Image Secret Key Generation Method Based on Bit Extraction

被引:0
|
作者
Chen, Shuai [1 ]
Xu, Xiaojun [2 ]
Zhang, Youneng [3 ]
Han, Fang [2 ]
Li, Ying [1 ]
Zheng, Xiaodong [1 ]
机构
[1] Huainan Normal Univ, Sch Elect Engn, Huainan, Anhui, Peoples R China
[2] Huainan Normal Univ, Sch Mech & Elect Engn, Huainan, Anhui, Peoples R China
[3] Anhui Vocat & Tech Coll Ind & Trade, Elect Engn Dept, Huainan, Peoples R China
关键词
cipher; bit extraction; image encryption; method; transformation matrix; ENCRYPTION; SYNCHRONIZATION; CHAOS; SEQUENCES;
D O I
暂无
中图分类号
C93 [管理学]; O22 [运筹学];
学科分类号
070105 ; 12 ; 1201 ; 1202 ; 120202 ;
摘要
Bit extraction method from chaos sequence was proposed in the paper to realize image communication secretly. The cipher comes from nonlinear chaos iteration by seeds and processing of bits transformation matrix. First, the principle of image encryption keys was described, the cipher sequence features was calculated. Secondly, the security of cipher was analyzed. Finally, the experiments were completed successfully for image encryption and decryption. The result is that the cipher sequence is with chaotic characteristics and pseudo randomness, and the cipher pool is huge. The conclusion is the bit extraction method with matrix may be used to calculate cipher keys for image confidential communications with high security.
引用
收藏
页码:400 / 403
页数:4
相关论文
共 50 条
  • [21] A key based secure threshold cryptography for secret image
    Naskar, Prabir Kr.
    Khan, Hari Narayan
    Chaudhuri, Atal
    International Journal of Network Security, 2016, 18 (01) : 68 - 81
  • [22] Secret Key Generation Based on Channel and Distance Measurements
    Badawy, Ahmed
    Khattab, Tamer
    ElFouly, Tarek
    Mohamed, Amr
    Trinchero, Daniele
    2014 6TH INTERNATIONAL CONGRESS ON ULTRA MODERN TELECOMMUNICATIONS AND CONTROL SYSTEMS AND WORKSHOPS (ICUMT), 2014, : 136 - 142
  • [23] Bipartite Graph Matching Based Secret Key Generation
    Liu, Hongbo
    Wang, Yan
    Ren, Yanzhi
    Chen, Yingying
    IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2021), 2021,
  • [24] Key distillation and the secret-bit fraction
    Jones, Nick S.
    Masanes, Lluis
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (02) : 680 - 691
  • [25] Covert Secret Key Generation
    Tahmasbi, Mehrdad
    Bloch, Matthieu R.
    2017 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2017, : 540 - 544
  • [26] Stealthy Secret Key Generation
    Lin, Pin-Hsun
    Janda, Carsten R.
    Jorswieck, Eduard A.
    Schaefer, Rafael F.
    ENTROPY, 2020, 22 (06)
  • [27] Stealthy Secret Key Generation
    Lin, Pin-Hsun
    Janda, Carsten Rudolf
    Jorswieck, Eduard Axel
    2017 IEEE GLOBAL CONFERENCE ON SIGNAL AND INFORMATION PROCESSING (GLOBALSIP 2017), 2017, : 492 - 496
  • [28] Secret Key-Based Image Steganography in Spatial Domain
    Gajabe, Rajashree
    Ali, Syed Taqi
    INTERNATIONAL JOURNAL OF IMAGE AND GRAPHICS, 2022, 22 (02)
  • [29] Relay-based Secret Key Generation in LTE-A
    Chen, Kan
    Natarajan, Balasubramaniam
    Shattil, Steve
    2014 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2014, : 139 - 144
  • [30] Secret key generation based on signal power allocation optimisation
    Lu, Xinjin
    Lei, Jing
    Li, Wei
    IET COMMUNICATIONS, 2022, 16 (14) : 1724 - 1730