2022
DOI: 10.21203/rs.3.rs-1983325/v1
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Remote sensing image and multi-type image joint encryption based on NCCS

Abstract: In this paper, an algorithm based on the novel Chebyshev chaotic system (NCCS) for remote sensing image encryption and joint encryption of remote sensing images, grayscale images and color images is proposed. In view of the large amount of remote sensing image data, this paper proposes NCCS, which effectively reduces the time complexity of the algorithm and produces a more uniform pseudo-random sequence with better performance. On this basis, the remote sensing image is encrypted, first put each band of the re… Show more

Help me understand this report
View published versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
4
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(4 citation statements)
references
References 44 publications
0
4
0
Order By: Relevance
“…Test results in Table 4 show that both values are close to theoretical expectations of NPCR and UACI which indicate that a certain ability to resist differential attacks is provided by this algorithm. It is presented in Table 5 for a comparison with other algorithms for both NPCR and UACI [38][39][40][41]. Algorithm NPCR (%) UACI (%) Reference [38] 99.6049 99.4838 Reference [39] 99.6089 99.4374 Reference [40] 99.5900 33.4467 Reference [41] 99.6100 33.4500 Proposed 99.6120 33.5166 Theoretical value 99.6094 33.4635…”
Section: Differential Attackmentioning
confidence: 99%
See 1 more Smart Citation
“…Test results in Table 4 show that both values are close to theoretical expectations of NPCR and UACI which indicate that a certain ability to resist differential attacks is provided by this algorithm. It is presented in Table 5 for a comparison with other algorithms for both NPCR and UACI [38][39][40][41]. Algorithm NPCR (%) UACI (%) Reference [38] 99.6049 99.4838 Reference [39] 99.6089 99.4374 Reference [40] 99.5900 33.4467 Reference [41] 99.6100 33.4500 Proposed 99.6120 33.5166 Theoretical value 99.6094 33.4635…”
Section: Differential Attackmentioning
confidence: 99%
“…It is presented in Table 5 for a comparison with other algorithms for both NPCR and UACI [38][39][40][41]. Algorithm NPCR (%) UACI (%) Reference [38] 99.6049 99.4838 Reference [39] 99.6089 99.4374 Reference [40] 99.5900 33.4467 Reference [41] 99.6100 33.4500 Proposed 99.6120 33.5166 Theoretical value 99.6094 33.4635…”
Section: Differential Attackmentioning
confidence: 99%
“…With the rapid development of the information technology, the information sharing brings convenience to people. People pay more attention to the protection of the key information in the sharing process [1]. Some recent studies show that the traditional encryption algorithms may be difficult to meet the high confidentiality requirements when the computer processes the satellite remote sensing image data.…”
Section: Introductionmentioning
confidence: 99%
“…Qin et al use the new pixel coordinates obtained from the chaotic matrix information to perform the displacement and diffusion operations [21]. Liu et al use the chaotic sequences generated by the NCCS to randomize the one-dimensional matrix images [22]. The remote sensing images are encrypted by the classical diffusion method of cyclic left-side modetaking and mode-adding.…”
Section: Introductionmentioning
confidence: 99%