• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

Nonequal-length image encryption based on bitplane chaotic mapping.

作者信息

Zhang Ruqing, Zhou Rigui, Luo Jia

机构信息

School of Information Engineering, Shanghai Maritime University, Shanghai, 201306, China.

出版信息

Sci Rep. 2024 Apr 20;14(1):9075. doi: 10.1038/s41598-024-58612-8.

DOI:10.1038/s41598-024-58612-8
PMID:38643266
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC11032362/
Abstract

In recent years, extensive research has focused on encryption algorithms for square images, with relatively little attention given to nonsquare images. This paper introduces a novel encryption algorithm tailored for nonequal length images, integrating bit-plane chaotic mapping and Arnold transformation. To effectively implement the algorithm, the plain image is initially transformed into two equal-sized binary sequences. A new diffusion strategy is then introduced to mutually diffuse these sequences, followed by the use of a chaotic map to control the swapping of binary elements between them, enabling permutation of bits across different bitplanes. Finally, the positional information of the image is scrambled using the Arnold transform, resulting in the generation of the encrypted image. By utilizing nonequal Arnold transformation parameters and the initial value of the Lorenz chaotic map as keys, the transmission of keys is simplified, and the cryptosystem gains infinite key space to resist brute force attacks. Experimental results and security analysis confirm the effectiveness of the proposed quantum image encryption algorithm in encrypting nonsquare images, demonstrating good performance in terms of nonstatistical properties, key sensitivity, and robustness. Furthermore, simulation experiments based on Qiskit successfully validate the correctness and feasibility of the quantum image encryption algorithm.

摘要
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c3d6/11032362/4b19e7aed5d9/41598_2024_58612_Fig16_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c3d6/11032362/3611a4e1b5b4/41598_2024_58612_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c3d6/11032362/4a0acc7fada6/41598_2024_58612_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c3d6/11032362/7fef5e6309f8/41598_2024_58612_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c3d6/11032362/e85c41cc010d/41598_2024_58612_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c3d6/11032362/22f41a68b00a/41598_2024_58612_Fig7_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c3d6/11032362/b17b4e71e420/41598_2024_58612_Fig8_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c3d6/11032362/b860cb300d39/41598_2024_58612_Fig9_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c3d6/11032362/f932b35e1cf5/41598_2024_58612_Fig10_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c3d6/11032362/3222e25cbb17/41598_2024_58612_Fig11_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c3d6/11032362/e5926e79919c/41598_2024_58612_Fig12_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c3d6/11032362/3e384f321ae7/41598_2024_58612_Fig13_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c3d6/11032362/c937ae6444b0/41598_2024_58612_Fig14_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c3d6/11032362/893907554fc8/41598_2024_58612_Fig15_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c3d6/11032362/4b19e7aed5d9/41598_2024_58612_Fig16_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c3d6/11032362/3611a4e1b5b4/41598_2024_58612_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c3d6/11032362/4a0acc7fada6/41598_2024_58612_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c3d6/11032362/7fef5e6309f8/41598_2024_58612_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c3d6/11032362/e85c41cc010d/41598_2024_58612_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c3d6/11032362/22f41a68b00a/41598_2024_58612_Fig7_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c3d6/11032362/b17b4e71e420/41598_2024_58612_Fig8_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c3d6/11032362/b860cb300d39/41598_2024_58612_Fig9_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c3d6/11032362/f932b35e1cf5/41598_2024_58612_Fig10_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c3d6/11032362/3222e25cbb17/41598_2024_58612_Fig11_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c3d6/11032362/e5926e79919c/41598_2024_58612_Fig12_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c3d6/11032362/3e384f321ae7/41598_2024_58612_Fig13_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c3d6/11032362/c937ae6444b0/41598_2024_58612_Fig14_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c3d6/11032362/893907554fc8/41598_2024_58612_Fig15_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/c3d6/11032362/4b19e7aed5d9/41598_2024_58612_Fig16_HTML.jpg

相似文献

1
Nonequal-length image encryption based on bitplane chaotic mapping.
Sci Rep. 2024 Apr 20;14(1):9075. doi: 10.1038/s41598-024-58612-8.
2
A Novel Image Encryption Algorithm Based on Improved Arnold Transform and Chaotic Pulse-Coupled Neural Network.一种基于改进型阿诺德变换和混沌脉冲耦合神经网络的新型图像加密算法。
Entropy (Basel). 2022 Aug 10;24(8):1103. doi: 10.3390/e24081103.
3
Secured Medical Images - a Chaotic Pixel Scrambling Approach.安全医学图像——一种混沌像素置乱方法。
J Med Syst. 2016 Nov;40(11):232. doi: 10.1007/s10916-016-0611-5. Epub 2016 Sep 21.
4
Plaintext-Related Dynamic Key Chaotic Image Encryption Algorithm.明文相关动态密钥混沌图像加密算法
Entropy (Basel). 2021 Sep 2;23(9):1159. doi: 10.3390/e23091159.
5
Image Encryption Using a New Hybrid Chaotic Map and Spiral Transformation.基于新型混合混沌映射和螺旋变换的图像加密
Entropy (Basel). 2023 Nov 5;25(11):1516. doi: 10.3390/e25111516.
6
Research on Color Image Encryption Algorithm Based on Bit-Plane and Chen Chaotic System.基于位平面和陈氏混沌系统的彩色图像加密算法研究
Entropy (Basel). 2022 Jan 26;24(2):186. doi: 10.3390/e24020186.
7
A new color image encryption scheme using CML and a fractional-order chaotic system.一种使用耦合映象格子(CML)和分数阶混沌系统的新型彩色图像加密方案。
PLoS One. 2015 Mar 31;10(3):e0119660. doi: 10.1371/journal.pone.0119660. eCollection 2015.
8
A Novel Chaotic Image Encryption Algorithm Based on Latin Square and Random Shift.基于拉丁方和随机置换的新型混沌图像加密算法。
Comput Intell Neurosci. 2021 Sep 6;2021:2091053. doi: 10.1155/2021/2091053. eCollection 2021.
9
Quantum Image Encryption Scheme Using Arnold Transform and S-box Scrambling.基于阿诺德变换和S盒置乱的量子图像加密方案。
Entropy (Basel). 2019 Mar 28;21(4):343. doi: 10.3390/e21040343.
10
Fractal-Based Hybrid Cryptosystem: Enhancing Image Encryption with RSA, Homomorphic Encryption, and Chaotic Maps.基于分形的混合密码系统:利用RSA、同态加密和混沌映射增强图像加密
Entropy (Basel). 2023 Oct 25;25(11):1478. doi: 10.3390/e25111478.

引用本文的文献

1
ANN-based chaotic PRNG in the novel jerk chaotic system and its application for the image encryption via 2-D Hilbert curve.基于人工神经网络的新型急动混沌系统中的混沌伪随机数发生器及其通过二维希尔伯特曲线在图像加密中的应用。
Sci Rep. 2024 Nov 28;14(1):29602. doi: 10.1038/s41598-024-80969-z.