Chaotic maps have been widely used in image encryption due to their complexity, pseudorandomness and high sensitivity to initial values. In this paper, an image encryption algorithm based on a 4D chaotic map and steganography is proposed. The algorithm consists of two rounds of encryption and one operation of embedding hash. In the first round of encryption, the hash value of plaintext image is used to control the generation of chaotic sequences, which makes the encryption algorithm highly relevant to the content of the image. Then, the hash value is embedded into the intermediate image according to the idea of steganography. In the second round of encryption, the image is encrypted under the control of another set of chaotic sequences to hide the hash value and further enhance the security of the algorithm. Different from other algorithms, our algorithm does not need to additionally transmit the hash value to the decryptor through a special channel. It has good availability and adaptability. Experimental results and security analysis demonstrate that the algorithm has high security performance and can resist various attacks.
Face recognition technology has developed rapidly in recent years, and a large number of applications based on face recognition have emerged. Because the template generated by the face recognition system stores the relevant information of facial biometrics, its security is attracting more and more attention. This paper proposes a secure template generation scheme based on a chaotic system. Firstly, the extracted face feature vector is permuted to eliminate the correlation within the vector. Then, the orthogonal matrix is used to transform the vector, and the state value of the vector is changed, while maintaining the original distance between the vectors. Finally, the cosine value of the included angle between the feature vector and different random vectors are calculated and converted into integers to generate the template. The chaotic system is used to drive the template generation process, which not only enhances the diversity of templates, but also has good revocability. In addition, the generated template is irreversible, and even if the template is leaked, it will not disclose the biometric information of users. Experimental results and theoretical analysis on the RaFD and Aberdeen datasets show that the proposed scheme has good verification performance and high security.
The two-dimensional coupled map lattice (2D CML) model has been extensively employed as the basis component for designing various schemes in the cryptography system due to its complicated chaotic dynamic behavior. In this study, we analyze the chaotic characteristics of the 2D CML model, such as the Lyapunov exponent (LE), synchronization stability, bifurcation, and ergodicity. We then show that the chaotic sequences generated by the 2D CML model are random according to the NIST testing. Furthermore, we propose an image encryption scheme based on the 2D CML model and Singular Value Decomposition (SVD). In our scheme, the SVD method is used to reduce the image storage, and the Red, Green, and Blue channels of a color image will be encrypted through confusion and diffusion. The simulation results, as well as the results of the comparison with other schemes, demonstrate that our scheme possesses outstanding statistics, excellent encryption performance, and high security. It has great potential for ensuring the security of digital images in real applications.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.