Abstract

To better protect the image information, an image encryption algorithm based on block scrambling and finite state machine is proposed. The method uses discrete wavelet transform (DWT) to divide the original image into four frequency bands. Secondly, chaotic sequences and zigzag scanning curve are used to construct a scrambling matrix to scramble the four frequency bands. Then combine the chaotic sequence, DNA coding, and automata to transform the state of the scrambled image. Finally, the key stream is used to diffuse the sequence to improve the security of cipher images further. Experimental results and security analysis show that the proposed encryption scheme can resist various attacks and ensure the secure transmission of images.

Highlights

  • With the development of communication technology, information security has been paid more and more attention

  • Luo [5] proposed an image encryption algorithm that uses two-dimensional discrete wavelet transform and chaotic system to carry out adaptive replacement of pixels

  • To solve the above problems, this paper proposes a hyperchaotic image encryption algorithm based on block scrambling and finite automata machine

Read more

Summary

INTRODUCTION

With the development of communication technology, information security has been paid more and more attention. Luo [5] proposed an image encryption algorithm that uses two-dimensional discrete wavelet transform and chaotic system to carry out adaptive replacement of pixels. This method enhances encrypted images' security, but Logistic mapping's encryption structure is often relatively simple and has weak resistance to violent attacks and statistical analysis attacks [6]. The diffusion process is generally to perform bit XOR between the encrypted image and the generated chaotic sequence to change the image pixels. Wu [25] applied it to color image encryption, and diffusion between image pixels is carried out by combining DNA addition, subtraction, and XOR operations

NEW FOUR-WING 4D CHAOTIC SYSTEM
DISCRETE WAVELET TRANSFORM
ENCRYPTION SCHEME
SAFETY ANALYSIS
DIFFERENTIAL ATTACK ANALYSIS
SHANNON ENTROPY AND LOCAL SHANNON ENTROPY
HISTOGRAM ANALYSIS
CORRELATION ANALYSIS
CONCLUSION
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.