Research on computer 3D image encryption processing based on the nonlinear algorithm
This article uses the nonlinear digital chaos theory algorithm to generate the corresponding encryption system initial parameters, by analysing the correlation degree of image elements from the angles of horizontal, vertical, and diagonal direction, in order to study computer three-dimensional (3D)...
Main Authors: | , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
De Gruyter
2022-12-01
|
Series: | Nonlinear Engineering |
Subjects: | |
Online Access: | https://doi.org/10.1515/nleng-2022-0232 |
_version_ | 1797947669380857856 |
---|---|
author | Bian Longlong Chen Jianwei Soni Mukesh Bhola Jyoti Kumar Harish Jawarneh Malik |
author_facet | Bian Longlong Chen Jianwei Soni Mukesh Bhola Jyoti Kumar Harish Jawarneh Malik |
author_sort | Bian Longlong |
collection | DOAJ |
description | This article uses the nonlinear digital chaos theory algorithm to generate the corresponding encryption system initial parameters, by analysing the correlation degree of image elements from the angles of horizontal, vertical, and diagonal direction, in order to study computer three-dimensional (3D) image encryption processing. The correlation degree of the cypher text obtained by the nonlinear algorithm is weak in the image's adjacent pixels, and the adjacent pixels are not related at all, horizontal angle: 0.915989, vertical angle: 0.968184, diagonal angle: 0.913533. The nonlinear algorithm distributes the image's statistical features into the random cypher text. By applying permutations and replacements in 3D space, the proposed approach improves performance parameters and widens key space in comparison to previous image cryptography investigations. The important qualities of such a secure system are its simplicity and efficacy. Simulations and analysis show that the proposed method can produce a large key space while also surviving standard cipher attacks. Because of its powerful cryptographic properties, it is suited for image applications. The nonlinear algorithm has very high sensitivity to the secret key and plaintext, as well as better statistical performance, higher security, and higher efficiency in the operation of the algorithm. |
first_indexed | 2024-04-10T21:30:20Z |
format | Article |
id | doaj.art-36365d76f52e45fe8aa20d603fcdf2a0 |
institution | Directory Open Access Journal |
issn | 2192-8029 |
language | English |
last_indexed | 2024-04-10T21:30:20Z |
publishDate | 2022-12-01 |
publisher | De Gruyter |
record_format | Article |
series | Nonlinear Engineering |
spelling | doaj.art-36365d76f52e45fe8aa20d603fcdf2a02023-01-19T13:43:57ZengDe GruyterNonlinear Engineering2192-80292022-12-0111166467110.1515/nleng-2022-0232Research on computer 3D image encryption processing based on the nonlinear algorithmBian Longlong0Chen Jianwei1Soni Mukesh2Bhola Jyoti3Kumar Harish4Jawarneh Malik5Shijiazhuang Information Engineering Vocational College, Shijiazhuang Hebei, 052160, ChinaShijiazhuang Information Engineering Vocational College, Shijiazhuang Hebei, 052160, ChinaDepartment of Computer Science and Engineering, University Centre for Research & Development, Chandigarh University, Mohali, Punjab 140413, IndiaDepartment of Electronics & Communication Engineering, Model Institute of Engineering and Technology, Jammu, J&K, IndiaDepartment of Computer Science, College of Computer Science, King Khalid University, Abha, Saudi ArabiaDepartment of Computing Sciences, Gulf College, Muscat, OmanThis article uses the nonlinear digital chaos theory algorithm to generate the corresponding encryption system initial parameters, by analysing the correlation degree of image elements from the angles of horizontal, vertical, and diagonal direction, in order to study computer three-dimensional (3D) image encryption processing. The correlation degree of the cypher text obtained by the nonlinear algorithm is weak in the image's adjacent pixels, and the adjacent pixels are not related at all, horizontal angle: 0.915989, vertical angle: 0.968184, diagonal angle: 0.913533. The nonlinear algorithm distributes the image's statistical features into the random cypher text. By applying permutations and replacements in 3D space, the proposed approach improves performance parameters and widens key space in comparison to previous image cryptography investigations. The important qualities of such a secure system are its simplicity and efficacy. Simulations and analysis show that the proposed method can produce a large key space while also surviving standard cipher attacks. Because of its powerful cryptographic properties, it is suited for image applications. The nonlinear algorithm has very high sensitivity to the secret key and plaintext, as well as better statistical performance, higher security, and higher efficiency in the operation of the algorithm.https://doi.org/10.1515/nleng-2022-0232nonlinear algorithm3d imageencryption |
spellingShingle | Bian Longlong Chen Jianwei Soni Mukesh Bhola Jyoti Kumar Harish Jawarneh Malik Research on computer 3D image encryption processing based on the nonlinear algorithm Nonlinear Engineering nonlinear algorithm 3d image encryption |
title | Research on computer 3D image encryption processing based on the nonlinear algorithm |
title_full | Research on computer 3D image encryption processing based on the nonlinear algorithm |
title_fullStr | Research on computer 3D image encryption processing based on the nonlinear algorithm |
title_full_unstemmed | Research on computer 3D image encryption processing based on the nonlinear algorithm |
title_short | Research on computer 3D image encryption processing based on the nonlinear algorithm |
title_sort | research on computer 3d image encryption processing based on the nonlinear algorithm |
topic | nonlinear algorithm 3d image encryption |
url | https://doi.org/10.1515/nleng-2022-0232 |
work_keys_str_mv | AT bianlonglong researchoncomputer3dimageencryptionprocessingbasedonthenonlinearalgorithm AT chenjianwei researchoncomputer3dimageencryptionprocessingbasedonthenonlinearalgorithm AT sonimukesh researchoncomputer3dimageencryptionprocessingbasedonthenonlinearalgorithm AT bholajyoti researchoncomputer3dimageencryptionprocessingbasedonthenonlinearalgorithm AT kumarharish researchoncomputer3dimageencryptionprocessingbasedonthenonlinearalgorithm AT jawarnehmalik researchoncomputer3dimageencryptionprocessingbasedonthenonlinearalgorithm |