scholarly journals A Novel Multiband Remote-Sensing Image Encryption Algorithm Based on Dual-Channel Key Transmission Model

2021 ◽  
Vol 2021 ◽  
pp. 1-27
Author(s):  
Zefei Liu ◽  
Jinqing Li ◽  
Xiaoqiang Di ◽  
Zhenlong Man ◽  
Yaohui Sheng

With the rapid development of remote sensing technology, satellite remote sensing images have been involved in many areas of people’s lives. Remote sensing images contain military secrets, land profiles, and other sensitive data, so it is urgent to encrypt remote sensing images. This paper proposes a dual-channel key transmission model. The plaintext related key is embedded into the ciphertext image through bit-level key hiding transmission strategy, which enhanced the ability of ciphertext image to resist known-plaintext attack and chosen plaintext attack. In addition, a multiband remote sensing image encryption algorithm based on Boolean cross-scrambling and semi-tensor product diffusion is designed. Firstly, the pixel positions of each band of the remote sensing image are disturbed. Then, the random sequence generated by the four-dimensional chaotic system is processed and deformed to obtain a Boolean matrix. Based on the generated Boolean matrix and certain rules, the cross-confusion between the bands is carried out. Finally, the semi-tensor product operation is used in the diffusion process. Simulation results and experimental analysis show that the proposed algorithm obtains a larger key space and has stronger antiattack ability than other remote sensing image encryption algorithms. It can meet the security transmission of multiband remote sensing image in open space.

2018 ◽  
Vol 8 (9) ◽  
pp. 1540 ◽  
Author(s):  
Xiaoqiang Zhang ◽  
Xuesong Wang

With the increasing use of multimedia in communications, the content security of remote-sensing images attracts much attention in both the academia and industry. The Advanced Encryption Standard (AES) is a famous symmetric cryptosystem. A symmetric remote-sensing image encryption algorithm using AES is presented. Firstly, to reduce the encryption times, the sender groups 16 pixel values together, and converts them into big integers; secondly, the sender encrypts big integers with AES and the chaotic system; finally, the encrypted image is obtained from encrypted big integers. Simulation data show that our algorithm exhibits both the high security and efficiency.


2020 ◽  
Vol 38 (3B) ◽  
pp. 98-103
Author(s):  
Atyaf S. Hamad ◽  
Alaa K. Farhan

This research presents a method of image encryption that has been designed based on the algorithm of complete shuffling, transformation of substitution box, and predicated image crypto-system. This proposed algorithm presents extra confusion in the first phase because of including an S-box based on using substitution by AES algorithm in encryption and its inverse in Decryption. In the second phase, shifting and rotation were used based on secrete key in each channel depending on the result from the chaotic map, 2D logistic map and the output was processed and used for the encryption algorithm. It is known from earlier studies that simple encryption of images based on the scheme of shuffling is insecure in the face of chosen cipher text attacks. Later, an extended algorithm has been projected. This algorithm performs well against chosen cipher text attacks. In addition, the proposed approach was analyzed for NPCR, UACI (Unified Average Changing Intensity), and Entropy analysis for determining its strength.


2019 ◽  
Vol 38 (3) ◽  
pp. 647-678 ◽  
Author(s):  
Ľuboš Ovseník ◽  
Ján Turán ◽  
Tomáš Huszaník ◽  
Jakub Oravec ◽  
Ondrej Kováč ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document