2022
DOI: 10.3390/e24091247
|View full text |Cite
|
Sign up to set email alerts
|

An Image Encryption Algorithm Based on Complex Network Scrambling and Multi-Directional Diffusion

Abstract: Various security threats are encountered when keys are transmitted in public channels. In this paper, we propose an image encryption algorithm based on complex network scrambling and multi-directional diffusion. Combining the idea of public key cryptography, the RSA algorithm is used to encrypt the key related to plaintext. The algorithm consists of three stages: key generation stage, complex network scrambling stage, and multi-directional diffusion stage. Firstly, during the key generation phase, SHA-512 and … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 64 publications
0
4
0
Order By: Relevance
“…When the image pixels range from 0 to 255, the ideal value of information entropy is 8. The specific calculation formula is shown in equation (13).…”
Section: Information Entropy Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…When the image pixels range from 0 to 255, the ideal value of information entropy is 8. The specific calculation formula is shown in equation (13).…”
Section: Information Entropy Analysismentioning
confidence: 99%
“…However, the traditional scrambling and diffusion structure is simple and easy to crack. And these two algorithms are processed separately, and the amount of data that the system needs to process increases, which limits the efficiency of image encryption [12,13]. Chen et al [14] successfully broke an image encryption algorithm using two-dimensional sine map and permutation-diffusion, indicating that its security is not high.…”
Section: Introductionmentioning
confidence: 99%
“…Data and signals can be obtained from outside sources in the form of images, time series, or any other type of input data. The input layer updates the reservoir layer with the updated data (Sheng et al, 2022). • Reservoir layer: The reservoir layer resides in the centre of the reservoir computer.…”
Section: ____________________________________________________________...mentioning
confidence: 99%
“…The cryptosystems implemented by computers are based on mathematical algorithms. Currently, the techniques used to model the most advanced cryptosystems are based on mathematical functions with high complexity and computational cost, which are difficult to process by conventional computers [7], [8]. However, a series of studies [9], [10] have shown that the complexity of the mathematical functions used in cryptosystems does not matter since these are based on operations that are applied sequentially to the information that is processed, so they can be easily broken.…”
Section: Introductionmentioning
confidence: 99%