A High-Security Privacy Image Encryption Algorithm Based on Chaos and Double Encryption Strategy

Faces are widely used in information recognition and other fields. Due to the openness of the Internet, ensuring that face information is not stolen by criminals is a hot issue. The traditional encryption method only encrypts the whole area of the image and ignores some features of the face. This pa...

Full description

Saved in:
Bibliographic Details
Main Authors: Zhiqiang Cheng, Wencheng Wang, Yuezhang Dai, Lun Li
Format: Article
Language:English
Published: Wiley 2022-01-01
Series:Journal of Applied Mathematics
Online Access:http://dx.doi.org/10.1155/2022/9040702
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1850105705558704128
author Zhiqiang Cheng
Wencheng Wang
Yuezhang Dai
Lun Li
author_facet Zhiqiang Cheng
Wencheng Wang
Yuezhang Dai
Lun Li
author_sort Zhiqiang Cheng
collection DOAJ
description Faces are widely used in information recognition and other fields. Due to the openness of the Internet, ensuring that face information is not stolen by criminals is a hot issue. The traditional encryption method only encrypts the whole area of the image and ignores some features of the face. This paper proposes a double-encrypted face image encryption algorithm. The contour features of the face are extracted, followed by two rounds of encryption. The first round of encryption algorithm encrypts the identified face image, and the second round of encryption algorithm encrypts the entire image. The encryption algorithm used is scrambling and diffusion at the same time, and the keystream of the cryptosystem is generated by 2D SF-SIMM. The design structure of this cryptosystem increases security, and the attacker needs to crack two rounds of the algorithm to get the original face image.
format Article
id doaj-art-38d4febc0ec64d67be4648825b25e55d
institution OA Journals
issn 1687-0042
language English
publishDate 2022-01-01
publisher Wiley
record_format Article
series Journal of Applied Mathematics
spelling doaj-art-38d4febc0ec64d67be4648825b25e55d2025-08-20T02:38:59ZengWileyJournal of Applied Mathematics1687-00422022-01-01202210.1155/2022/9040702A High-Security Privacy Image Encryption Algorithm Based on Chaos and Double Encryption StrategyZhiqiang Cheng0Wencheng Wang1Yuezhang Dai2Lun Li3School of Physics and Electronic InformationSchool of Mechanics and AutomationSchool of Physics and Electronic InformationSchool of Mechanics and AutomationFaces are widely used in information recognition and other fields. Due to the openness of the Internet, ensuring that face information is not stolen by criminals is a hot issue. The traditional encryption method only encrypts the whole area of the image and ignores some features of the face. This paper proposes a double-encrypted face image encryption algorithm. The contour features of the face are extracted, followed by two rounds of encryption. The first round of encryption algorithm encrypts the identified face image, and the second round of encryption algorithm encrypts the entire image. The encryption algorithm used is scrambling and diffusion at the same time, and the keystream of the cryptosystem is generated by 2D SF-SIMM. The design structure of this cryptosystem increases security, and the attacker needs to crack two rounds of the algorithm to get the original face image.http://dx.doi.org/10.1155/2022/9040702
spellingShingle Zhiqiang Cheng
Wencheng Wang
Yuezhang Dai
Lun Li
A High-Security Privacy Image Encryption Algorithm Based on Chaos and Double Encryption Strategy
Journal of Applied Mathematics
title A High-Security Privacy Image Encryption Algorithm Based on Chaos and Double Encryption Strategy
title_full A High-Security Privacy Image Encryption Algorithm Based on Chaos and Double Encryption Strategy
title_fullStr A High-Security Privacy Image Encryption Algorithm Based on Chaos and Double Encryption Strategy
title_full_unstemmed A High-Security Privacy Image Encryption Algorithm Based on Chaos and Double Encryption Strategy
title_short A High-Security Privacy Image Encryption Algorithm Based on Chaos and Double Encryption Strategy
title_sort high security privacy image encryption algorithm based on chaos and double encryption strategy
url http://dx.doi.org/10.1155/2022/9040702
work_keys_str_mv AT zhiqiangcheng ahighsecurityprivacyimageencryptionalgorithmbasedonchaosanddoubleencryptionstrategy
AT wenchengwang ahighsecurityprivacyimageencryptionalgorithmbasedonchaosanddoubleencryptionstrategy
AT yuezhangdai ahighsecurityprivacyimageencryptionalgorithmbasedonchaosanddoubleencryptionstrategy
AT lunli ahighsecurityprivacyimageencryptionalgorithmbasedonchaosanddoubleencryptionstrategy
AT zhiqiangcheng highsecurityprivacyimageencryptionalgorithmbasedonchaosanddoubleencryptionstrategy
AT wenchengwang highsecurityprivacyimageencryptionalgorithmbasedonchaosanddoubleencryptionstrategy
AT yuezhangdai highsecurityprivacyimageencryptionalgorithmbasedonchaosanddoubleencryptionstrategy
AT lunli highsecurityprivacyimageencryptionalgorithmbasedonchaosanddoubleencryptionstrategy