• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

基于双层动态反馈加密和 DWT 信息隐藏的安全图像通信。

Secure image communication based on two-layer dynamic feedback encryption and DWT information hiding.

机构信息

School of Information Technology and Management, Hunan University of Finance and Economics, Changsha, China.

Zhongshan Institute, University of Electronic Science and Technology of China, Zhongshan, China.

出版信息

PLoS One. 2024 Aug 27;19(8):e0300228. doi: 10.1371/journal.pone.0300228. eCollection 2024.

DOI:10.1371/journal.pone.0300228
PMID:39190627
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC11349087/
Abstract

In response to the vulnerability of image encryption techniques to chosen plaintext attacks, this paper proposes a secure image communication scheme based on two-layer dynamic feedback encryption and discrete wavelet transform (DWT) information hiding. The proposed scheme employs a plaintext correlation and intermediate ciphertext feedback mechanism, and combines chaotic systems, bit-level permutation, bilateral diffusion, and dynamic confusion to ensure the security and confidentiality of transmitted images. Firstly, a dynamically chaotic encryption sequence associated with a secure plaintext hash value is generated and utilized for the first round of bit-level permutation, bilateral diffusion, and dynamic confusion, resulting in an intermediate ciphertext image. Similarly, the characteristic values of the intermediate ciphertext image are used to generate dynamically chaotic encryption sequences associated with them. These sequences are then employed for the second round of bit-level permutation, bilateral diffusion, and dynamic confusion to gain the final ciphertext image. The ciphertext image hidden by DWT also provides efficient encryption, higher level of security and robustness to attacks. This technology offers indiscernible secret data insertion, rendering it challenging for assailants to spot or extract concealed information. By combining the proposed dynamic closed-loop feedback secure image encryption scheme based on the 2D-SLMM chaotic system with DWT-based hiding, a comprehensive and robust image encryption approach can be achieved. According to the results of theoretical research and experimental simulation, our encryption scheme has dynamic encryption effect and reliable security performance. The scheme is highly sensitive to key and plaintext, and can effectively resist various common encryption attacks and maintain good robustness. Therefore, our proposed encryption algorithm is an ideal digital image privacy protection technology, which has a wide range of practical application prospects.

摘要

针对图像加密技术对选择明文攻击的脆弱性,本文提出了一种基于两层动态反馈加密和离散小波变换(DWT)信息隐藏的安全图像通信方案。该方案采用明文相关和中间密文反馈机制,结合混沌系统、位级置换、双边扩散和动态混淆,确保传输图像的安全性和保密性。首先,生成一个与安全明文哈希值相关的动态混沌加密序列,并将其用于第一轮位级置换、双边扩散和动态混淆,生成中间密文图像。同样,使用中间密文图像的特征值生成与之相关的动态混沌加密序列。然后,这些序列用于第二轮位级置换、双边扩散和动态混淆,以获得最终的密文图像。DWT 隐藏的密文图像也提供了高效的加密,更高的安全级别和对攻击的鲁棒性。这项技术提供了不可见的秘密数据插入,使得攻击者难以发现或提取隐藏的信息。通过将基于 2D-SLMM 混沌系统的动态闭环反馈安全图像加密方案与基于 DWT 的隐藏技术相结合,我们可以实现一种全面而强大的图像加密方法。根据理论研究和实验模拟的结果,我们的加密方案具有动态加密效果和可靠的安全性能。该方案对密钥和明文高度敏感,能够有效抵抗各种常见的加密攻击,并保持良好的鲁棒性。因此,我们提出的加密算法是一种理想的数字图像隐私保护技术,具有广泛的实际应用前景。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/899d/11349087/fb6451e05108/pone.0300228.g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/899d/11349087/31b33ac75c37/pone.0300228.g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/899d/11349087/098224395cb7/pone.0300228.g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/899d/11349087/af6139f4e4cf/pone.0300228.g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/899d/11349087/9337c3576756/pone.0300228.g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/899d/11349087/d99c90201c0a/pone.0300228.g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/899d/11349087/a033e06e6cfa/pone.0300228.g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/899d/11349087/bf33be387e76/pone.0300228.g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/899d/11349087/74e416acdeef/pone.0300228.g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/899d/11349087/346c7f1664b9/pone.0300228.g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/899d/11349087/2fe8c32cb578/pone.0300228.g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/899d/11349087/00b3f1da0202/pone.0300228.g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/899d/11349087/2cb6e93bb6cf/pone.0300228.g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/899d/11349087/fb6451e05108/pone.0300228.g013.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/899d/11349087/31b33ac75c37/pone.0300228.g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/899d/11349087/098224395cb7/pone.0300228.g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/899d/11349087/af6139f4e4cf/pone.0300228.g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/899d/11349087/9337c3576756/pone.0300228.g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/899d/11349087/d99c90201c0a/pone.0300228.g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/899d/11349087/a033e06e6cfa/pone.0300228.g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/899d/11349087/bf33be387e76/pone.0300228.g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/899d/11349087/74e416acdeef/pone.0300228.g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/899d/11349087/346c7f1664b9/pone.0300228.g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/899d/11349087/2fe8c32cb578/pone.0300228.g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/899d/11349087/00b3f1da0202/pone.0300228.g011.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/899d/11349087/2cb6e93bb6cf/pone.0300228.g012.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/899d/11349087/fb6451e05108/pone.0300228.g013.jpg

相似文献

1
Secure image communication based on two-layer dynamic feedback encryption and DWT information hiding.基于双层动态反馈加密和 DWT 信息隐藏的安全图像通信。
PLoS One. 2024 Aug 27;19(8):e0300228. doi: 10.1371/journal.pone.0300228. eCollection 2024.
2
Dynamic feedback bit-level image privacy protection based on chaos and information hiding.基于混沌与信息隐藏的动态反馈比特级图像隐私保护
Sci Rep. 2024 Mar 8;14(1):5742. doi: 10.1038/s41598-024-53325-4.
3
A Novel Chaotic Image Encryption Scheme Armed with Global Dynamic Selection.一种具有全局动态选择的新型混沌图像加密方案。
Entropy (Basel). 2023 Mar 9;25(3):476. doi: 10.3390/e25030476.
4
Design and Embedded Implementation of Secure Image Encryption Scheme Using DWT and 2D-LASM.基于离散小波变换和二维局部自相关矩阵的安全图像加密方案的设计与嵌入式实现
Entropy (Basel). 2022 Sep 22;24(10):1332. doi: 10.3390/e24101332.
5
Chaos-based block permutation and dynamic sequence multiplexing for video encryption.用于视频加密的基于混沌的分组置换和动态序列复用
Sci Rep. 2023 Sep 7;13(1):14721. doi: 10.1038/s41598-023-41082-9.
6
An Image Encryption Algorithm Based on Improved Hilbert Curve Scrambling and Dynamic DNA Coding.一种基于改进希尔伯特曲线置乱和动态DNA编码的图像加密算法
Entropy (Basel). 2023 Aug 8;25(8):1178. doi: 10.3390/e25081178.
7
A New Image Encryption Algorithm Based on Chaos and Secure Hash SHA-256.一种基于混沌与安全哈希算法SHA - 256的新型图像加密算法
Entropy (Basel). 2018 Sep 19;20(9):716. doi: 10.3390/e20090716.
8
Face privacy protection scheme by security-enhanced encryption structure and nonlinear dynamics.基于安全增强加密结构和非线性动力学的面部隐私保护方案
iScience. 2024 Aug 20;27(9):110768. doi: 10.1016/j.isci.2024.110768. eCollection 2024 Sep 20.
9
Enhancing image security via chaotic maps, Fibonacci, Tribonacci transformations, and DWT diffusion: a robust data encryption approach.通过混沌映射、斐波那契、特里波那契变换和离散小波变换扩散增强图像安全性:一种稳健的数据加密方法。
Sci Rep. 2024 May 29;14(1):12277. doi: 10.1038/s41598-024-62260-3.
10
Plaintext-Related Dynamic Key Chaotic Image Encryption Algorithm.明文相关动态密钥混沌图像加密算法
Entropy (Basel). 2021 Sep 2;23(9):1159. doi: 10.3390/e23091159.

本文引用的文献

1
Secure image encryption algorithm using chaos-based block permutation and weighted bit planes chain diffusion.基于混沌的块置换和加权位平面链扩散的安全图像加密算法
iScience. 2023 Dec 2;27(1):108610. doi: 10.1016/j.isci.2023.108610. eCollection 2024 Jan 19.
2
A Robust Memristor-Enhanced Polynomial Hyper-Chaotic Map and Its Multi-Channel Image Encryption Application.一种鲁棒的忆阻器增强多项式超混沌映射及其多通道图像加密应用
Micromachines (Basel). 2023 Nov 12;14(11):2090. doi: 10.3390/mi14112090.
3
Chaos-based block permutation and dynamic sequence multiplexing for video encryption.
用于视频加密的基于混沌的分组置换和动态序列复用
Sci Rep. 2023 Sep 7;13(1):14721. doi: 10.1038/s41598-023-41082-9.
4
Exploiting Dynamic Vector-Level Operations and a 2D-Enhanced Logistic Modular Map for Efficient Chaotic Image Encryption.利用动态向量级操作和二维增强逻辑模块化映射实现高效混沌图像加密。
Entropy (Basel). 2023 Jul 31;25(8):1147. doi: 10.3390/e25081147.
5
Design and Embedded Implementation of Secure Image Encryption Scheme Using DWT and 2D-LASM.基于离散小波变换和二维局部自相关矩阵的安全图像加密方案的设计与嵌入式实现
Entropy (Basel). 2022 Sep 22;24(10):1332. doi: 10.3390/e24101332.
6
Secure turbulence-resistant coherent free-space optical communications via chaotic region-optimized probabilistic constellation shaping.通过混沌区域优化的概率星座图成形实现安全抗湍流相干自由空间光通信。
Opt Lett. 2023 Feb 1;48(3):684-687. doi: 10.1364/OL.480981.
7
Double-Color-Image Compression-Encryption Algorithm Based on Quaternion Multiple Parameter DFrAT and Feature Fusion with Preferable Restoration Quality.基于四元数多参数离散分数阶随机变换和具有良好恢复质量的特征融合的双色图像压缩加密算法
Entropy (Basel). 2022 Jul 6;24(7):941. doi: 10.3390/e24070941.
8
Injection-locking chaos synchronization and communication in closed-loop semiconductor lasers subject to phase-conjugate feedback.受相位共轭反馈作用的闭环半导体激光器中的注入锁定混沌同步与通信
Opt Express. 2020 Mar 30;28(7):9477-9486. doi: 10.1364/OE.389028.
9
Color image encryption scheme using CML and DNA sequence operations.基于混沌映射和DNA序列操作的彩色图像加密方案
Biosystems. 2016 Jun;144:18-26. doi: 10.1016/j.biosystems.2016.03.011. Epub 2016 Mar 26.