1. Deep learning and chaotic system based image encryption algorithm for secondary user system.
- Author
-
Jin, Bingxue, Lei, Rongqing, and Liu, Lingfeng
- Abstract
This paper proposes an innovative image encryption algorithm designed for the secondary user system, aiming to break through the single privilege restriction of traditional encryption methods and significantly improve the protection of image data in highly sensitive fields such as military defence and medical health. By introducing hierarchical access control, the algorithm ensures that users with different privileges can only access image information within the authorized range, realizing refined and hierarchical security protection. Meanwhile, the innovative fusion of Tent map and Logistic map constructs a complex and unpredictable delayed perturbation model, which dramatically improves the complexity and randomness of chaotic behaviors and enhances the algorithm security. In addition, the algorithm is highly flexible and can effectively adapt to irregular image structures, ensuring that the encryption process is both efficient and secure. Experimental validation shows that the algorithm performs well in preventing unauthorized access and provides solid security for the storage and transmission of sensitive image information. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF