• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

一种利用逻辑-正弦混沌映射和细胞自动机的彩色图像加密方案。

A color image encryption scheme utilizing a logistic-sine chaotic map and cellular automata.

作者信息

Sun Shiji, Yang Wenzhong, Yin Yabo, Tian Xiaodan, Li Guanghan, Deng Xiangxin

机构信息

School of Computer Science and Technology (School of Cyberspace Security), Xinjiang University, Urumqi, 830046, China.

Xinjiang Key Laboratory of Multilingual Information Technology, Xinjiang University, Urumqi, 830046, China.

出版信息

Sci Rep. 2025 Jul 1;15(1):21603. doi: 10.1038/s41598-025-04968-4.

DOI:10.1038/s41598-025-04968-4
PMID:40594423
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC12219837/
Abstract

The rapid advancement of 5G technology has led to a significant increase in the generation and transmission of visual image data, underscoring the growing need for robust privacy protection. However, existing chaotic encryption methods often suffer from simplicity and limited security because they rely on single-layer encryption approaches. To address these challenges, this paper introduces a multi-layer image encryption algorithm that leverages the Logistic-Sine chaotic Map (LSCM) and cellular automata for enhanced security. Initially, the R, G, and B channels of an image are extracted and subjected to independent row and column transformations, creating a new, scrambled matrix. Subsequently, the proposed LSCM, which integrates logistic and sine maps to overcome periodic vulnerabilities, generates a rich chaotic sequence for XOR-based encryption. Finally, cellular automata further enhance the obfuscation, increasing the algorithm's complexity and attack resistance. Experimental results demonstrate that the image encryption algorithm achieves high security, strong robustness against noise and data loss, and superior performance in statistical and correlation analyses. These findings suggest that the algorithm is well-suited for protecting visual data in networked environments, offering significant application value in image privacy and security.

摘要

5G技术的迅速发展导致视觉图像数据的生成和传输大幅增加,凸显了对强大隐私保护的需求日益增长。然而,现有的混沌加密方法往往因依赖单层加密方法而存在简单性和安全性有限的问题。为应对这些挑战,本文引入了一种多层图像加密算法,该算法利用Logistic-Sine混沌映射(LSCM)和细胞自动机来增强安全性。首先,提取图像的R、G和B通道并对其进行独立的行和列变换,创建一个新的加扰矩阵。随后,所提出的LSCM通过整合逻辑映射和正弦映射来克服周期性漏洞,生成丰富的混沌序列用于基于异或的加密。最后,细胞自动机进一步增强混淆效果,增加算法的复杂性和抗攻击性。实验结果表明,该图像加密算法实现了高安全性、对噪声和数据丢失的强鲁棒性以及在统计和相关性分析中的卓越性能。这些发现表明,该算法非常适合在网络环境中保护视觉数据,在图像隐私和安全方面具有重要的应用价值。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d755/12219837/562b89315f03/41598_2025_4968_Fig20_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d755/12219837/2b42b6155f4c/41598_2025_4968_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d755/12219837/a1d16ef1004e/41598_2025_4968_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d755/12219837/fa72ffa3be48/41598_2025_4968_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d755/12219837/e0374f785893/41598_2025_4968_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d755/12219837/b98c0caf80c1/41598_2025_4968_Figa_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d755/12219837/279a9bda9b29/41598_2025_4968_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d755/12219837/1b124756f885/41598_2025_4968_Figb_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d755/12219837/9bc9b8acd422/41598_2025_4968_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d755/12219837/1e5710ab2f72/41598_2025_4968_Fig7_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d755/12219837/576b4a64f233/41598_2025_4968_Figc_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d755/12219837/fa3bc92478b5/41598_2025_4968_Fig8_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d755/12219837/d80d397a99c8/41598_2025_4968_Fig9_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d755/12219837/0507b0b3d5e0/41598_2025_4968_Fig10_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d755/12219837/9ea6777f09cb/41598_2025_4968_Fig11_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d755/12219837/7bbb6fff1b50/41598_2025_4968_Fig12_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d755/12219837/4bf42fb198b5/41598_2025_4968_Fig13_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d755/12219837/2700ed3672da/41598_2025_4968_Fig14_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d755/12219837/aecc833071f8/41598_2025_4968_Fig15_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d755/12219837/55528aca2ca7/41598_2025_4968_Fig16_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d755/12219837/68dc813aa040/41598_2025_4968_Fig17_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d755/12219837/c5b0291e55e0/41598_2025_4968_Fig18_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d755/12219837/e9d8bba62e4c/41598_2025_4968_Fig19_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d755/12219837/562b89315f03/41598_2025_4968_Fig20_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d755/12219837/2b42b6155f4c/41598_2025_4968_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d755/12219837/a1d16ef1004e/41598_2025_4968_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d755/12219837/fa72ffa3be48/41598_2025_4968_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d755/12219837/e0374f785893/41598_2025_4968_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d755/12219837/b98c0caf80c1/41598_2025_4968_Figa_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d755/12219837/279a9bda9b29/41598_2025_4968_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d755/12219837/1b124756f885/41598_2025_4968_Figb_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d755/12219837/9bc9b8acd422/41598_2025_4968_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d755/12219837/1e5710ab2f72/41598_2025_4968_Fig7_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d755/12219837/576b4a64f233/41598_2025_4968_Figc_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d755/12219837/fa3bc92478b5/41598_2025_4968_Fig8_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d755/12219837/d80d397a99c8/41598_2025_4968_Fig9_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d755/12219837/0507b0b3d5e0/41598_2025_4968_Fig10_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d755/12219837/9ea6777f09cb/41598_2025_4968_Fig11_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d755/12219837/7bbb6fff1b50/41598_2025_4968_Fig12_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d755/12219837/4bf42fb198b5/41598_2025_4968_Fig13_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d755/12219837/2700ed3672da/41598_2025_4968_Fig14_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d755/12219837/aecc833071f8/41598_2025_4968_Fig15_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d755/12219837/55528aca2ca7/41598_2025_4968_Fig16_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d755/12219837/68dc813aa040/41598_2025_4968_Fig17_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d755/12219837/c5b0291e55e0/41598_2025_4968_Fig18_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d755/12219837/e9d8bba62e4c/41598_2025_4968_Fig19_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d755/12219837/562b89315f03/41598_2025_4968_Fig20_HTML.jpg

相似文献

1
A color image encryption scheme utilizing a logistic-sine chaotic map and cellular automata.一种利用逻辑-正弦混沌映射和细胞自动机的彩色图像加密方案。
Sci Rep. 2025 Jul 1;15(1):21603. doi: 10.1038/s41598-025-04968-4.
2
Enhanced security for medical images using a new 5D hyper chaotic map and deep learning based segmentation.使用新型5D超混沌映射和基于深度学习的分割技术增强医学图像的安全性。
Sci Rep. 2025 Jul 2;15(1):22628. doi: 10.1038/s41598-025-04906-4.
3
Robust Image Encryption with 2D Hyperchaotic Map and Dynamic DNA-Zigzag Encoding.基于二维超混沌映射和动态DNA之字形编码的鲁棒图像加密
Entropy (Basel). 2025 Jun 6;27(6):606. doi: 10.3390/e27060606.
4
A new digital watermarking model using honey encryption and reversible cellular automata.一种使用蜂蜜加密和可逆细胞自动机的新型数字水印模型。
Sci Rep. 2025 Jul 1;15(1):21514. doi: 10.1038/s41598-025-05492-1.
5
A Mixed Chaotic Image Encryption Method Based on Parallel Rotation Scrambling in Rubik's Cube Space.一种基于魔方空间并行旋转置乱的混合混沌图像加密方法。
Entropy (Basel). 2025 May 28;27(6):574. doi: 10.3390/e27060574.
6
Securing digital images: A chaos-driven scrambling algorithm using the Rössler system.保护数字图像:一种使用罗斯勒系统的混沌驱动加扰算法。
PLoS One. 2025 Jun 25;20(6):e0326202. doi: 10.1371/journal.pone.0326202. eCollection 2025.
7
Conic curve encryption and digital signature based on complex number theory for cybersecurity applications.基于复数理论的圆锥曲线加密与数字签名在网络安全应用中的研究
Sci Rep. 2025 Jul 1;15(1):21566. doi: 10.1038/s41598-025-00334-6.
8
Enhancing medical image privacy in IoT with bit-plane level encryption using chaotic map.使用混沌映射通过位平面级加密增强物联网中的医学图像隐私。
Front Comput Neurosci. 2025 Jun 6;19:1591972. doi: 10.3389/fncom.2025.1591972. eCollection 2025.
9
IAESR: IoT-oriented authenticated encryption based on iShadow round function.IAESR:基于iShadow轮函数的面向物联网的认证加密
PeerJ Comput Sci. 2025 Jun 11;11:e2947. doi: 10.7717/peerj-cs.2947. eCollection 2025.
10
Chaos synchronization using adaptive dual barrier function-based nonsingular control with application to ECG signal encryption.基于自适应双障碍函数的非奇异控制实现混沌同步及其在心电图信号加密中的应用
Comput Biol Med. 2025 Aug;194:110470. doi: 10.1016/j.compbiomed.2025.110470. Epub 2025 Jun 3.

本文引用的文献

1
A First-Out Alarm Detection Method via Association Rule Mining and Correlation Analysis.一种基于关联规则挖掘和相关性分析的首次报警检测方法
Entropy (Basel). 2023 Dec 27;26(1):30. doi: 10.3390/e26010030.
2
Exploiting Dynamic Vector-Level Operations and a 2D-Enhanced Logistic Modular Map for Efficient Chaotic Image Encryption.利用动态向量级操作和二维增强逻辑模块化映射实现高效混沌图像加密。
Entropy (Basel). 2023 Jul 31;25(8):1147. doi: 10.3390/e25081147.
3
An Image Encryption Algorithm Based on Complex Network Scrambling and Multi-Directional Diffusion.
一种基于复杂网络置乱与多方向扩散的图像加密算法。
Entropy (Basel). 2022 Sep 5;24(9):1247. doi: 10.3390/e24091247.
4
Multi-Image Encryption Algorithm Based on Cascaded Modulation Chaotic System and Block-Scrambling-Diffusion.基于级联调制混沌系统和分块置乱扩散的多图像加密算法
Entropy (Basel). 2022 Jul 31;24(8):1053. doi: 10.3390/e24081053.
5
A Chaotic-Based Encryption/Decryption Framework for Secure Multimedia Communications.一种用于安全多媒体通信的基于混沌的加密/解密框架。
Entropy (Basel). 2020 Nov 4;22(11):1253. doi: 10.3390/e22111253.