IDEAS home Printed from https://ideas.repec.org/a/hin/jnljam/9040702.html
   My bibliography  Save this article

A High-Security Privacy Image Encryption Algorithm Based on Chaos and Double Encryption Strategy

Author

Listed:
  • Zhiqiang Cheng
  • Wencheng Wang
  • Yuezhang Dai
  • Lun Li
  • Tudor Barbu

Abstract

Faces are widely used in information recognition and other fields. Due to the openness of the Internet, ensuring that face information is not stolen by criminals is a hot issue. The traditional encryption method only encrypts the whole area of the image and ignores some features of the face. This paper proposes a double-encrypted face image encryption algorithm. The contour features of the face are extracted, followed by two rounds of encryption. The first round of encryption algorithm encrypts the identified face image, and the second round of encryption algorithm encrypts the entire image. The encryption algorithm used is scrambling and diffusion at the same time, and the keystream of the cryptosystem is generated by 2D SF-SIMM. The design structure of this cryptosystem increases security, and the attacker needs to crack two rounds of the algorithm to get the original face image.

Suggested Citation

  • Zhiqiang Cheng & Wencheng Wang & Yuezhang Dai & Lun Li & Tudor Barbu, 2022. "A High-Security Privacy Image Encryption Algorithm Based on Chaos and Double Encryption Strategy," Journal of Applied Mathematics, Hindawi, vol. 2022, pages 1-14, July.
  • Handle: RePEc:hin:jnljam:9040702
    DOI: 10.1155/2022/9040702
    as

    Download full text from publisher

    File URL: http://downloads.hindawi.com/journals/jam/2022/9040702.pdf
    Download Restriction: no

    File URL: http://downloads.hindawi.com/journals/jam/2022/9040702.xml
    Download Restriction: no

    File URL: https://libkey.io/10.1155/2022/9040702?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:hin:jnljam:9040702. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Mohamed Abdelhakeem (email available below). General contact details of provider: https://www.hindawi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.