Computer Science ›› 2018, Vol. 45 ›› Issue (11A): 389-392.

• Information Security • Previous Articles     Next Articles

Composite Image Encryption Algorithm Based on Involutory Matrix

ZANG Rui, YU Yang   

  1. College of Science,Northeast Forestry University,Harbin 150040,China
  • Online:2019-02-26 Published:2019-02-26

Abstract: As the Internet plays a more and more important role in economic society and national security,the security of network data transmission has attracted the attention of academic circles in recent years.One of the hot research issues is the encryption and transmission of digital image information.The traditional way of image encryption is relatively simple,has some flaws and is easy to be cracked.For this question,the content of the research is a composite encryption algorithm based on involutory matrix,matrix decomposition and information hiding.The original image is encrypted by using the matching matrix,and the encrypted image is decomposed into several low-pixel images and then hidden into the public information.The example shows that this method has high safety performance and good effect.

Key words: Image encryption, Information hiding, Involutory matrix, Matrix decomposition

CLC Number: 

  • TP301
[1]杜长斌.基于JPEG算法的数字图像压缩技术应用研究[D].哈尔滨:黑龙江大学,2013.
[2]VAFERI E,SABBAGHI-NADOOSHAN R.A New Encryption Algorithm for Color Images based on Total Chaotic Shuffling Scheme[J].Optik-International Journal for Light and Electron Optics,2015,126(20):2474-2480.
[3]KANSO A,GHEBLEH M.An algorithm for encryption of secret images into meaningful images[J].Optics & Lasers in Engineering,2017,90(3):196-208.
[4]WIKRAMARATNA R S.The centro-invertible matrix:A new type of matrix arising in pseudo-random number generation[J].Linear Algebra & Its Applications,2011,434(1):144-151.
[5]LEBTAHI L,ROMERO O,THOME N.Characterizations of {K,s+1}-potent matrices and applications[J].Linear Algebra & Its Applications,2012,436(2):293-306.
[6]CONNELL E H.Elements of Abstract and Linear Algebra[J].American Mathematical Monthly,1999,81(3):301.
[7]ASHRAFI N,SHEIBANI M,CHEN H.Certain decompositions of matrices over abelian rings[J].Czechoslovak Mathematical Journal,2017,67(2):1-9.
[8]邢坤.二次Arnold变换与中心可逆矩阵研究[D].哈尔滨:东北林业大学,2015.
[9]申健,雷菁,李保国,等.一种新型信息隐藏技术的研究与实现[J].通信技术,2013,46(2):100-102.
[10]闫伟齐.数字图象信息隐藏中的数学方法及应用研究[D].北京:中国科学院研究生院(计算技术研究所),2001.
[11]李用江.数字图像置乱算法的研究[D].西安:西安电子科技大学,2011.
[1] ZHOU Lian-bing, ZHOU Xiang-zhen, CUI Xue-rong. Compressed Image Encryption Scheme Based on Dual Two Dimensional Chaotic Map [J]. Computer Science, 2022, 49(8): 344-349.
[2] SHE Wei, HUO Li-juan, TIAN Zhao, LIU Wei, SONG Xuan. Blockchain Covert Communication Model for Plain Text Information Hiding [J]. Computer Science, 2022, 49(1): 345-352.
[3] ZHANG Sai-nan, LI Qian-mu. Color Image Encryption Algorithm Based on Logistic-Sine-Cosine Mapping [J]. Computer Science, 2022, 49(1): 353-358.
[4] DONG Xiao-mei, WANG Rui, ZOU Xin-kai. Survey on Privacy Protection Solutions for Recommended Applications [J]. Computer Science, 2021, 48(9): 21-35.
[5] HAO Zhi-feng, LIAO Xiang-cai, WEN Wen, CAI Rui-chu. Collaborative Filtering Recommendation Algorithm Based on Multi-context Information [J]. Computer Science, 2021, 48(3): 168-173.
[6] REN Shuai, WANG Meng, FAN Ao-xiong, GAO Ze, XU Jie, Shahzad KHURRAM, ZHANG Tao. Zero-high-resolution Information Hiding Algorithm for 3D Mesh Model [J]. Computer Science, 2020, 47(7): 328-334.
[7] PENG Wei, HU Ning and HU Jing-Jing. Overview of Research on Image Steganalysis Algorithms [J]. Computer Science, 2020, 47(6A): 325-331.
[8] BAN Duo-han, LV Xin, WANG Xin-yuan. Efficient Image Encryption Algorithm Based on 1D Chaotic Map [J]. Computer Science, 2020, 47(4): 278-284.
[9] YU Feng,GONG Xin-hui,WANG Shi-hong. Cryptanalysis of Medical Image Encryption Algorithm Using High-speed Scrambling and Pixel Adaptive Diffusion [J]. Computer Science, 2020, 47(2): 276-280.
[10] TIAN Jun-feng, PENG Jing-jing, ZUO Xian-yu, GE Qiang, FAN Ming-hu. Image Encryption Algorithm Based on Cyclic Shift and Multiple Chaotic Maps [J]. Computer Science, 2020, 47(10): 327-331.
[11] ZHANG Jian-an. Users’ Sensitive Information Hiding Method in Hierarchical Heterogeneous Network Based on Mobile Switching Authentication [J]. Computer Science, 2019, 46(3): 217-220.
[12] WANG Li-juan, LI Guo-dong, LV Dong-mei. Chaotic System Image Encryption Algorithm Based on Dynamic Parameter Control [J]. Computer Science, 2019, 46(11A): 469-472.
[13] HAN Xue-juan, LI Guo-dong, WANG Si-xiu. Cryptographic Algorithm Based on Combination of Logistic and Hyperchaos [J]. Computer Science, 2019, 46(11A): 477-482.
[14] ZHAO Fang-zheng, LI Cheng-hai, LIU Chen, SONG Ya-fei. Security Analysis and Optimization of Hyper-chaotic Color Image Encryption Algorithm [J]. Computer Science, 2019, 46(11A): 483-487.
[15] ZHU Shu-qin, WANG Wen-hong and LI Jun-qing. Chosen Plaintext Attack on Chaotic Image Encryption Algorithm Based on Perceptron Model [J]. Computer Science, 2018, 45(4): 178-181.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!