Image Secret Key Generation Method Based on Bit Extraction

被引:0
|
作者
Chen, Shuai [1 ]
Xu, Xiaojun [2 ]
Zhang, Youneng [3 ]
Han, Fang [2 ]
Li, Ying [1 ]
Zheng, Xiaodong [1 ]
机构
[1] Huainan Normal Univ, Sch Elect Engn, Huainan, Anhui, Peoples R China
[2] Huainan Normal Univ, Sch Mech & Elect Engn, Huainan, Anhui, Peoples R China
[3] Anhui Vocat & Tech Coll Ind & Trade, Elect Engn Dept, Huainan, Peoples R China
关键词
cipher; bit extraction; image encryption; method; transformation matrix; ENCRYPTION; SYNCHRONIZATION; CHAOS; SEQUENCES;
D O I
暂无
中图分类号
C93 [管理学]; O22 [运筹学];
学科分类号
070105 ; 12 ; 1201 ; 1202 ; 120202 ;
摘要
Bit extraction method from chaos sequence was proposed in the paper to realize image communication secretly. The cipher comes from nonlinear chaos iteration by seeds and processing of bits transformation matrix. First, the principle of image encryption keys was described, the cipher sequence features was calculated. Secondly, the security of cipher was analyzed. Finally, the experiments were completed successfully for image encryption and decryption. The result is that the cipher sequence is with chaotic characteristics and pseudo randomness, and the cipher pool is huge. The conclusion is the bit extraction method with matrix may be used to calculate cipher keys for image confidential communications with high security.
引用
收藏
页码:400 / 403
页数:4
相关论文
共 50 条
  • [41] Channel Estimation for Secret Key Generation
    McGuire, Michael
    2014 IEEE 28TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2014, : 490 - 496
  • [42] Secret Key Generation With Limited Interaction
    Liu, Jingbo
    Cuff, Paul
    Verdu, Sergio
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2017, 63 (11) : 7358 - 7381
  • [43] Secret Key Generation With Multiantenna Relays
    Sandell, Magnus
    IEEE ACCESS, 2023, 11 : 8387 - 8396
  • [44] Group secret key generation algorithms
    Ye, Chunxuan
    Reznik, Alex
    2007 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS, VOLS 1-7, 2007, : 2596 - 2600
  • [45] A DRV-based bit selection method for SRAM PUF key generation and its impact on ECCs
    Santana-Andreo, A.
    Saraza-Canflanca, P.
    Carrasco-Lopez, H.
    Brox, P.
    Castro-Lopez, R.
    Roca, E.
    Fernandez, F., V
    INTEGRATION-THE VLSI JOURNAL, 2022, 85 : 1 - 9
  • [46] A Probing Model of Secret Key Generation Based on Channel Autocorrelation Function
    Xia, Enjun
    Hu, Binjie
    Shen, Qiaoqiao
    CHINA COMMUNICATIONS, 2024, 21 (06) : 163 - 175
  • [47] MobiKey: Mobility-Based Secret Key Generation in Smart Home
    Wang, Lin
    An, Haonan
    Zhu, Haojin
    Liu, Wenyuan
    IEEE INTERNET OF THINGS JOURNAL, 2020, 7 (08) : 7590 - 7600
  • [48] Topology-based Secret Key Generation for Underwater Acoustic Networks
    Diamant, Roee
    Casari, Paolo
    Tomasin, Stefano
    2021 FIFTH UNDERWATER COMMUNICATIONS AND NETWORKING CONFERENCE (UCOMMS), 2021,
  • [49] Ensemble Performance of Biometric Authentication Systems Based on Secret Key Generation
    Merhav, Neri
    2018 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2018, : 1455 - 1459
  • [50] Joint Localization-based Node Authentication and Secret Key Generation
    Srinivasan, Muralikrishnan
    Skaperas, Sotiris
    Herfeh, Mahdi Shakiba
    Chorti, Arsenia
    IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2022), 2022, : 32 - 37