A Novel Image Encryption Algorithm Based on Voice Key and Chaotic Map

被引:6
|
作者
Li, Jing [1 ]
Fu, Tianshu [2 ]
Fu, Changfeng [3 ]
Han, Lianfu [3 ]
机构
[1] Heilongjiang Bayi Agr Univ, Coll Humanities & Social Sci, Daqing 163319, Peoples R China
[2] Northeast Petr Univ, Sch Phys & Elect Engn, Daqing 163318, Peoples R China
[3] Changshu Inst Technol, Coll Elect & Informat Engn, Changshu 215506, Jiangsu, Peoples R China
来源
APPLIED SCIENCES-BASEL | 2022年 / 12卷 / 11期
基金
中国国家自然科学基金; 中国博士后科学基金;
关键词
chaotic map; image encryption; voice key; authentication; SYSTEMS; RECOGNITION;
D O I
10.3390/app12115452
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
Featured Application In this article, an encryption algorithm is proposed that can be used for remote identity authentication. The specific application method is described in the third section of this article. Initially, the user's voice information is extracted as data, which is subsequently used as the key for image encryption. The encrypted image can be successfully decrypted during identity verification only when the user's voice data are correct, which leads to successful identity verification. This is a new application scheme, and no similar application method has been described in the existing literature, to the best of our knowledge. This paper proposes a new image encryption algorithm. First, time-domain and frequency-domain features of the user's voice are extracted to generate a voice key. Second, the key is iterated through a chaotic map multiple times to map the key data to the chaotic oscillation region, and, subsequently, the parameters of the oscillation area are used to encrypt the user's image. Third, at the time of decryption, the user's latest voice data are re-extracted to generate a new voice key and decrypt the encrypted image. The encrypted image cannot be successfully decrypted if there are differences between the two extracted voices in the time or frequency domain. Finally, the experiments are performed using 80 groups of face images and voice data, all of which pass the encryption and decryption experiments. In addition, various safety tests have been carried out on the algorithm. The key sensitivity of the algorithm is verified by the normalized cross-correlation parameter C-ncc. The effective anti-attack ability of the algorithm is verified by measuring the correlation between adjacent pixels, the number of changing pixel rate (NPCR) and the unified averaged changed intensity (UACI). The key space of the proposed algorithm is greater than 2(100), and it has good anti-cracking ability.
引用
收藏
页数:19
相关论文
共 50 条
  • [31] A novel image encryption algorithm based on chaotic billiards
    Charif, Khalid
    Guennoun, Zine El Abidine
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2021, 24 (01): : 129 - 154
  • [32] A Novel Piecewise Chaotic Map for Image Encryption
    Charalampidis, Nikolaos
    Volos, Christos
    Moysis, Lazaros
    Nistazakis, Hector E.
    Stouboulos, Ioannis
    [J]. 2022 11TH INTERNATIONAL CONFERENCE ON MODERN CIRCUITS AND SYSTEMS TECHNOLOGIES (MOCAST), 2022,
  • [33] A Novel Image Encryption Algorithm Based on Improved 3D Chaotic Cat Map
    Liu, Hongjuan
    Zhu, Zhiliang
    Jiang, Huiyan
    Wang, Beilei
    [J]. PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 3016 - 3021
  • [34] An image encryption algorithm based on a novel 1D chaotic map and compressive sensing
    Dou, Yuqiang
    Li, Ming
    [J]. MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (16) : 24437 - 24454
  • [35] A novel fast image encryption algorithm based on coefficient independent coupled exponential chaotic map
    Zhang, Bowen
    Liu, Lingfeng
    [J]. PHYSICA SCRIPTA, 2024, 99 (02)
  • [36] A novel biological image encryption algorithm based on two-dimensional Feigenbaum chaotic map
    Tu, L.
    Zhang, Yingzheng
    Huang, Xuehua
    Jia, Liyuan
    [J]. Journal of Chemical and Pharmaceutical Research, 2014, 6 (07) : 2073 - 2082
  • [37] An image encryption algorithm based on a novel 1D chaotic map and compressive sensing
    Yuqiang Dou
    Ming Li
    [J]. Multimedia Tools and Applications, 2021, 80 : 24437 - 24454
  • [38] Beta Chaotic Map Based Image Encryption Using Genetic Algorithm
    Kaur, Manjit
    Kumar, Vijay
    [J]. INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2018, 28 (11):
  • [39] Image Compression and Encryption Algorithm Based on Hyper-chaotic Map
    Jun Mou
    Feifei Yang
    Ran Chu
    Yinghong Cao
    [J]. Mobile Networks and Applications, 2021, 26 : 1849 - 1861
  • [40] A fast image encryption algorithm based on chaotic map and lookup table
    Pingguang Cheng
    Huaqian Yang
    Pengcheng Wei
    Wei Zhang
    [J]. Nonlinear Dynamics, 2015, 79 : 2121 - 2131