Deutsch
 
Datenschutzhinweis Impressum
  DetailsucheBrowse

Datensatz

DATENSATZ AKTIONENEXPORT

Freigegeben

Zeitschriftenartikel

New color image cryptosystem via SHA-512 and hybrid domain

Urheber*innen

Wang,  Kunshu
External Organizations;

Wu,  Xiangjun
External Organizations;

Wang,  Hui
External Organizations;

Kan,  Haibin
External Organizations;

/persons/resource/Juergen.Kurths

Kurths,  Jürgen
Potsdam Institute for Climate Impact Research;

Externe Ressourcen
Es sind keine externen Ressourcen hinterlegt
Volltexte (frei zugänglich)
Es sind keine frei zugänglichen Volltexte in PIKpublic verfügbar
Ergänzendes Material (frei zugänglich)
Es sind keine frei zugänglichen Ergänzenden Materialien verfügbar
Zitation

Wang, K., Wu, X., Wang, H., Kan, H., Kurths, J. (2021): New color image cryptosystem via SHA-512 and hybrid domain. - Multimedia Tools and Applications, 80, 12, 18875-18899.
https://doi.org/10.1007/s11042-021-10511-0


Zitierlink: https://publications.pik-potsdam.de/pubman/item/item_25470
Zusammenfassung
Most current image encryption algorithms directly confuse and/or diffuse the image pixels only in spatial domain which results in reducing storage efficiency and making the cipher-image incompressible. In this paper, we introduce a new color image encryption scheme based on the hash function SHA-512, discrete wavelet transform (DWT) and chaotic maps with excellent performance. Combining with the plain-image and the secret keys, the SHA-512 is employed to generate the new keys. In the proposed algorithm, both the 2D-LASM and the 2D-SIMM are used to generate the keystreams, where the initial values and parameters are produced by the SHA-512 hash value. The single-level DWT is applied to decompose the plain-image into four image sub-bands. Then these sub-bands are shuffled, minified, reversed and swapped by the keystreams. The image after inverse discrete wavelet transform (IDWT) reconstruction is further divided and diffused using the keystreams (more than 2349) in spatial domain. Experimental results and performance analysis demonstrate the proposed scheme is an efficient, secure and robust encryption mechanism. Besides, the duration of the experiment was relatively short and required only 0.3628 s on average.