Cargando…

Exploiting Dynamic Vector-Level Operations and a 2D-Enhanced Logistic Modular Map for Efficient Chaotic Image Encryption

Over the past few years, chaotic image encryption has gained extensive attention. Nevertheless, the current studies on chaotic image encryption still possess certain constraints. To break these constraints, we initially created a two-dimensional enhanced logistic modular map (2D-ELMM) and subsequent...

Descripción completa

Detalles Bibliográficos
Autores principales: Li, Hongmin, Yu, Shuqi, Feng, Wei, Chen, Yao, Zhang, Jing, Qin, Zhentao, Zhu, Zhengguo, Wozniak, Marcin
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10453646/
https://www.ncbi.nlm.nih.gov/pubmed/37628177
http://dx.doi.org/10.3390/e25081147
_version_ 1785095988179894272
author Li, Hongmin
Yu, Shuqi
Feng, Wei
Chen, Yao
Zhang, Jing
Qin, Zhentao
Zhu, Zhengguo
Wozniak, Marcin
author_facet Li, Hongmin
Yu, Shuqi
Feng, Wei
Chen, Yao
Zhang, Jing
Qin, Zhentao
Zhu, Zhengguo
Wozniak, Marcin
author_sort Li, Hongmin
collection PubMed
description Over the past few years, chaotic image encryption has gained extensive attention. Nevertheless, the current studies on chaotic image encryption still possess certain constraints. To break these constraints, we initially created a two-dimensional enhanced logistic modular map (2D-ELMM) and subsequently devised a chaotic image encryption scheme based on vector-level operations and 2D-ELMM (CIES-DVEM). In contrast to some recent schemes, CIES-DVEM features remarkable advantages in several aspects. Firstly, 2D-ELMM is not only simpler in structure, but its chaotic performance is also significantly better than that of some newly reported chaotic maps. Secondly, the key stream generation process of CIES-DVEM is more practical, and there is no need to replace the secret key or recreate the chaotic sequence when handling different images. Thirdly, the encryption process of CIES-DVEM is dynamic and closely related to plaintext images, enabling it to withstand various attacks more effectively. Finally, CIES-DVEM incorporates lots of vector-level operations, resulting in a highly efficient encryption process. Numerous experiments and analyses indicate that CIES-DVEM not only boasts highly significant advantages in terms of encryption efficiency, but it also surpasses many recent encryption schemes in practicality and security.
format Online
Article
Text
id pubmed-10453646
institution National Center for Biotechnology Information
language English
publishDate 2023
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-104536462023-08-26 Exploiting Dynamic Vector-Level Operations and a 2D-Enhanced Logistic Modular Map for Efficient Chaotic Image Encryption Li, Hongmin Yu, Shuqi Feng, Wei Chen, Yao Zhang, Jing Qin, Zhentao Zhu, Zhengguo Wozniak, Marcin Entropy (Basel) Article Over the past few years, chaotic image encryption has gained extensive attention. Nevertheless, the current studies on chaotic image encryption still possess certain constraints. To break these constraints, we initially created a two-dimensional enhanced logistic modular map (2D-ELMM) and subsequently devised a chaotic image encryption scheme based on vector-level operations and 2D-ELMM (CIES-DVEM). In contrast to some recent schemes, CIES-DVEM features remarkable advantages in several aspects. Firstly, 2D-ELMM is not only simpler in structure, but its chaotic performance is also significantly better than that of some newly reported chaotic maps. Secondly, the key stream generation process of CIES-DVEM is more practical, and there is no need to replace the secret key or recreate the chaotic sequence when handling different images. Thirdly, the encryption process of CIES-DVEM is dynamic and closely related to plaintext images, enabling it to withstand various attacks more effectively. Finally, CIES-DVEM incorporates lots of vector-level operations, resulting in a highly efficient encryption process. Numerous experiments and analyses indicate that CIES-DVEM not only boasts highly significant advantages in terms of encryption efficiency, but it also surpasses many recent encryption schemes in practicality and security. MDPI 2023-07-31 /pmc/articles/PMC10453646/ /pubmed/37628177 http://dx.doi.org/10.3390/e25081147 Text en © 2023 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Li, Hongmin
Yu, Shuqi
Feng, Wei
Chen, Yao
Zhang, Jing
Qin, Zhentao
Zhu, Zhengguo
Wozniak, Marcin
Exploiting Dynamic Vector-Level Operations and a 2D-Enhanced Logistic Modular Map for Efficient Chaotic Image Encryption
title Exploiting Dynamic Vector-Level Operations and a 2D-Enhanced Logistic Modular Map for Efficient Chaotic Image Encryption
title_full Exploiting Dynamic Vector-Level Operations and a 2D-Enhanced Logistic Modular Map for Efficient Chaotic Image Encryption
title_fullStr Exploiting Dynamic Vector-Level Operations and a 2D-Enhanced Logistic Modular Map for Efficient Chaotic Image Encryption
title_full_unstemmed Exploiting Dynamic Vector-Level Operations and a 2D-Enhanced Logistic Modular Map for Efficient Chaotic Image Encryption
title_short Exploiting Dynamic Vector-Level Operations and a 2D-Enhanced Logistic Modular Map for Efficient Chaotic Image Encryption
title_sort exploiting dynamic vector-level operations and a 2d-enhanced logistic modular map for efficient chaotic image encryption
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10453646/
https://www.ncbi.nlm.nih.gov/pubmed/37628177
http://dx.doi.org/10.3390/e25081147
work_keys_str_mv AT lihongmin exploitingdynamicvectorleveloperationsanda2denhancedlogisticmodularmapforefficientchaoticimageencryption
AT yushuqi exploitingdynamicvectorleveloperationsanda2denhancedlogisticmodularmapforefficientchaoticimageencryption
AT fengwei exploitingdynamicvectorleveloperationsanda2denhancedlogisticmodularmapforefficientchaoticimageencryption
AT chenyao exploitingdynamicvectorleveloperationsanda2denhancedlogisticmodularmapforefficientchaoticimageencryption
AT zhangjing exploitingdynamicvectorleveloperationsanda2denhancedlogisticmodularmapforefficientchaoticimageencryption
AT qinzhentao exploitingdynamicvectorleveloperationsanda2denhancedlogisticmodularmapforefficientchaoticimageencryption
AT zhuzhengguo exploitingdynamicvectorleveloperationsanda2denhancedlogisticmodularmapforefficientchaoticimageencryption
AT wozniakmarcin exploitingdynamicvectorleveloperationsanda2denhancedlogisticmodularmapforefficientchaoticimageencryption