• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

一种基于混沌系统和非线性变换的安全高效图像加密方案。

A secure and efficient image encryption scheme based on chaotic systems and nonlinear transformations.

作者信息

Alexan Wassim, Shabasy Noura H El, Ehab Noha, Maher Engy Aly

机构信息

Communications Department, Faculty of Information Engineering and Technology, German University in Cairo (GUC), New Cairo, Egypt.

Mathematics Department, Faculty of Basic Sciences, German University in Cairo (GUC), New Cairo, Egypt.

出版信息

Sci Rep. 2025 Aug 25;15(1):31246. doi: 10.1038/s41598-025-15794-z.

DOI:10.1038/s41598-025-15794-z
PMID:40855095
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC12379260/
Abstract

The exponential growth of digital imagery and the widespread adoption of automation and IoT technologies have heightened the need for robust image encryption techniques. Traditional encryption methods such as AES and DES, though effective for textual data, struggle with the high redundancy of images and real-time processing constraints. To address these challenges, this article proposes a novel multi-image encryption scheme integrating a 5D hyperchaotic system, Arnold's Cat Map, and Langton's Ant to achieve high security, efficiency, and resistance to attacks. The encryption process consists of four stages: (1) key generation using a 5D hyperchaotic system, (2) byte substitution using a newly designed S-box, (3) pixel scrambling via Langton's Ant-based diffusion, and (4) transformation using Arnold's Cat Map. The proposed method achieves a high key space of [Formula: see text], low correlation between encrypted pixels, and fast encryption times of 0.1602s for a [Formula: see text] image, making it suitable for real-time applications. Comprehensive security analyses, including histogram analysis, correlation coefficient evaluation, entropy measurement, differential attack resistance (NPCR and UACI), and NIST randomness tests, confirm the robustness of the encryption scheme. The results demonstrate that the proposed method outperforms existing chaotic and hybrid encryption techniques in terms of security, efficiency, and resistance to cryptographic attacks.

摘要

数字图像的指数级增长以及自动化和物联网技术的广泛应用,使得对强大的图像加密技术的需求日益增加。传统的加密方法,如AES和DES,虽然对文本数据有效,但在处理图像的高冗余性和实时处理限制方面存在困难。为了应对这些挑战,本文提出了一种新颖的多图像加密方案,该方案集成了5D超混沌系统、阿诺德猫映射和兰顿蚂蚁,以实现高安全性、高效性和抗攻击性。加密过程包括四个阶段:(1) 使用5D超混沌系统生成密钥;(2) 使用新设计的S盒进行字节替换;(3) 通过基于兰顿蚂蚁的扩散进行像素置乱;(4) 使用阿诺德猫映射进行变换。所提出的方法实现了高达[公式:见原文]的密钥空间,加密像素之间的低相关性,以及对于[公式:见原文]图像0.1602秒的快速加密时间,使其适用于实时应用。全面的安全性分析,包括直方图分析、相关系数评估、熵测量、抗差分攻击(NPCR和UACI)以及NIST随机性测试,证实了加密方案的鲁棒性。结果表明,所提出的方法在安全性、效率和抗密码攻击方面优于现有的混沌和混合加密技术。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a7fa/12379260/4d2853c040fc/41598_2025_15794_Fig14_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a7fa/12379260/a993c79e778c/41598_2025_15794_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a7fa/12379260/067110476b23/41598_2025_15794_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a7fa/12379260/4b1fbfcd7007/41598_2025_15794_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a7fa/12379260/b167dea69247/41598_2025_15794_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a7fa/12379260/d56cf2e0c46a/41598_2025_15794_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a7fa/12379260/5c7b3e77e5ed/41598_2025_15794_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a7fa/12379260/70cebb8d4a3f/41598_2025_15794_Fig7_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a7fa/12379260/8721aa987cbd/41598_2025_15794_Fig8_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a7fa/12379260/ba150d4e7bfa/41598_2025_15794_Fig9_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a7fa/12379260/8fc12dbf3925/41598_2025_15794_Fig10_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a7fa/12379260/970a95b680dd/41598_2025_15794_Fig11_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a7fa/12379260/3c206756a95c/41598_2025_15794_Fig12_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a7fa/12379260/5169400a19a9/41598_2025_15794_Fig13_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a7fa/12379260/4d2853c040fc/41598_2025_15794_Fig14_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a7fa/12379260/a993c79e778c/41598_2025_15794_Fig1_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a7fa/12379260/067110476b23/41598_2025_15794_Fig2_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a7fa/12379260/4b1fbfcd7007/41598_2025_15794_Fig3_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a7fa/12379260/b167dea69247/41598_2025_15794_Fig4_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a7fa/12379260/d56cf2e0c46a/41598_2025_15794_Fig5_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a7fa/12379260/5c7b3e77e5ed/41598_2025_15794_Fig6_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a7fa/12379260/70cebb8d4a3f/41598_2025_15794_Fig7_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a7fa/12379260/8721aa987cbd/41598_2025_15794_Fig8_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a7fa/12379260/ba150d4e7bfa/41598_2025_15794_Fig9_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a7fa/12379260/8fc12dbf3925/41598_2025_15794_Fig10_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a7fa/12379260/970a95b680dd/41598_2025_15794_Fig11_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a7fa/12379260/3c206756a95c/41598_2025_15794_Fig12_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a7fa/12379260/5169400a19a9/41598_2025_15794_Fig13_HTML.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/a7fa/12379260/4d2853c040fc/41598_2025_15794_Fig14_HTML.jpg

相似文献

1
A secure and efficient image encryption scheme based on chaotic systems and nonlinear transformations.一种基于混沌系统和非线性变换的安全高效图像加密方案。
Sci Rep. 2025 Aug 25;15(1):31246. doi: 10.1038/s41598-025-15794-z.
2
Enhancing AES image encryption with a three-dimensional hyperchaotic system for increased security and efficiency.利用三维超混沌系统增强高级加密标准(AES)图像加密以提高安全性和效率。
PLoS One. 2025 Jul 18;20(7):e0328297. doi: 10.1371/journal.pone.0328297. eCollection 2025.
3
Enhanced security for medical images using a new 5D hyper chaotic map and deep learning based segmentation.使用新型5D超混沌映射和基于深度学习的分割技术增强医学图像的安全性。
Sci Rep. 2025 Jul 2;15(1):22628. doi: 10.1038/s41598-025-04906-4.
4
Securing face images in UAV networks using chaos and DNA cryptography approach.使用混沌和DNA密码学方法在无人机网络中保护面部图像。
Sci Rep. 2025 Jul 17;15(1):26011. doi: 10.1038/s41598-025-11499-5.
5
Robust Image Encryption with 2D Hyperchaotic Map and Dynamic DNA-Zigzag Encoding.基于二维超混沌映射和动态DNA之字形编码的鲁棒图像加密
Entropy (Basel). 2025 Jun 6;27(6):606. doi: 10.3390/e27060606.
6
A novel 2D MTMHM based key generation for enhanced security in medical image communication.一种基于二维多尺度三模态哈尔矩阵的新型密钥生成方法,用于增强医学图像通信中的安全性。
Sci Rep. 2025 Jul 14;15(1):25411. doi: 10.1038/s41598-025-10485-1.
7
An image encryption scheme using 4-D chaotic system and cellular automaton.一种基于四维混沌系统和细胞自动机的图像加密方案。
Sci Rep. 2025 Jun 4;15(1):19499. doi: 10.1038/s41598-025-95511-y.
8
Conic curve encryption and digital signature based on complex number theory for cybersecurity applications.基于复数理论的圆锥曲线加密与数字签名在网络安全应用中的研究
Sci Rep. 2025 Jul 1;15(1):21566. doi: 10.1038/s41598-025-00334-6.
9
A new medical image encryption using modular integrated logistic exponential map and multi-level Q-Sequence matrix.一种基于模块化集成逻辑指数映射和多级Q序列矩阵的新型医学图像加密方法。
Sci Rep. 2025 Aug 26;15(1):31383. doi: 10.1038/s41598-025-16343-4.
10
A high-entropy image encryption scheme using optimized chaotic maps with Josephus permutation strategy.一种使用优化混沌映射和约瑟夫环排列策略的高熵图像加密方案。
Sci Rep. 2025 Aug 11;15(1):29439. doi: 10.1038/s41598-025-14784-5.

本文引用的文献

1
A new multiple image encryption algorithm using hyperchaotic systems, SVD, and modified RC5.一种使用超混沌系统、奇异值分解(SVD)和改进型RC5的新型多重图像加密算法。
Sci Rep. 2025 Mar 21;15(1):9775. doi: 10.1038/s41598-025-92065-x.
2
Performance comparison between Chaos and quantum-chaos based image encryption techniques.基于混沌和量子混沌的图像加密技术之间的性能比较。
Multimed Tools Appl. 2021;80(24):33213-33255. doi: 10.1007/s11042-021-11178-3. Epub 2021 Aug 14.
3
Modification of the Logistic Map Using Fuzzy Numbers with Application to Pseudorandom Number Generation and Image Encryption.
基于模糊数对逻辑斯谛映射的改进及其在伪随机数生成和图像加密中的应用
Entropy (Basel). 2020 Apr 20;22(4):474. doi: 10.3390/e22040474.