Face privacy protection scheme by security-enhanced encryption structure and nonlinear dynamics

被引:1
|
作者
Xie, Zhiyu [1 ,2 ]
Lin, Yiting [1 ,2 ]
Liu, Tengyu [1 ,2 ]
Wen, Heping [1 ,2 ]
机构
[1] Univ Elect Sci & Technol China, Zhongshan Inst, Zhongshan 528402, Peoples R China
[2] Univ Elect Sci & Technol China, Sch Informat & Commun Engn, Chengdu 611731, Peoples R China
关键词
ALGORITHM; MAP;
D O I
10.1016/j.isci.2024.110768
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
This article proposes a secure communication enhancement scheme based on face detection and chaotic partition permutation. The scheme uses edge detection technology to detect facial information, which is then used as an encryption object. The hash value of the plaintext image is extracted as the secret key to the chaotic sequence generated by the chaotic system. Then a series of encryption operations are performed on the face image to obtain the final ciphertext image. In this article, two chaotic systems are used to generate pseudo-random chaotic sequences for different encryption steps. The initial key is computed by combining the hash function of the image and external parameters. The experimental results and security analysis show that the algorithm has excellent encryption effectiveness and security performance against various typical attacks.
引用
收藏
页数:26
相关论文
共 50 条
  • [41] Provably Secure Security-Enhanced Timed-Release Encryption in the Random Oracle Model
    Yuan, Ke
    Wang, Yahui
    Zeng, Yingming
    Ouyang, Wenlei
    Li, Zheng
    Jia, Chunfu
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [42] A Security-enhanced Key Distribution Scheme for AODVjr Routing Protocol in ZigBee Networks
    Shang Tao
    Huang Fuhua
    Chen Jie
    Liu Jianwei
    CHINESE JOURNAL OF ELECTRONICS, 2013, 22 (03): : 577 - 582
  • [43] Security-enhanced chaos communication with time-delay signature suppression and phase encryption
    Xue, Chenpeng
    Jiang, Ning
    Lv, Yunxin
    Wang, Chao
    Li, Guilan
    Lin, Shuqing
    Qiu, Kun
    OPTICS LETTERS, 2016, 41 (16) : 3690 - 3693
  • [44] A security-enhanced certificateless aggregate signcryption scheme for vehicular ad hoc networks
    Wu, Wanqing
    Chen, Junjie
    VEHICULAR COMMUNICATIONS, 2025, 53
  • [45] Security-enhanced DFMA-PON Based on Three-dimensional Chaos Encryption
    Yan, Yangyang
    Zhang, Chongfu
    Zhang, Huijuan
    Qiu, Kun
    2017 ASIA COMMUNICATIONS AND PHOTONICS CONFERENCE (ACP), 2017,
  • [46] A database encryption scheme for enhanced security and easy sharing
    Chen, Gang
    Chen, Ke
    Dong, Jinxiang
    2006 10TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, PROCEEDINGS, VOLS 1 AND 2, 2006, : 995 - 1000
  • [47] An efficient encrypted deduplication scheme with security-enhanced proof of ownership in edge computing
    Zhou Y.
    Yu Z.
    Gu L.
    Feng D.
    BenchCouncil Transactions on Benchmarks, Standards and Evaluations, 2022, 2 (02):
  • [48] Attribute-Based Encryption Method for Data Privacy Security Protection
    Li, Ziqian
    He, Yeshen
    Zhang, Yiying
    Li, Siwei
    Wang, Cong
    Zhang, Xiankun
    ADVANCED INTELLIGENT COMPUTING TECHNOLOGY AND APPLICATIONS, PT IX, ICIC 2024, 2024, 14870 : 458 - 467
  • [49] A location privacy protection scheme based on random encryption period for VSNs
    Deng, Xinyang
    Xin, Xin
    Gao, Tianhan
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020, 11 (03) : 1351 - 1359
  • [50] Location Privacy Protection Scheme Based on Random Encryption Period in VANETs
    Gao, Tianhan
    Xin, Xin
    INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING, IMIS-2018, 2019, 773 : 366 - 374