z-logo
open-access-imgOpen Access
A Dual-Domain Image Encryption Algorithm Based on Hyperchaos and Dynamic Wavelet Decomposition
Author(s) -
Qiuxia Qin,
Zhongyue Liang,
Shuang Liu,
Xiao Wang,
Changjun Zhou
Publication year - 2022
Publication title -
ieee access
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.587
H-Index - 127
ISSN - 2169-3536
DOI - 10.1109/access.2022.3212145
Subject(s) - aerospace , bioengineering , communication, networking and broadcast technologies , components, circuits, devices and systems , computing and processing , engineered materials, dielectrics and plasmas , engineering profession , fields, waves and electromagnetics , general topics for engineers , geoscience , nuclear engineering , photonics and electrooptics , power, energy and industry applications , robotics and control systems , signal processing and analysis , transportation
To ensure the safe and reliable transmission of images on public channels, this paper proposes a dual-domain image encryption algorithm based on hyperchaos and dynamic wavelet decomposition. The combination of dynamic wavelet decomposition and scrambling and diffusion operations is adopted in our algorithm to realize the combination of spatial and frequency domain encryption. This not only ensures the security of the encryption algorithm, but also ensures the robustness and operating efficiency of the encryption, and at the same time reduces the risk of being attacked. First, divide the original image into blocks, use a random number sequence to control the block scrambling process, and generate a scrambling matrix; Then by calculating the Hamming distance related to the plaintext, dynamically selecting the wavelet type, performing wavelet decomposition, and generating a wavelet coefficient matrix; Re-input the plaintext image to the SHA-512 algorithm to generate the initial value of the hyperchaos. The chaotic system generates the chaotic key matrix through iteration; Then the scrambling matrix is dynamically rotated, and then the Zigzag transform is used to generate the key matrix; Finally, the wavelet coefficient matrix, the chaotic key matrix, and the key matrix are subjected to bitwise XOR operation to realize the diffusion of pixel values and obtain the final encrypted image. Simulation experiments and performance analysis experiments can show that this algorithm can effectively encrypt and decrypt images, and has good encryption and decryption quality, and the ability to resist various attacks.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here