A Novel Image Encryption Algorithm Based on Voice Key and Chaotic Map

被引:6
|
作者
Li, Jing [1 ]
Fu, Tianshu [2 ]
Fu, Changfeng [3 ]
Han, Lianfu [3 ]
机构
[1] Heilongjiang Bayi Agr Univ, Coll Humanities & Social Sci, Daqing 163319, Peoples R China
[2] Northeast Petr Univ, Sch Phys & Elect Engn, Daqing 163318, Peoples R China
[3] Changshu Inst Technol, Coll Elect & Informat Engn, Changshu 215506, Jiangsu, Peoples R China
来源
APPLIED SCIENCES-BASEL | 2022年 / 12卷 / 11期
基金
中国国家自然科学基金; 中国博士后科学基金;
关键词
chaotic map; image encryption; voice key; authentication; SYSTEMS; RECOGNITION;
D O I
10.3390/app12115452
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
Featured Application In this article, an encryption algorithm is proposed that can be used for remote identity authentication. The specific application method is described in the third section of this article. Initially, the user's voice information is extracted as data, which is subsequently used as the key for image encryption. The encrypted image can be successfully decrypted during identity verification only when the user's voice data are correct, which leads to successful identity verification. This is a new application scheme, and no similar application method has been described in the existing literature, to the best of our knowledge. This paper proposes a new image encryption algorithm. First, time-domain and frequency-domain features of the user's voice are extracted to generate a voice key. Second, the key is iterated through a chaotic map multiple times to map the key data to the chaotic oscillation region, and, subsequently, the parameters of the oscillation area are used to encrypt the user's image. Third, at the time of decryption, the user's latest voice data are re-extracted to generate a new voice key and decrypt the encrypted image. The encrypted image cannot be successfully decrypted if there are differences between the two extracted voices in the time or frequency domain. Finally, the experiments are performed using 80 groups of face images and voice data, all of which pass the encryption and decryption experiments. In addition, various safety tests have been carried out on the algorithm. The key sensitivity of the algorithm is verified by the normalized cross-correlation parameter C-ncc. The effective anti-attack ability of the algorithm is verified by measuring the correlation between adjacent pixels, the number of changing pixel rate (NPCR) and the unified averaged changed intensity (UACI). The key space of the proposed algorithm is greater than 2(100), and it has good anti-cracking ability.
引用
收藏
页数:19
相关论文
共 50 条
  • [21] A novel bit level multiphase algorithm for image encryption based on PWLCM chaotic map
    Hasheminejad, A.
    Rostami, M. J.
    [J]. OPTIK, 2019, 184 : 205 - 213
  • [22] An Improved Image Encryption Algorithm Based on Chaotic Logistic Map
    Wang Feng-ying
    Hu Xiao-li
    Cui Guo-wei
    [J]. 2012 FIFTH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN (ISCID 2012), VOL 2, 2012, : 105 - 107
  • [23] An Image Encryption Algorithm Based on Balanced Pixel and Chaotic Map
    Zhang, Jian
    Zhang, Yutong
    [J]. MATHEMATICAL PROBLEMS IN ENGINEERING, 2014, 2014
  • [24] Parallel image encryption algorithm based on discretized chaotic map
    Zhou, Qing
    Wong, Kwok-wo
    Liao, Xiaofeng
    Xiang, Tao
    Hu, Yue
    [J]. CHAOS SOLITONS & FRACTALS, 2008, 38 (04) : 1081 - 1092
  • [25] A novel color image encryption algorithm based on spatial permutation and quantum chaotic map
    Seyed Mohammad Seyedzadeh
    Benyamin Norouzi
    Mohammad Reza Mosavi
    Sattar Mirzakuchaki
    [J]. Nonlinear Dynamics, 2015, 81 : 511 - 529
  • [26] A novel color image encryption algorithm based on spatial permutation and quantum chaotic map
    Seyedzadeh, Seyed Mohammad
    Norouzi, Benyamin
    Mosavi, Mohammad Reza
    Mirzakuchaki, Sattar
    [J]. NONLINEAR DYNAMICS, 2015, 81 (1-2) : 511 - 529
  • [27] A novel image encryption algorithm based on compound-coupled logistic chaotic map
    Liu, Lingfeng
    Wei, ZhiXiang
    Xiang, Hongyue
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (14) : 19999 - 20019
  • [29] A novel image encryption algorithm based on compound-coupled logistic chaotic map
    Lingfeng Liu
    ZhiXiang Wei
    Hongyue Xiang
    [J]. Multimedia Tools and Applications, 2022, 81 : 19999 - 20019
  • [30] A novel image encryption algorithm based on chaotic sequence
    Xu, Guangxian
    Jin, Junhong
    [J]. Journal of Computational Information Systems, 2011, 7 (06): : 2225 - 2232