Paper
26 May 2023 Research on network security detection based on image encryption algorithm
Zhiyuan Yao
Author Affiliations +
Proceedings Volume 12700, International Conference on Electronic Information Engineering and Data Processing (EIEDP 2023); 127002H (2023) https://doi.org/10.1117/12.2682683
Event: International Conference on Electronic Information Engineering and Data Processing (EIEDP 2023), 2023, Nanchang, China
Abstract
In order to solve the low security and low efficiency of image encryption algorithm, this paper proposes the design and analysis of a multi-chaos fast image encryption algorithm. The algorithm combines image scrambling with diffusion, introduces Logistic and Kent to generate control parameters, and designs multiple rounds of encryption strategy related to the ciphertext. Experimental results show that the proposed algorithm has sufficient critical position and strong critical sensitivity to effectively resist attack detection. The gray scale of encrypted pixels is evenly distributed, and the correlation between neighboring pixels is weak, which can resist statistical attacks. When the number of encryption environment is roughly equal to two, the pixel change ratio and average change degree of gray value reach the best value simultaneously, and the anti-differential cryptographic analysis ability is very strong. The current image encryption size is short and real-time, which can meet the needs of real-time encryption and decryption.
© (2023) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Zhiyuan Yao "Research on network security detection based on image encryption algorithm", Proc. SPIE 12700, International Conference on Electronic Information Engineering and Data Processing (EIEDP 2023), 127002H (26 May 2023); https://doi.org/10.1117/12.2682683
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Image encryption

Computer security

Information security

Detection and tracking algorithms

Design and modelling

Network security

Statistical analysis

RELATED CONTENT


Back to Top