• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

基于混沌与信息隐藏的动态反馈比特级图像隐私保护

Dynamic feedback bit-level image privacy protection based on chaos and information hiding.

作者信息

Zhang Jinlong, Wen Heping

机构信息

School of information technology and management, Hunan University of Finance and Economics, Changsha, 410205, China.

University of Electronic Science and Technology of China, Zhongshan Institute, Zhongshan, 528402, China.

出版信息

Sci Rep. 2024 Mar 8;14(1):5742. doi: 10.1038/s41598-024-53325-4.

DOI:10.1038/s41598-024-53325-4
PMID:38459067
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC10923857/
Abstract

Bit is the most basic unit of a digital image in the spatial domain, and bit-level encryption is regarded as an important technical means for digital image privacy protection. To address the vulnerability of image privacy protection to cryptographic attacks, in this paper, a bit-level image privacy protection scheme using Zigzag and chain-diffusion is proposed. The scheme uses a combination of Zigzag interleaving scrambling with chaotic sequences and chain-diffusion method images are encrypted at each bit level, while using non-sequential encryption to achieve efficient and secure encryption. To balance security and efficiency, the encryption strategy for each bit layer is weighted. The chaos-based sequences used for encryption depend on the previous hash value, thus the effect of chain-diffusion is achieved. To further enhance the encryption effect, a non-sequential encryption technique by non-linearly rearranging the bit cipher image is employed, so that the attacker cannot crack the protection scheme by analyzing the encrypted image. The ciphertext image hidden by discrete wavelet transform (DWT) also provides efficient encryption, higher level of security and robustness to attacks. This technology provides indistinguishable secret data embedding, making it difficult for attackers to detect or extract hidden information. Experimental results show that this scheme can effectively protect the confidentiality of the image and can resist various common cryptographic attacks. The scheme proposed in this paper is a preferred digital image privacy protection technology, so it has broad application prospects in image secure transmission occasions.

摘要

比特是空间域中数字图像的最基本单位,比特级加密被视为数字图像隐私保护的一种重要技术手段。为解决图像隐私保护对密码攻击的脆弱性问题,本文提出一种使用Z字形和链式扩散的比特级图像隐私保护方案。该方案将Z字形交织置乱与混沌序列相结合,并采用链式扩散方法对图像的每个比特级进行加密,同时使用非顺序加密来实现高效且安全的加密。为平衡安全性和效率,对每个比特层的加密策略进行加权。用于加密的基于混沌的序列取决于前一个哈希值,从而实现链式扩散的效果。为进一步增强加密效果,采用通过对比特密文图像进行非线性重排的非顺序加密技术,使攻击者无法通过分析加密图像破解保护方案。通过离散小波变换(DWT)隐藏的密文图像也提供了高效加密、更高的安全级别以及对攻击的鲁棒性。该技术提供难以区分的秘密数据嵌入,使攻击者难以检测或提取隐藏信息。实验结果表明,该方案能有效保护图像的机密性,并能抵御各种常见的密码攻击。本文提出的方案是一种优选的数字图像隐私保护技术,因此在图像安全传输场合具有广阔的应用前景。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e085/10923857/6b6a226370ac/41598_2024_53325_Fig14_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e085/10923857/b9a7aaf4f9cc/41598_2024_53325_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e085/10923857/a67804f1c8a3/41598_2024_53325_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e085/10923857/7261ad4edba6/41598_2024_53325_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e085/10923857/05603f54f255/41598_2024_53325_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e085/10923857/f6ec06f784d4/41598_2024_53325_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e085/10923857/74d59fe552e2/41598_2024_53325_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e085/10923857/e321f10e801c/41598_2024_53325_Fig7_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e085/10923857/ed42493b3238/41598_2024_53325_Fig8_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e085/10923857/6c5aba6961d1/41598_2024_53325_Fig9_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e085/10923857/5f86d09d1baf/41598_2024_53325_Fig10_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e085/10923857/e7318a6b20a2/41598_2024_53325_Fig11_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e085/10923857/3ffa9dbd1bb5/41598_2024_53325_Fig12_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e085/10923857/5ee6a14553d1/41598_2024_53325_Fig13_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e085/10923857/6b6a226370ac/41598_2024_53325_Fig14_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e085/10923857/b9a7aaf4f9cc/41598_2024_53325_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e085/10923857/a67804f1c8a3/41598_2024_53325_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e085/10923857/7261ad4edba6/41598_2024_53325_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e085/10923857/05603f54f255/41598_2024_53325_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e085/10923857/f6ec06f784d4/41598_2024_53325_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e085/10923857/74d59fe552e2/41598_2024_53325_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e085/10923857/e321f10e801c/41598_2024_53325_Fig7_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e085/10923857/ed42493b3238/41598_2024_53325_Fig8_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e085/10923857/6c5aba6961d1/41598_2024_53325_Fig9_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e085/10923857/5f86d09d1baf/41598_2024_53325_Fig10_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e085/10923857/e7318a6b20a2/41598_2024_53325_Fig11_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e085/10923857/3ffa9dbd1bb5/41598_2024_53325_Fig12_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e085/10923857/5ee6a14553d1/41598_2024_53325_Fig13_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/e085/10923857/6b6a226370ac/41598_2024_53325_Fig14_HTML.jpg

相似文献

1
Dynamic feedback bit-level image privacy protection based on chaos and information hiding.基于混沌与信息隐藏的动态反馈比特级图像隐私保护
Sci Rep. 2024 Mar 8;14(1):5742. doi: 10.1038/s41598-024-53325-4.
2
Secure image communication based on two-layer dynamic feedback encryption and DWT information hiding.基于双层动态反馈加密和 DWT 信息隐藏的安全图像通信。
PLoS One. 2024 Aug 27;19(8):e0300228. doi: 10.1371/journal.pone.0300228. eCollection 2024.
3
Enhancing image security via chaotic maps, Fibonacci, Tribonacci transformations, and DWT diffusion: a robust data encryption approach.通过混沌映射、斐波那契、特里波那契变换和离散小波变换扩散增强图像安全性:一种稳健的数据加密方法。
Sci Rep. 2024 May 29;14(1):12277. doi: 10.1038/s41598-024-62260-3.
4
An Image Encryption Algorithm Based on Improved Hilbert Curve Scrambling and Dynamic DNA Coding.一种基于改进希尔伯特曲线置乱和动态DNA编码的图像加密算法
Entropy (Basel). 2023 Aug 8;25(8):1178. doi: 10.3390/e25081178.
5
A flexible and visually meaningful multi-image compression, encryption and hiding scheme based on 2D compressive sensing.一种基于二维压缩感知的灵活且具有视觉意义的多图像压缩、加密与隐藏方案。
Heliyon. 2023 Feb 27;9(3):e14072. doi: 10.1016/j.heliyon.2023.e14072. eCollection 2023 Mar.
6
Color Image Encryption Based on an Evolutionary Codebook and Chaotic Systems.基于进化码本和混沌系统的彩色图像加密
Entropy (Basel). 2024 Jul 12;26(7):597. doi: 10.3390/e26070597.
7
Exploiting high-quality reconstruction image encryption strategy by optimized orthogonal compressive sensing.通过优化正交压缩感知开发高质量重建图像加密策略。
Sci Rep. 2024 Apr 16;14(1):8805. doi: 10.1038/s41598-024-59277-z.
8
Secure image encryption algorithm using chaos-based block permutation and weighted bit planes chain diffusion.基于混沌的块置换和加权位平面链扩散的安全图像加密算法
iScience. 2023 Dec 2;27(1):108610. doi: 10.1016/j.isci.2023.108610. eCollection 2024 Jan 19.
9
A visually secure image encryption method based on semi-tensor product compressed sensing and IWT-HD-SVD embedding.一种基于半张量积压缩感知与IWT-HD-SVD嵌入的视觉安全图像加密方法。
Heliyon. 2023 Nov 22;9(12):e22548. doi: 10.1016/j.heliyon.2023.e22548. eCollection 2023 Dec.
10
Image encryption scheme based on improved four-dimensional chaotic system and evolutionary operators.基于改进的四维混沌系统和进化算子的图像加密方案
Sci Rep. 2024 Mar 25;14(1):7033. doi: 10.1038/s41598-024-57756-x.

本文引用的文献

1
Secure image encryption algorithm using chaos-based block permutation and weighted bit planes chain diffusion.基于混沌的块置换和加权位平面链扩散的安全图像加密算法
iScience. 2023 Dec 2;27(1):108610. doi: 10.1016/j.isci.2023.108610. eCollection 2024 Jan 19.
2
Chaos-based block permutation and dynamic sequence multiplexing for video encryption.用于视频加密的基于混沌的分组置换和动态序列复用
Sci Rep. 2023 Sep 7;13(1):14721. doi: 10.1038/s41598-023-41082-9.
3
Exploiting Dynamic Vector-Level Operations and a 2D-Enhanced Logistic Modular Map for Efficient Chaotic Image Encryption.
利用动态向量级操作和二维增强逻辑模块化映射实现高效混沌图像加密。
Entropy (Basel). 2023 Jul 31;25(8):1147. doi: 10.3390/e25081147.
4
Design and Embedded Implementation of Secure Image Encryption Scheme Using DWT and 2D-LASM.基于离散小波变换和二维局部自相关矩阵的安全图像加密方案的设计与嵌入式实现
Entropy (Basel). 2022 Sep 22;24(10):1332. doi: 10.3390/e24101332.
5
Injection-locking chaos synchronization and communication in closed-loop semiconductor lasers subject to phase-conjugate feedback.受相位共轭反馈作用的闭环半导体激光器中的注入锁定混沌同步与通信
Opt Express. 2020 Mar 30;28(7):9477-9486. doi: 10.1364/OE.389028.
6
Image encryption based on the pseudo-orbits from 1D chaotic map.基于一维混沌映射伪轨道的图像加密
Chaos. 2019 Jun;29(6):061101. doi: 10.1063/1.5099261.