Research on computer 3D image encryption processing based on the nonlinear algorithm

This article uses the nonlinear digital chaos theory algorithm to generate the corresponding encryption system initial parameters, by analysing the correlation degree of image elements from the angles of horizontal, vertical, and diagonal direction, in order to study computer three-dimensional (3D)...

Full description

Bibliographic Details
Main Authors: Bian Longlong, Chen Jianwei, Soni Mukesh, Bhola Jyoti, Kumar Harish, Jawarneh Malik
Format: Article
Language:English
Published: De Gruyter 2022-12-01
Series:Nonlinear Engineering
Subjects:
Online Access:https://doi.org/10.1515/nleng-2022-0232
_version_ 1797947669380857856
author Bian Longlong
Chen Jianwei
Soni Mukesh
Bhola Jyoti
Kumar Harish
Jawarneh Malik
author_facet Bian Longlong
Chen Jianwei
Soni Mukesh
Bhola Jyoti
Kumar Harish
Jawarneh Malik
author_sort Bian Longlong
collection DOAJ
description This article uses the nonlinear digital chaos theory algorithm to generate the corresponding encryption system initial parameters, by analysing the correlation degree of image elements from the angles of horizontal, vertical, and diagonal direction, in order to study computer three-dimensional (3D) image encryption processing. The correlation degree of the cypher text obtained by the nonlinear algorithm is weak in the image's adjacent pixels, and the adjacent pixels are not related at all, horizontal angle: 0.915989, vertical angle: 0.968184, diagonal angle: 0.913533. The nonlinear algorithm distributes the image's statistical features into the random cypher text. By applying permutations and replacements in 3D space, the proposed approach improves performance parameters and widens key space in comparison to previous image cryptography investigations. The important qualities of such a secure system are its simplicity and efficacy. Simulations and analysis show that the proposed method can produce a large key space while also surviving standard cipher attacks. Because of its powerful cryptographic properties, it is suited for image applications. The nonlinear algorithm has very high sensitivity to the secret key and plaintext, as well as better statistical performance, higher security, and higher efficiency in the operation of the algorithm.
first_indexed 2024-04-10T21:30:20Z
format Article
id doaj.art-36365d76f52e45fe8aa20d603fcdf2a0
institution Directory Open Access Journal
issn 2192-8029
language English
last_indexed 2024-04-10T21:30:20Z
publishDate 2022-12-01
publisher De Gruyter
record_format Article
series Nonlinear Engineering
spelling doaj.art-36365d76f52e45fe8aa20d603fcdf2a02023-01-19T13:43:57ZengDe GruyterNonlinear Engineering2192-80292022-12-0111166467110.1515/nleng-2022-0232Research on computer 3D image encryption processing based on the nonlinear algorithmBian Longlong0Chen Jianwei1Soni Mukesh2Bhola Jyoti3Kumar Harish4Jawarneh Malik5Shijiazhuang Information Engineering Vocational College, Shijiazhuang Hebei, 052160, ChinaShijiazhuang Information Engineering Vocational College, Shijiazhuang Hebei, 052160, ChinaDepartment of Computer Science and Engineering, University Centre for Research & Development, Chandigarh University, Mohali, Punjab 140413, IndiaDepartment of Electronics & Communication Engineering, Model Institute of Engineering and Technology, Jammu, J&K, IndiaDepartment of Computer Science, College of Computer Science, King Khalid University, Abha, Saudi ArabiaDepartment of Computing Sciences, Gulf College, Muscat, OmanThis article uses the nonlinear digital chaos theory algorithm to generate the corresponding encryption system initial parameters, by analysing the correlation degree of image elements from the angles of horizontal, vertical, and diagonal direction, in order to study computer three-dimensional (3D) image encryption processing. The correlation degree of the cypher text obtained by the nonlinear algorithm is weak in the image's adjacent pixels, and the adjacent pixels are not related at all, horizontal angle: 0.915989, vertical angle: 0.968184, diagonal angle: 0.913533. The nonlinear algorithm distributes the image's statistical features into the random cypher text. By applying permutations and replacements in 3D space, the proposed approach improves performance parameters and widens key space in comparison to previous image cryptography investigations. The important qualities of such a secure system are its simplicity and efficacy. Simulations and analysis show that the proposed method can produce a large key space while also surviving standard cipher attacks. Because of its powerful cryptographic properties, it is suited for image applications. The nonlinear algorithm has very high sensitivity to the secret key and plaintext, as well as better statistical performance, higher security, and higher efficiency in the operation of the algorithm.https://doi.org/10.1515/nleng-2022-0232nonlinear algorithm3d imageencryption
spellingShingle Bian Longlong
Chen Jianwei
Soni Mukesh
Bhola Jyoti
Kumar Harish
Jawarneh Malik
Research on computer 3D image encryption processing based on the nonlinear algorithm
Nonlinear Engineering
nonlinear algorithm
3d image
encryption
title Research on computer 3D image encryption processing based on the nonlinear algorithm
title_full Research on computer 3D image encryption processing based on the nonlinear algorithm
title_fullStr Research on computer 3D image encryption processing based on the nonlinear algorithm
title_full_unstemmed Research on computer 3D image encryption processing based on the nonlinear algorithm
title_short Research on computer 3D image encryption processing based on the nonlinear algorithm
title_sort research on computer 3d image encryption processing based on the nonlinear algorithm
topic nonlinear algorithm
3d image
encryption
url https://doi.org/10.1515/nleng-2022-0232
work_keys_str_mv AT bianlonglong researchoncomputer3dimageencryptionprocessingbasedonthenonlinearalgorithm
AT chenjianwei researchoncomputer3dimageencryptionprocessingbasedonthenonlinearalgorithm
AT sonimukesh researchoncomputer3dimageencryptionprocessingbasedonthenonlinearalgorithm
AT bholajyoti researchoncomputer3dimageencryptionprocessingbasedonthenonlinearalgorithm
AT kumarharish researchoncomputer3dimageencryptionprocessingbasedonthenonlinearalgorithm
AT jawarnehmalik researchoncomputer3dimageencryptionprocessingbasedonthenonlinearalgorithm