Cargando…
Exploiting Dynamic Vector-Level Operations and a 2D-Enhanced Logistic Modular Map for Efficient Chaotic Image Encryption
Over the past few years, chaotic image encryption has gained extensive attention. Nevertheless, the current studies on chaotic image encryption still possess certain constraints. To break these constraints, we initially created a two-dimensional enhanced logistic modular map (2D-ELMM) and subsequent...
Autores principales: | , , , , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2023
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10453646/ https://www.ncbi.nlm.nih.gov/pubmed/37628177 http://dx.doi.org/10.3390/e25081147 |
_version_ | 1785095988179894272 |
---|---|
author | Li, Hongmin Yu, Shuqi Feng, Wei Chen, Yao Zhang, Jing Qin, Zhentao Zhu, Zhengguo Wozniak, Marcin |
author_facet | Li, Hongmin Yu, Shuqi Feng, Wei Chen, Yao Zhang, Jing Qin, Zhentao Zhu, Zhengguo Wozniak, Marcin |
author_sort | Li, Hongmin |
collection | PubMed |
description | Over the past few years, chaotic image encryption has gained extensive attention. Nevertheless, the current studies on chaotic image encryption still possess certain constraints. To break these constraints, we initially created a two-dimensional enhanced logistic modular map (2D-ELMM) and subsequently devised a chaotic image encryption scheme based on vector-level operations and 2D-ELMM (CIES-DVEM). In contrast to some recent schemes, CIES-DVEM features remarkable advantages in several aspects. Firstly, 2D-ELMM is not only simpler in structure, but its chaotic performance is also significantly better than that of some newly reported chaotic maps. Secondly, the key stream generation process of CIES-DVEM is more practical, and there is no need to replace the secret key or recreate the chaotic sequence when handling different images. Thirdly, the encryption process of CIES-DVEM is dynamic and closely related to plaintext images, enabling it to withstand various attacks more effectively. Finally, CIES-DVEM incorporates lots of vector-level operations, resulting in a highly efficient encryption process. Numerous experiments and analyses indicate that CIES-DVEM not only boasts highly significant advantages in terms of encryption efficiency, but it also surpasses many recent encryption schemes in practicality and security. |
format | Online Article Text |
id | pubmed-10453646 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2023 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-104536462023-08-26 Exploiting Dynamic Vector-Level Operations and a 2D-Enhanced Logistic Modular Map for Efficient Chaotic Image Encryption Li, Hongmin Yu, Shuqi Feng, Wei Chen, Yao Zhang, Jing Qin, Zhentao Zhu, Zhengguo Wozniak, Marcin Entropy (Basel) Article Over the past few years, chaotic image encryption has gained extensive attention. Nevertheless, the current studies on chaotic image encryption still possess certain constraints. To break these constraints, we initially created a two-dimensional enhanced logistic modular map (2D-ELMM) and subsequently devised a chaotic image encryption scheme based on vector-level operations and 2D-ELMM (CIES-DVEM). In contrast to some recent schemes, CIES-DVEM features remarkable advantages in several aspects. Firstly, 2D-ELMM is not only simpler in structure, but its chaotic performance is also significantly better than that of some newly reported chaotic maps. Secondly, the key stream generation process of CIES-DVEM is more practical, and there is no need to replace the secret key or recreate the chaotic sequence when handling different images. Thirdly, the encryption process of CIES-DVEM is dynamic and closely related to plaintext images, enabling it to withstand various attacks more effectively. Finally, CIES-DVEM incorporates lots of vector-level operations, resulting in a highly efficient encryption process. Numerous experiments and analyses indicate that CIES-DVEM not only boasts highly significant advantages in terms of encryption efficiency, but it also surpasses many recent encryption schemes in practicality and security. MDPI 2023-07-31 /pmc/articles/PMC10453646/ /pubmed/37628177 http://dx.doi.org/10.3390/e25081147 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Li, Hongmin Yu, Shuqi Feng, Wei Chen, Yao Zhang, Jing Qin, Zhentao Zhu, Zhengguo Wozniak, Marcin Exploiting Dynamic Vector-Level Operations and a 2D-Enhanced Logistic Modular Map for Efficient Chaotic Image Encryption |
title | Exploiting Dynamic Vector-Level Operations and a 2D-Enhanced Logistic Modular Map for Efficient Chaotic Image Encryption |
title_full | Exploiting Dynamic Vector-Level Operations and a 2D-Enhanced Logistic Modular Map for Efficient Chaotic Image Encryption |
title_fullStr | Exploiting Dynamic Vector-Level Operations and a 2D-Enhanced Logistic Modular Map for Efficient Chaotic Image Encryption |
title_full_unstemmed | Exploiting Dynamic Vector-Level Operations and a 2D-Enhanced Logistic Modular Map for Efficient Chaotic Image Encryption |
title_short | Exploiting Dynamic Vector-Level Operations and a 2D-Enhanced Logistic Modular Map for Efficient Chaotic Image Encryption |
title_sort | exploiting dynamic vector-level operations and a 2d-enhanced logistic modular map for efficient chaotic image encryption |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10453646/ https://www.ncbi.nlm.nih.gov/pubmed/37628177 http://dx.doi.org/10.3390/e25081147 |
work_keys_str_mv | AT lihongmin exploitingdynamicvectorleveloperationsanda2denhancedlogisticmodularmapforefficientchaoticimageencryption AT yushuqi exploitingdynamicvectorleveloperationsanda2denhancedlogisticmodularmapforefficientchaoticimageencryption AT fengwei exploitingdynamicvectorleveloperationsanda2denhancedlogisticmodularmapforefficientchaoticimageencryption AT chenyao exploitingdynamicvectorleveloperationsanda2denhancedlogisticmodularmapforefficientchaoticimageencryption AT zhangjing exploitingdynamicvectorleveloperationsanda2denhancedlogisticmodularmapforefficientchaoticimageencryption AT qinzhentao exploitingdynamicvectorleveloperationsanda2denhancedlogisticmodularmapforefficientchaoticimageencryption AT zhuzhengguo exploitingdynamicvectorleveloperationsanda2denhancedlogisticmodularmapforefficientchaoticimageencryption AT wozniakmarcin exploitingdynamicvectorleveloperationsanda2denhancedlogisticmodularmapforefficientchaoticimageencryption |