entropy-logo

Journal Browser

Journal Browser

Image Encryption and Privacy Protection Based on Chaotic Systems—Second Edition

A special issue of Entropy (ISSN 1099-4300).

Deadline for manuscript submissions: 20 May 2024 | Viewed by 1875

Special Issue Editor


E-Mail Website
Guest Editor
School of Computer Science and Engineering, Central South University, Changsha 410083, China
Interests: chaos; chaotic system; image encryption; cryptography; complex system; image process; computer science; software engineering; electronic and communication engineering; complexity analysis; nonlinear dynamics
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

This is the second edition of the Special Issue titled “Image Encryption and Privacy Protection Based on Chaotic Systems".

The first Special Issue of this topic collected high-quality papers, both theoretical and experiment-related ones, written by experts in this area, and it attracted a lot of interest (including numerous downloads). That is why we have decided to proceed with creating a second edition focused on this research field.

Chaos is a universal physical phenomenon in nature and the engineering world, and it is also one of the core research contents of nonlinear science. The application fields of chaotic systems are everywhere, especially in the applications of secure communication, multimedia information encryption, and the privacy protection of sensitive information. Chaotic systems have unique application advantages. They can help to carry out chaotic system modeling and can be used in dynamic complexity analysis methods to verify the chaotic behavior of nonlinear systems. Additionally, using Shannon information theory, the complexity of such systems can be studied to explain and predict their dynamic characteristics. As such, the applications of new complex chaotic systems to design high-performance image encryption algorithms and privacy protection schemes have attracted extensive attention.

Research on chaotic system modeling, complexity analysis, and security application is growing steadily; nevertheless, this field requires further exploration and innovation. New statistical techniques based on Shannon information theory, the complexity of known techniques, and a better understanding of the meaning of entropy in complex systems are needed. It is necessary to combine new computer technology and artificial intelligence methods to explore new methods for the security application of chaotic systems. Papers which focus on solving these problems are welcome to contribute to this Special Issue.

This Special Issue aims to become a forum to introduce new and improved technologies of chaotic system modeling and complexity analysis. In particular, with the help of chaotic system models, combined with new computer technology and artificial intelligence methods, proposing new image encryption algorithms and privacy protection schemes falls within the scope of this Special Issue.

Prof. Dr. Congxu Zhu
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Entropy is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • chaos
  • chaotic system
  • complexity analysis
  • information theory
  • entropy analysis and calculation
  • image encryption algorithms
  • privacy protection schemes
  • complex network and artificial intelligence technology

Related Special Issue

Published Papers (2 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

23 pages, 36196 KiB  
Article
An n-Dimensional Chaotic Map with Application in Reversible Data Hiding for Medical Images
by Yuli Yang, Ruiyun Chang, Xiufang Feng, Peizhen Li, Yongle Chen and Hao Zhang
Entropy 2024, 26(3), 254; https://doi.org/10.3390/e26030254 - 13 Mar 2024
Viewed by 755
Abstract
The drawbacks of a one-dimensional chaotic map are its straightforward structure, abrupt intervals, and ease of signal prediction. Richer performance and a more complicated structure are required for multidimensional chaotic mapping. To address the shortcomings of current chaotic systems, an n-dimensional cosine-transform-based [...] Read more.
The drawbacks of a one-dimensional chaotic map are its straightforward structure, abrupt intervals, and ease of signal prediction. Richer performance and a more complicated structure are required for multidimensional chaotic mapping. To address the shortcomings of current chaotic systems, an n-dimensional cosine-transform-based chaotic system (nD-CTBCS) with a chaotic coupling model is suggested in this study. To create chaotic maps of any desired dimension, nD-CTBCS can take advantage of already-existing 1D chaotic maps as seed chaotic maps. Three two-dimensional chaotic maps are provided as examples to illustrate the impact. The findings of the evaluation and experiments demonstrate that the newly created chaotic maps function better, have broader chaotic intervals, and display hyperchaotic behavior. To further demonstrate the practicability of nD-CTBCS, a reversible data hiding scheme is proposed for the secure communication of medical images. The experimental results show that the proposed method has higher security than the existing methods. Full article
Show Figures

Figure 1

24 pages, 7314 KiB  
Article
A Hybrid Cryptosystem Incorporating a New Algorithm for Improved Entropy
by Víctor Manuel Silva-García, Rolando Flores-Carapia and Manuel Alejandro Cardona-López
Entropy 2024, 26(2), 154; https://doi.org/10.3390/e26020154 - 10 Feb 2024
Viewed by 828
Abstract
Today, safeguarding sensitive content through encryption is crucial. This work presents a hybrid cryptosystem for images that employs both asymmetric and symmetric encryption. The asymmetric component involves applying the Diffie–Hellman protocol and the ElGamal cryptosystem to securely transmit two constants. These constants are [...] Read more.
Today, safeguarding sensitive content through encryption is crucial. This work presents a hybrid cryptosystem for images that employs both asymmetric and symmetric encryption. The asymmetric component involves applying the Diffie–Hellman protocol and the ElGamal cryptosystem to securely transmit two constants. These constants are necessary for the symmetrical aspect to generate dynamic permutations, substitution boxes, and round keys. Following an encryption process with fourteen rounds, the encrypted images are processed by an algorithm proposed to enhance entropy, a critical metric for assessing encryption quality. It increases the frequencies of the basic colors to achieve a histogram closely resembling a uniform distribution, but it increases the image size by approximately 8%. This improves the entropy values achieved by the hybrid cryptosystem, bringing them remarkably close to the ideal value of 8.0. In specific instances, the entropy values were elevated from 7.99926 to 8.0. The proposed method exhibits resilience against various attacks, including differential, linear, brute force, and algebraic attacks, as evaluated through the entropy, correlation, goodness of fit, Discrete Fourier Transform (DFT), Number of Pixels Change Rate (NPCR), Unified Average Changing Intensity (UACI), Avalanche Criteria (AC), contrast, energy, and homogeneity. Further, encrypted images are subjected to noise attacks ranging from 20% to 50% noise, including additive, multiplicative, occlusion noise, as well as the newly introduced χ2 noise. The noise damage is quantified using the proposed Similarity Parameter (SP), and a 3 × 3 median filter is employed to enhance the visual quality. Full article
Show Figures

Figure 1

Back to TopTop