With the rapid development of remote sensing technology, satellite remote sensing images have been involved in many areas of people’s lives. Remote sensing images contain military secrets, land profiles, and other sensitive data, so it is urgent to encrypt remote sensing images. This paper proposes a dual-channel key transmission model. The plaintext related key is embedded into the ciphertext image through bit-level key hiding transmission strategy, which enhanced the ability of ciphertext image to resist known-plaintext attack and chosen plaintext attack. In addition, a multiband remote sensing image encryption algorithm based on Boolean cross-scrambling and semi-tensor product diffusion is designed. Firstly, the pixel positions of each band of the remote sensing image are disturbed. Then, the random sequence generated by the four-dimensional chaotic system is processed and deformed to obtain a Boolean matrix. Based on the generated Boolean matrix and certain rules, the cross-confusion between the bands is carried out. Finally, the semi-tensor product operation is used in the diffusion process. Simulation results and experimental analysis show that the proposed algorithm obtains a larger key space and has stronger antiattack ability than other remote sensing image encryption algorithms. It can meet the security transmission of multiband remote sensing image in open space.
Today, with the rapid development of the Internet, improving image security becomes more and more important. To improve image encryption efficiency, a novel region of interest (ROI) encryption algorithm based on a chaotic system was proposed. First, a new 1D eλ-cos-cot (1D-ECC) with better chaotic performance than the traditional chaotic system is proposed. Second, the chaotic system is used to generate a plaintext-relate keystream based on the label information of a medical image DICOM (Digital Imaging and Communications in Medicine) file, the medical image is segmented using an adaptive threshold, and the segmented region of interest is encrypted. The encryption process is divided into two stages: scrambling and diffusion. In the scrambling stage, helical scanning and index scrambling are combined to scramble. In the diffusion stage, two-dimensional bi-directional diffusion is adopted, that is, the image is bi-directionally diffused row by column to make image security better. The algorithm offers good encryption speed and security performance, according to simulation results and security analysis.
Various security threats are encountered when keys are transmitted in public channels. In this paper, we propose an image encryption algorithm based on complex network scrambling and multi-directional diffusion. Combining the idea of public key cryptography, the RSA algorithm is used to encrypt the key related to plaintext. The algorithm consists of three stages: key generation stage, complex network scrambling stage, and multi-directional diffusion stage. Firstly, during the key generation phase, SHA-512 and the original image are used to generate plaintext-related information, which is then converted to plaintext-related key through transformation mapping. Secondly, in the complex network scrambling stage, the chaotic random matrix establishes the node relationships in the complex network, which is then used to construct an image model based on the complex network, and then combines pixel-level and block-level methods to scramble images. Finally, in the multi-directional diffusion stage, the multi-directional diffusion method is used to perform forward diffusion, middle spiral diffusion, and backward diffusion on the image in turn to obtain the final ciphertext image. The experimental results show that our encryption algorithm has a large keyspace, the encrypted image has strong randomness and robustness, and can effectively resist brute force attack, statistical attack, and differential attack.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.