Netinfo Security ›› 2014, Vol. 14 ›› Issue (11): 18-25.doi: 10.3969/j.issn.1671-1122.2014.11.003

• Orginal Article • Previous Articles     Next Articles

Authentication and Image Spatial Encryption Based on Ergodic Matrix and Hybrid Key System

ZHOU Xiao-yi, DUAN Yu-cong, FENG Wen-long, LI Yi-hong()   

  1. College of Information Science & Technology, Hainan University, Haikou Hainan 570228, China
  • Received:2014-09-23 Online:2014-11-01 Published:2020-05-18

Abstract:

For human being, the basic means of the perceptions of the world and the image is consistent. Therefore, the relevant information may possibly related to personal privacy, commercial interests and military secrets, so the security of multimedia information becomes more and more important. Conventional encryption systems, such as RSA, DES, IDEA, SAFER and FEAL, are not suitable for image encryption. Because of its encryption speed is slow and can not effectively remove the correlation between adjacent pixels. The chaotic encryption systems which have been studied for over twenty years have good characteristics for image encryption, but most of the systems are based on a symmetric encryption. Symmetric encryption is faster than symmetric encryption, but the key management restricts its widespread applications. In order to remedy this defect, this paper proposes a hybrid-key mechanism. It’s not only can be used for image encryption, but also can be used in verification. Ergodic matrix in the encryption / decryption system is not only to generate a public key, but also is the key parameter of image confusion and diffusion. The experimental results show that compared with the existing chaotic encryption system, the proposed image encryption technology completely shuffles and change the pixel values of the original image. More than that, it has at least a huge space of 3.08 * 105898 keys, therefore it’s enough to resist the brute force attack. Compared with the existing chaotic cipher system, the experimental results in this paper are more optimistic: coded in the C language, confusion and diffusion stage of the execution time is quite stable (respectively is between 1.9 to 2 ms and 2 to 2.1 ms). Compared with the algorithms introduced by Yang and Ismail, the proposed algorithm, according to the performance evaluation the sensitivity analysis and statistical analysis, our proposed algorithm is more secure, and is suitable for network transmission.

Key words: hybrid, ergodic matrix, image encryption, confusion, diffusion

CLC Number: