Journal of Guangxi Teachers Education University (Philosophy and Social Sciences Edition) ›› 2019, Vol. 37 ›› Issue (3): 60-70.doi: 10.16088/j.issn.1001-6600.2019.03.007

Previous Articles    

Applications of Image Parallel Encryption Algorithm in Handheld Devices

ZHOU Ronglong,LUO Yuling*,BI Jinjie,CEN Mingcan,QIU Senhui,LIAO Zhixian   

  1. College of Electronic Engineering, Guangxi Normal University, Guilin Guangxi 541004,China
  • Published:2019-07-12

Abstract: This paper proposes a new image parallel encryption algorithm aiming at the defects of some traditional image serial encryption algorithms, such as low security and long encryption time. First, the initial information of the plain image is set as an input signal of a parallel quantization scheme to generate a quantized decimal. Then the chaotic scrambling and diffusion matrix based on the chaotic system is designed, and the image data is encrypted in parallel by the confusion and diffusion structure. The algorithm is verified and implemented on the GPU of the iOS handheld device through the Metal parallel framework. The test results show that the scheme can effectively improves the image encryption efficiency, and has a high degree of sensitivity to the plaintext, which is suitable for the secure real-time communication of image data, and provides a new scheme for parallel processing of image data through the GPU.

Key words: image information security, iOS handheld devices, GPU, security

CLC Number: 

  • TP183
[1] CHEN Junxin,ZHU Ziliang,FU Chong,et al.An efficient image encryption scheme using lookup table-based confusion and diffusion[J].Nonlinear Dynamics,2015,81(3):1151-1166.DOI:10.1007/s11071-015-2057-6.
[2] WANG Xingyuan,ZHANG Huili.A color image encryption with heterogeneous bit-permutation and correlated chaos[J]. Optics Communications,2015,342:51-60.DOI:10.1016/j.optcom.2014.12.043.
[3] BLAKLEY G R,BOROSH I.Rivest-Shamir-Adleman public key cryptosystems do not always conceal messages[J]. Computers and Mathematics with Applications,1979,5(3):169-178.DOI:10.1016/0898-1221(79)90039-7.
[4] YE Guodong,HUANG Xiaoling,ZHANG L Y,et al.A self-cited pixel summation based image encryption algorithm[J]. Chinese Physics B,2017,26(1):010501.DOI:10.1088/1674-1056/26/1/010501.
[5] HUANG R,RHEE K H,UCHIDA S.A parallel image encryption method based on compressive sensing[J].Multimedia Tools and Applications,2014,72(1):71-93.DOI:10.1007/s11042-012-1337-0.
[6] ENAYATIFAR R,ABDULLAH A H,ISNIN I F.Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence[J].Optics and Lasers in Engineering,2014,56:83-93.DOI:10.1016/j.optlaseng.2013.12.003.
[7] WANG Xingyuan,LIU Chuanming,XU Dahai,et al.Image encryption scheme using chaos and simulated annealing algorithm[J].Nonlinear Dynamics,2016,84(3):1417-1429.DOI:10.1007/s11071-015-2579-y.
[8] XIE K,WU P,YANG S.GPU and CPU cooperation parallel visualisation for large seismic data[J].Electronics Letters, 2010,46(17):1196-1197.DOI:10.1049/el.2010.1242.
[9] LEE J,YI F,SAIFULLAH R,et al.Graphics processing unit-accelerated double random phase encoding for fast image encryption[J].Optical Engineering,2014,53(11):112308.DOI:10.1117/1.OE.53.11.112308.
[10]LUO Yuling,ZHOU Ronglong,LIU Junxiu,et al.An efficient and self-adapting colour-image encryption algorithm based on chaos and interactions among multiple layers[J].Multimedia Tools and Applications,2018,77(20):26191-26217.DOI: 10.1007/s11042-018-5844-5.
[11]LUO Yuling,ZHOU Ronglong,LIU Junxiu,et al.A novel image encryption scheme based on Kepler’s third law and random Hadamard transform[J].Chinese Physics B,2017,26(12):120504.DOI:10.1088/1674-1056/26/12/120504.
[12]SAIKUMAR N,KRISHNAN R B,MEGANATHAN S,et al.An encryption approach for security enhancement in images using key based partitioning technique[C]//2016 International Conference on Circuit,Power and Computing Technologies.Piscataway,NJ:IEEE Press,2016:1-4.DOI:10.1109/ICCPCT.2016.7530327.
[13]ZHOU Guomin,ZHANG Daxing,LIU Yanjian,et al.A novel image encryption algorithm based on chaos and Line map[J].Neurocomputing,2015,169:150-157.DOI:10.1016/j.neucom.2014.11.095.
[14]WANG Xingyuan,WANG Qian.A fast image encryption algorithm based on only blocks in cipher text[J].Chinese Physics B,2014,23(3):030503.DOI:10.1088/1674-1056/23/3/030503.
[15]WANG Xingyuan,ZHAO Jianfeng,LIU Hongjun.A new image encryption algorithm based on chaos[J].Optics Communications,2012,285(5):562-566.DOI:10.1016/j.optcom.2011.10.098.
[16]WU Jiahui,LIAO Xiaofeng,YANG Bo.Color image encryption based on chaotic systems and elliptic curve ElGamal scheme[J].Signal Processing,2017,141:109-124.DOI:10.1016/j.sigpro.2017.04.006.
[1] HUANG Hui-yun, PAN Jin-jing, ZHOU Yong-gen. Liu Shao-qi’s Social Security Thoughts and Practice during the Central Soviet Area Period [J]. Journal of Guangxi Teachers Education University (Philosophy and Social Sciences Edition), 2017, 53(3): 46-50.
[2] ZHANG Cai-sheng. A Study on Southeast Asia’s Maritime Thoroughfare Security Under the Background of 21st Century Maritime Silk Route [J]. Journal of Guangxi Teachers Education University (Philosophy and Social Sciences Edition), 2015, 51(6): 50-56.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!