• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

基于安全增强加密结构和非线性动力学的面部隐私保护方案

Face privacy protection scheme by security-enhanced encryption structure and nonlinear dynamics.

作者信息

Xie Zhiyu, Lin Yiting, Liu Tengyu, Wen Heping

机构信息

University of Electronic Science and Technology of China, Zhongshan Institute, Zhongshan 528402, China.

School of Information and Communication Engineering, University of Electronic Science and Technology of China, Chengdu 611731, China.

出版信息

iScience. 2024 Aug 20;27(9):110768. doi: 10.1016/j.isci.2024.110768. eCollection 2024 Sep 20.

DOI:10.1016/j.isci.2024.110768
PMID:39286501
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC11403459/
Abstract

This article proposes a secure communication enhancement scheme based on face detection and chaotic partition permutation. The scheme uses edge detection technology to detect facial information, which is then used as an encryption object. The hash value of the plaintext image is extracted as the secret key to the chaotic sequence generated by the chaotic system. Then a series of encryption operations are performed on the face image to obtain the final ciphertext image. In this article, two chaotic systems are used to generate pseudo-random chaotic sequences for different encryption steps. The initial key is computed by combining the hash function of the image and external parameters. The experimental results and security analysis show that the algorithm has excellent encryption effectiveness and security performance against various typical attacks.

摘要

本文提出了一种基于人脸检测和混沌分区置换的安全通信增强方案。该方案利用边缘检测技术检测面部信息,并将其用作加密对象。提取明文图像的哈希值作为混沌系统生成的混沌序列的密钥。然后对人脸图像进行一系列加密操作,得到最终的密文图像。本文使用两个混沌系统为不同的加密步骤生成伪随机混沌序列。初始密钥通过结合图像的哈希函数和外部参数来计算。实验结果和安全性分析表明,该算法对各种典型攻击具有优异的加密有效性和安全性能。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/99ff/11403459/2e4240be9476/gr18.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/99ff/11403459/0d45a3aea22f/fx1.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/99ff/11403459/5580b95268b2/gr1.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/99ff/11403459/c68ea214f701/gr2.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/99ff/11403459/82c094985b1b/gr3.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/99ff/11403459/13a37bee7df8/gr4.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/99ff/11403459/17217d0710e1/gr5.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/99ff/11403459/25dd012c1769/gr6.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/99ff/11403459/38fede495c2d/gr7.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/99ff/11403459/2979797bbca5/gr8.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/99ff/11403459/a078ff09b7f2/gr9.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/99ff/11403459/34348d0e8722/gr10.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/99ff/11403459/ffaff0b507c3/gr11.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/99ff/11403459/2705d9e2c25d/gr12.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/99ff/11403459/c772a9d800ac/gr13.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/99ff/11403459/6c0508701d0b/gr14.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/99ff/11403459/046faa8deadd/gr15.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/99ff/11403459/d2342a08f114/gr16.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/99ff/11403459/cd21be671622/gr17.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/99ff/11403459/2e4240be9476/gr18.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/99ff/11403459/0d45a3aea22f/fx1.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/99ff/11403459/5580b95268b2/gr1.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/99ff/11403459/c68ea214f701/gr2.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/99ff/11403459/82c094985b1b/gr3.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/99ff/11403459/13a37bee7df8/gr4.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/99ff/11403459/17217d0710e1/gr5.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/99ff/11403459/25dd012c1769/gr6.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/99ff/11403459/38fede495c2d/gr7.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/99ff/11403459/2979797bbca5/gr8.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/99ff/11403459/a078ff09b7f2/gr9.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/99ff/11403459/34348d0e8722/gr10.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/99ff/11403459/ffaff0b507c3/gr11.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/99ff/11403459/2705d9e2c25d/gr12.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/99ff/11403459/c772a9d800ac/gr13.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/99ff/11403459/6c0508701d0b/gr14.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/99ff/11403459/046faa8deadd/gr15.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/99ff/11403459/d2342a08f114/gr16.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/99ff/11403459/cd21be671622/gr17.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/99ff/11403459/2e4240be9476/gr18.jpg

相似文献

1
Face privacy protection scheme by security-enhanced encryption structure and nonlinear dynamics.基于安全增强加密结构和非线性动力学的面部隐私保护方案
iScience. 2024 Aug 20;27(9):110768. doi: 10.1016/j.isci.2024.110768. eCollection 2024 Sep 20.
2
Secure image communication based on two-layer dynamic feedback encryption and DWT information hiding.基于双层动态反馈加密和 DWT 信息隐藏的安全图像通信。
PLoS One. 2024 Aug 27;19(8):e0300228. doi: 10.1371/journal.pone.0300228. eCollection 2024.
3
Chaos-based block permutation and dynamic sequence multiplexing for video encryption.用于视频加密的基于混沌的分组置换和动态序列复用
Sci Rep. 2023 Sep 7;13(1):14721. doi: 10.1038/s41598-023-41082-9.
4
A Novel Chaotic Image Encryption Scheme Armed with Global Dynamic Selection.一种具有全局动态选择的新型混沌图像加密方案。
Entropy (Basel). 2023 Mar 9;25(3):476. doi: 10.3390/e25030476.
5
Image Encryption Based on Hopfield Neural Network and Bidirectional Flipping.基于 Hopfield 神经网络和双向翻转的图像加密。
Comput Intell Neurosci. 2022 Feb 11;2022:7941448. doi: 10.1155/2022/7941448. eCollection 2022.
6
Plaintext-Related Dynamic Key Chaotic Image Encryption Algorithm.明文相关动态密钥混沌图像加密算法
Entropy (Basel). 2021 Sep 2;23(9):1159. doi: 10.3390/e23091159.
7
Image encryption scheme based on improved four-dimensional chaotic system and evolutionary operators.基于改进的四维混沌系统和进化算子的图像加密方案
Sci Rep. 2024 Mar 25;14(1):7033. doi: 10.1038/s41598-024-57756-x.
8
Dynamic feedback bit-level image privacy protection based on chaos and information hiding.基于混沌与信息隐藏的动态反馈比特级图像隐私保护
Sci Rep. 2024 Mar 8;14(1):5742. doi: 10.1038/s41598-024-53325-4.
9
A New Image Encryption Algorithm Based on Chaos and Secure Hash SHA-256.一种基于混沌与安全哈希算法SHA - 256的新型图像加密算法
Entropy (Basel). 2018 Sep 19;20(9):716. doi: 10.3390/e20090716.
10
Image Encryption Using a New Hybrid Chaotic Map and Spiral Transformation.基于新型混合混沌映射和螺旋变换的图像加密
Entropy (Basel). 2023 Nov 5;25(11):1516. doi: 10.3390/e25111516.

引用本文的文献

1
Image Privacy Protection Communication Scheme by Fibonacci Interleaved Diffusion and Non-Degenerate Discrete Chaos.基于斐波那契交织扩散和非退化离散混沌的图像隐私保护通信方案
Entropy (Basel). 2025 Jul 25;27(8):790. doi: 10.3390/e27080790.

本文引用的文献

1
Chaotic phase noise-like encryption based on geometric shaping for coherent data center interconnections.基于几何整形的用于相干数据中心互连的混沌相位噪声类加密。
Opt Express. 2024 Jan 15;32(2):1595-1608. doi: 10.1364/OE.506738.
2
Secure image encryption algorithm using chaos-based block permutation and weighted bit planes chain diffusion.基于混沌的块置换和加权位平面链扩散的安全图像加密算法
iScience. 2023 Dec 2;27(1):108610. doi: 10.1016/j.isci.2023.108610. eCollection 2024 Jan 19.
3
Chaos-based block permutation and dynamic sequence multiplexing for video encryption.
用于视频加密的基于混沌的分组置换和动态序列复用
Sci Rep. 2023 Sep 7;13(1):14721. doi: 10.1038/s41598-023-41082-9.