcomings such as simple algorithm structure, small key space, and poor resistance to plaintext attacks. These algorithms have been unable to meet the needs of information security at this stage. Based on the wavelet algorithm, chaos algorithm, and cyclic encryption algorithm, combined with frequency domain encryption and spatial domain encryption, a digital image encryption algorithm based on adaptive wavelet is proposed in this paper. In terms of frequency, this paper enhances the adaptive ability of the wavelet algorithm by convex optimization-particle swarm optimization (PSO). At the same time, the chaotic algorithm is used to scramble the low-frequency coefficients. In the aspect of airspace, this paper uses the block-encryption adaptive encryption algorithm to rescramble the wavelet-reconstructed image. And the SHA-1 algorithm is introduced into the plaintext image generation key sequence as a cyclic index value for cyclic encryption. The key composition of the encryption algorithm proposed in this paper is complex, and the idea of a one-time pad is used, which makes the improved algorithm increase the key space and improve the ability to resist the choice of plaintext attack. In each cyclic encryption of the airspace, mutual encryption is performed by image subblocks, and the algorithm adaptability is improved. Through the experimental test of statistical characteristics, key space, and key sensitivity, the encryption performance of the algorithm is verified, and it has strong antiattack and interference ability. It is a relatively secure encryption algorithm.
Highlights
As one of the important carriers of information exchange [1,2,3,4], images play an important role in work and daily life
This paper combines the cyclic adaptive encryption algorithm, proposes a cyclic encryption algorithm combining SHA-1 key sequence and adaptive encryption, and adds the process of block encryption, as the second module of the encryption system. In these two encryption modules, the optimized adaptive wavelet and the newly proposed cyclic adaptive encryption technology are used, respectively, which effectively improve the adaptive ability of the encryption algorithm and solve the problems that the traditional image encryption algorithm has low adaptive ability for the plaintext image and poor resistance to selective plaintext attack and other issues
The encryption technology that was widely recognized as high security has gradually become less secure with the development of cryptanalysis technology
Summary
As one of the important carriers of information exchange [1,2,3,4], images play an important role in work and daily life. The algorithm controls the arrangement of image pixels by using the original image data itself and performs cyclic encryption It can effectively resist the known plaintext attack, the algorithm structure is simple and the security is low. This paper combines the cyclic adaptive encryption algorithm, proposes a cyclic encryption algorithm combining SHA-1 key sequence and adaptive encryption, and adds the process of block encryption, as the second module of the encryption system In these two encryption modules, the optimized adaptive wavelet and the newly proposed cyclic adaptive encryption technology are used, respectively, which effectively improve the adaptive ability of the encryption algorithm and solve the problems that the traditional image encryption algorithm has low adaptive ability for the plaintext image and poor resistance to selective plaintext attack and other issues.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.