scispace - formally typeset
Search or ask a question
Author

Ruisong Ye

Bio: Ruisong Ye is an academic researcher from Shantou University. The author has contributed to research in topics: Encryption & Logical matrix. The author has an hindex of 1, co-authored 1 publications receiving 20 citations.

Papers
More filters
Journal ArticleDOI
Meng Ge1, Ruisong Ye1
TL;DR: The results of simulation and security analysis show that the proposed image encryption scheme is able to resist various attacks and has excellent encryption performance.

33 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: Simulation and analysis results proved that the proposed chaotic color/grayscale image encryption algorithm has a promising security performance and has a high ability to resist statistical and differential attacks.
Abstract: Image encryption has become the essential way to secure image information with the high frequency of multimedia information exchange on the Internet. In this paper, an effective chaotic color/grayscale image encryption algorithm is proposed. The algorithm uses a hybrid 2D composite chaotic map combined with a sine–cosine cross-chaotic map for the transformation required to scramble the image as a confusion phase. As for the diffusion phase, a 1D combined Logistic-Tent chaotic map is used to generate a chaotic self-diffusion matrix that is bitwise XORed with the scrambled image to produce the final cipher image. The proposed algorithm combines the merits of both 1D and 2D chaotic maps; it has a simple structure, easy implementation, and excellent chaotic features making its chaotic orbits more unpredictable for introducing more security. The simulation and analysis results proved that the algorithm has a promising security performance and has a high ability to resist statistical and differential attacks.

74 citations

Journal ArticleDOI
TL;DR: A five-dimensional discrete hyperchaotic map is constructed by combining Logistic map and 3D discrete Lorenz map based on a block-based image encryption scheme related to plaintext, which makes the algorithm resist chosen-plaintext attack.
Abstract: In this paper, a five-dimensional discrete hyperchaotic map is constructed by combining Logistic map and 3D discrete Lorenz map. Based on this chaotic system, a block-based image encryption scheme related to plaintext is designed. The encryption scheme includes scrambling operation and diffusion operation. In the scrambling operation, the scrambling sequence is related to the pixels of the plaintext image, while in the diffusion operation, two rounds of diffusion are carried out for intra-block diffusion, and the generation of random diffusion sequence is related to a pixel value in the block in each round of diffusion, which makes the algorithm resist chosen-plaintext attack. When the next block is diffused, the generation of the diffusion sequence is related to the first and last pixels of the previous block, which makes the block and block interact with each other and enhances the sensitivity of the algorithm to plaintext. Theoretical analysis and experimental results demonstrate the security and practicability of the cryptosystem.

53 citations

Journal ArticleDOI
TL;DR: The independent parameters of the 2D non-separable canonical transform enlarge the key-space of the proposed scheme and enhance robustness against brute-force attack.
Abstract: In this paper, a double image encryption scheme using 3D Lorenz chaotic system and QR decomposition in 2D non-separable linear canonical transform domain is proposed. Here the independent parameters of the 2D non-separable canonical transform enlarge the key-space of the proposed scheme and enhance robustness against brute-force attack. 3D Lorenz chaotic system is employed for creating a permutation keystream for pixel transaction process. The proposed scheme is non-linear and asymmetric in nature. To validate and verify the proposed cryptosystem, the numerical simulations have been performed on grayscale images. Results display that the proposed scheme has greater robustness to occlusion and special attacks.

34 citations

Journal ArticleDOI
TL;DR: In this article , a chaos-based image encryption method based on permutation and substitution using a single Substitution Box (S-Box) was proposed to address issues in contemporary image encryption algorithms.
Abstract: Privacy is a serious concern related to sharing videos or images among people over the Internet. As a method to preserve images’ privacy, chaos-based image encryption algorithms have been used widely to fulfil such a requirement. However, these algorithms suffer from a low key-space, significant computational overhead, and a lag in resistance against differential attacks. This paper presents a novel chaos-based image encryption method based on permutation and substitution using a single Substitution Box (S-Box) to address issues in contemporary image encryption algorithms. The proposed encryption technique’s efficiency is validated through extensive experiments as compared to the state-of-the-art encryption algorithms using different measures and benchmarks. Precisely, the collected results demonstrate that the proposed technique is more resilient against well-known statistical attacks and performs well under plaintext attacks. Indeed, the proposed scheme exhibits very high sensitivity concerning the plaintext attack. A minor change in the encryption key or the plain text would result in a completely different encrypted image.

23 citations

Journal ArticleDOI
TL;DR: The proposed encryption scheme is highly sensitive to minor differences in both secret key and plain image, resulting in resisting chosen/known plaintext attacks effectively, compared with existing approaches in digital image encryption.
Abstract: This study proposes a scale-invariant digital image encryption method that includes three main steps rows-columns diffusion, the 3D scale-invariant modular chaotic map, and Hill diffusion. Pixels substitution, and mixing adjacency pixels of the plain image are performed using rows-columns diffusion and Hill diffusion. The 3D scale-invariant chaotic maps are used to permutation image pixels without image size restriction. Modular arithmetic is used in the 3D scale-invariant chaotic maps and Hill diffusion to increase keyspace and enhance security parameters. With repeat at least two rounds of main steps, the proposed encryption scheme reaches to optimum parameter values and it is highly sensitive to minor differences in both secret key and plain image, resulting in resisting chosen/known plaintext attacks effectively. Experimental results show that the proposed scheme demonstrates excellent security capacity with high efficiency, compared with existing approaches in digital image encryption.

21 citations