Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Item Type
      Item Type
      Clear All
      Item Type
  • Subject
      Subject
      Clear All
      Subject
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
6 result(s) for "Zigzag pixel scrambling"
Sort by:
Color image encryption algorithm based on Mackey–Glass time-delay chaotic system and quantum random walk
To ensure the confidentiality and integrity of image data and prevent unauthorized data tampering and privacy leaks. This study proposes a new color image encryption scheme based on the Mackey–Glass time-delay chaotic system and quantum random walk. This approach fully leverages the unpredictability of quantum random walks to generate random values. It combines the differences in Hamming distance between the three RGB channels of color images to create a highly complex and random key. The overall image and the three independent RGB channels are arranged in ascending order using Logistic-tent chaotic mapping and the Mackey–Glass time-delay chaotic system to obfuscate the image data. The deformed fractional-order Lorenz chaotic system is introduced, integrated with DNA encoding and decoding technology, and XOR operations are performed to achieve encryption at the spatial and pixel levels, thereby increasing the complexity of decryption. Through extensive experimental research, this solution has demonstrated excellent results in tests such as adjacent pixel correlation, information entropy, and key sensitivity. It has an excellent ability to protect the privacy of images and provides a reliable guarantee for the security of image data.
Novel image pixel scrambling technique for efficient color image encryption in resource-constrained IoT devices
In the digital age, where data is a valuable commodity, securing sensitive information has become a growing concern. Image encryption techniques play an essential role in protecting visual data from unauthorized access and ensuring privacy. However, with limited computing capacity in Internet of Things (IoT) devices, standard encryption algorithms are not feasible, rendering lightweight methods mandatory. This study proposes a novel Corner Traversal algorithm, an alternative to existing pixel scrambling techniques. The proposed algorithm demonstrably outperforms its counterparts in both higher confusion and lower time complexity, making it remarkably efficient. Integrated with chaos-based diffusion methods, this algorithm forms a comprehensive encryption scheme. The proposed lightweight image encryption scheme utilizing the Corner Traversal algorithm successfully passed rigorous statistical and differential security analysis. Compared to similar schemes, the proposed encryption scheme employing the Corner Traversal algorithm in the confusion phase distinguishes itself through exceptional NPCR (99.6093 for Lenna) and UACI (33.4648 for Lenna) values. Combined with other evaluation criteria, this method demonstrably meets the stringent security requirements of IoT systems.
Enhancing image security through an advanced chaotic system with free control and zigzag scrambling encryption
To ensure the secure and efficient transmission of images, we propose a new image encryption algorithm based on a chaotic system with free control and zigzag scrambling. The performance of the chaotic system is analyzed using the phase trajectory, Lyapunov exponents (LEs), and bifurcation diagram, which demonstrate its good ergodicity, complex chaotic behavior, large and continuous chaotic range, and stable Lyapunov exponent spectrum. In addition, based on this chaotic system, this algorithm also provided the security for the protection of image data. The algorithm involves scrambling pixel positions using an improved zigzag algorithm and substituting pixel values. The simulation and analysis results show that the proposed algorithm has high security and low time complexity. It can resist various attacks, including statistical analysis, differential attacks, brute-force attacks, known plaintext attacks, and chosen plaintext attacks. The experimental simulations and its performance tests prove that the proposed scheme is effective and secure in image data.
2D sine-logistic-tent-coupling map for image encryption
With the development of chaotic image encryption technology, chaotic system is increasingly at the core of cryptography, a good performance of the chaotic system is very important for the whole encryption algorithm. Some existing two-dimensional chaotic systems have the risk of small key space and are easy to crack. Based on this, a new two-dimensional sine-logistic-tent-coupled mapping chaotic system is proposed, and the encryption algorithm is designed on this basis. The performance analysis shows that the chaotic mapping has better chaotic behavior than the existing two-dimensional chaotic mapping. Overall, image encryption includes scrambling and diffusion of two steps. Based on the traditional zigzag scrambling, authors use the two-way zigzag traversal to disturb the whole image to reduce the correlation between pixels, which has achieved good results. And the use of pixel-level diffusion operation makes the whole image completely chaotic. In addition, the key used in the encryption process is related to the plaintext image, which further enhances the security of the encryption algorithm. Simulation results and security analysis show that the encryption algorithm has high-security performance and can resist external attacks.
Improved reverse zigzag transform and DNA diffusion chaotic image encryption method
In this paper, we propose a chaotic image encryption method based on an improved reverse Zigzag cyclic traversal algorithm combined with DNA coding. The original Zigzag algorithm cannot change all pixel positions at once due to the limitation of the traversal method, and our improved traversal method modifies the original traversal order to reverse zigzag cyclic traversal, after which the image is scrambled with a secondary chaotic sequence. Secondly, the diffusion of DNA pixels is completed after the scrambling operation on the image on the screen. Finally, as an example to further deepen the encryption effect, the image of the chaotic sequence is diffused and the final encrypted image is obtained. Experiments show that the algorithm in this paper has high security. Compared with the original algorithm, the improved reverse Zigzag algorithm has better traversal effect and higher efficiency. Meanwhile, the combination of DNA encoding makes the algorithm more resistant to attacks and can effectively resist common types of attacks.
Cross-image encryption algorithm based on block recombination and spatiotemporal chaos system
Image data encryption has received extensive attention in recent years. In this paper, a new cosine dynamic piecewise coupled mapping lattice (CMDPCML) is proposed. Compared with the traditional CML model of spatiotemporal chaotic system, CMDPCML model has larger parameter space and higher lattice energy diffusion efficiency. A multi-image encryption system based on the CMDPCML spatiotemporal chaos system and block reorganization is created by the idea that plane images are created by splicing numerous pixel blocks. The image is split into non-overlapping subblocks before being reassembled using the priority column reading approach. This technique works with photos of various sizes. After that, a dynamic Zigzag scanning technique is created. Four blocks make up the image, and the chaotic sequence defines which block should be read in each step. The periodic scrambling can be broken using this technique. The image’s pixels and subblocks were subjected to Zigzag scanning, respectively. Finally, to create the illusion of diffusion, each pixel value is computed using a nonlinear function and nonlinear matrix. The number and size of encrypted images are theoretically unlimited, because the reconstructed image size can be unlimited during encryption. The effectiveness and security of the suggested image encryption technique are demonstrated by experimental simulation and performance tests.