A Novel Image Encryption Algorithm Based on Voice Key and Chaotic Map

被引:6
|
作者
Li, Jing [1 ]
Fu, Tianshu [2 ]
Fu, Changfeng [3 ]
Han, Lianfu [3 ]
机构
[1] Heilongjiang Bayi Agr Univ, Coll Humanities & Social Sci, Daqing 163319, Peoples R China
[2] Northeast Petr Univ, Sch Phys & Elect Engn, Daqing 163318, Peoples R China
[3] Changshu Inst Technol, Coll Elect & Informat Engn, Changshu 215506, Jiangsu, Peoples R China
来源
APPLIED SCIENCES-BASEL | 2022年 / 12卷 / 11期
基金
中国国家自然科学基金; 中国博士后科学基金;
关键词
chaotic map; image encryption; voice key; authentication; SYSTEMS; RECOGNITION;
D O I
10.3390/app12115452
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
Featured Application In this article, an encryption algorithm is proposed that can be used for remote identity authentication. The specific application method is described in the third section of this article. Initially, the user's voice information is extracted as data, which is subsequently used as the key for image encryption. The encrypted image can be successfully decrypted during identity verification only when the user's voice data are correct, which leads to successful identity verification. This is a new application scheme, and no similar application method has been described in the existing literature, to the best of our knowledge. This paper proposes a new image encryption algorithm. First, time-domain and frequency-domain features of the user's voice are extracted to generate a voice key. Second, the key is iterated through a chaotic map multiple times to map the key data to the chaotic oscillation region, and, subsequently, the parameters of the oscillation area are used to encrypt the user's image. Third, at the time of decryption, the user's latest voice data are re-extracted to generate a new voice key and decrypt the encrypted image. The encrypted image cannot be successfully decrypted if there are differences between the two extracted voices in the time or frequency domain. Finally, the experiments are performed using 80 groups of face images and voice data, all of which pass the encryption and decryption experiments. In addition, various safety tests have been carried out on the algorithm. The key sensitivity of the algorithm is verified by the normalized cross-correlation parameter C-ncc. The effective anti-attack ability of the algorithm is verified by measuring the correlation between adjacent pixels, the number of changing pixel rate (NPCR) and the unified averaged changed intensity (UACI). The key space of the proposed algorithm is greater than 2(100), and it has good anti-cracking ability.
引用
收藏
页数:19
相关论文
共 50 条
  • [1] A novel image encryption algorithm based on improved key selection and digital chaotic map
    Xiang, Hongyue
    Liu, Lingfeng
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (14) : 22135 - 22162
  • [2] A novel image encryption algorithm based on improved key selection and digital chaotic map
    Hongyue Xiang
    Lingfeng Liu
    [J]. Multimedia Tools and Applications, 2021, 80 : 22135 - 22162
  • [3] An Effective Image Encryption Algorithm Based on a Novel Chaotic Map
    Ding, Weikang
    Yang, Qinglian
    Zhao, Dongdong
    Yan, Shi
    [J]. THIRTEENTH INTERNATIONAL CONFERENCE ON GRAPHICS AND IMAGE PROCESSING (ICGIP 2021), 2022, 12083
  • [4] An efficient image encryption algorithm based on a novel chaotic map
    Chengqi Wang
    Xiao Zhang
    Zhiming Zheng
    [J]. Multimedia Tools and Applications, 2017, 76 : 24251 - 24280
  • [5] An efficient image encryption algorithm based on a novel chaotic map
    Wang, Chengqi
    Zhang, Xiao
    Zheng, Zhiming
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2017, 76 (22) : 24251 - 24280
  • [6] A novel sensitive image encryption algorithm based on the Zaslavsky chaotic map
    Hamza, Rafik
    Titouna, Faiza
    [J]. INFORMATION SECURITY JOURNAL, 2016, 25 (4-6): : 162 - 179
  • [7] A novel chaotic map application in image encryption algorithm
    Li, Lizong
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2024, 252
  • [8] A novel chaotic image encryption algorithm based on improved baker map and logistic map
    Luo, Yuqin
    Yu, Jin
    Lai, Wenrui
    Liu, Lingfeng
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2019, 78 (15) : 22023 - 22043
  • [9] A novel chaotic image encryption algorithm based on improved baker map and logistic map
    Yuqin Luo
    Jin Yu
    Wenrui Lai
    Lingfeng Liu
    [J]. Multimedia Tools and Applications, 2019, 78 : 22023 - 22043
  • [10] An Image Encryption Algorithm Based on Oversampled Chaotic Map
    Liu, Shucong
    Song, Yanxing
    Yang, Jingsong
    [J]. MANUFACTURING PROCESS AND EQUIPMENT, PTS 1-4, 2013, 694-697 : 2016 - 2020