Journal of Guangxi Normal University(Natural Science Edition) ›› 2019, Vol. 37 ›› Issue (3): 60-70.doi: 10.16088/j.issn.1001-6600.2019.03.007

Previous Articles     Next Articles

Applications of Image Parallel Encryption Algorithm in Handheld Devices

ZHOU Ronglong,LUO Yuling*,BI Jinjie,CEN Mingcan,QIU Senhui,LIAO Zhixian   

  1. College of Electronic Engineering, Guangxi Normal University, Guilin Guangxi 541004,China
  • Online:2019-07-12 Published:2019-07-12

Abstract: This paper proposes a new image parallel encryption algorithm aiming at the defects of some traditional image serial encryption algorithms, such as low security and long encryption time. First, the initial information of the plain image is set as an input signal of a parallel quantization scheme to generate a quantized decimal. Then the chaotic scrambling and diffusion matrix based on the chaotic system is designed, and the image data is encrypted in parallel by the confusion and diffusion structure. The algorithm is verified and implemented on the GPU of the iOS handheld device through the Metal parallel framework. The test results show that the scheme can effectively improves the image encryption efficiency, and has a high degree of sensitivity to the plaintext, which is suitable for the secure real-time communication of image data, and provides a new scheme for parallel processing of image data through the GPU.

Key words: image information security, iOS handheld devices, GPU, security

CLC Number: 

  • TP183
[1] CHEN Junxin,ZHU Ziliang,FU Chong,et al.An efficient image encryption scheme using lookup table-based confusion and diffusion[J].Nonlinear Dynamics,2015,81(3):1151-1166.DOI:10.1007/s11071-015-2057-6.
[2] WANG Xingyuan,ZHANG Huili.A color image encryption with heterogeneous bit-permutation and correlated chaos[J]. Optics Communications,2015,342:51-60.DOI:10.1016/j.optcom.2014.12.043.
[3] BLAKLEY G R,BOROSH I.Rivest-Shamir-Adleman public key cryptosystems do not always conceal messages[J]. Computers and Mathematics with Applications,1979,5(3):169-178.DOI:10.1016/0898-1221(79)90039-7.
[4] YE Guodong,HUANG Xiaoling,ZHANG L Y,et al.A self-cited pixel summation based image encryption algorithm[J]. Chinese Physics B,2017,26(1):010501.DOI:10.1088/1674-1056/26/1/010501.
[5] HUANG R,RHEE K H,UCHIDA S.A parallel image encryption method based on compressive sensing[J].Multimedia Tools and Applications,2014,72(1):71-93.DOI:10.1007/s11042-012-1337-0.
[6] ENAYATIFAR R,ABDULLAH A H,ISNIN I F.Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence[J].Optics and Lasers in Engineering,2014,56:83-93.DOI:10.1016/j.optlaseng.2013.12.003.
[7] WANG Xingyuan,LIU Chuanming,XU Dahai,et al.Image encryption scheme using chaos and simulated annealing algorithm[J].Nonlinear Dynamics,2016,84(3):1417-1429.DOI:10.1007/s11071-015-2579-y.
[8] XIE K,WU P,YANG S.GPU and CPU cooperation parallel visualisation for large seismic data[J].Electronics Letters, 2010,46(17):1196-1197.DOI:10.1049/el.2010.1242.
[9] LEE J,YI F,SAIFULLAH R,et al.Graphics processing unit-accelerated double random phase encoding for fast image encryption[J].Optical Engineering,2014,53(11):112308.DOI:10.1117/1.OE.53.11.112308.
[10]LUO Yuling,ZHOU Ronglong,LIU Junxiu,et al.An efficient and self-adapting colour-image encryption algorithm based on chaos and interactions among multiple layers[J].Multimedia Tools and Applications,2018,77(20):26191-26217.DOI: 10.1007/s11042-018-5844-5.
[11]LUO Yuling,ZHOU Ronglong,LIU Junxiu,et al.A novel image encryption scheme based on Kepler’s third law and random Hadamard transform[J].Chinese Physics B,2017,26(12):120504.DOI:10.1088/1674-1056/26/12/120504.
[12]SAIKUMAR N,KRISHNAN R B,MEGANATHAN S,et al.An encryption approach for security enhancement in images using key based partitioning technique[C]//2016 International Conference on Circuit,Power and Computing Technologies.Piscataway,NJ:IEEE Press,2016:1-4.DOI:10.1109/ICCPCT.2016.7530327.
[13]ZHOU Guomin,ZHANG Daxing,LIU Yanjian,et al.A novel image encryption algorithm based on chaos and Line map[J].Neurocomputing,2015,169:150-157.DOI:10.1016/j.neucom.2014.11.095.
[14]WANG Xingyuan,WANG Qian.A fast image encryption algorithm based on only blocks in cipher text[J].Chinese Physics B,2014,23(3):030503.DOI:10.1088/1674-1056/23/3/030503.
[15]WANG Xingyuan,ZHAO Jianfeng,LIU Hongjun.A new image encryption algorithm based on chaos[J].Optics Communications,2012,285(5):562-566.DOI:10.1016/j.optcom.2011.10.098.
[16]WU Jiahui,LIAO Xiaofeng,YANG Bo.Color image encryption based on chaotic systems and elliptic curve ElGamal scheme[J].Signal Processing,2017,141:109-124.DOI:10.1016/j.sigpro.2017.04.006.
[1] XIU Guilin, ZHANG Bowei, LIU Fan, LUO Ao. Server Trusted Framework Based on Trusted CPU Chip [J]. Journal of Guangxi Normal University(Natural Science Edition), 2020, 38(2): 43-50.
[2] YU Chunqiang , FU Rui , CHEN Yan , LEI Yun , ZHANG Xianquan , WANG Xiaoyun. Protecting Method of Regions of Interest of ImageBased on Information Hiding [J]. Journal of Guangxi Normal University(Natural Science Edition), 2016, 34(2): 67-73.
[3] SHEN Li-na, JIANG Zhong-cheng, YIN Hui, QIN Xing-ming, LUO Wei-qun. Karst Ecological Environmental System Security Assessment of Guohua Rocky Desertification Area [J]. Journal of Guangxi Normal University(Natural Science Edition), 2014, 32(3): 141-149.
[4] QIN Zhang-rong, ZHANG Chao-ying, QIU Bin, LI Yuan-yuan, MO Liu-liu. Implementation of the Acceleration Simulation with Lattice Boltzmann Method Based on CUDA [J]. Journal of Guangxi Normal University(Natural Science Edition), 2012, 30(4): 18-24.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] MENG Chunmei, LU Shiyin, LIANG Yonghong, MO Xiaomin, LI Weidong, HUANG Yuanjie, CHENG Xiaojing, SU Zhiheng, ZHENG Hua. Electron Microscopy Study on the Apoptosis and Autophagy of the Hepatic Stellate Cells Induced by Total Alkaloids[J]. Journal of Guangxi Normal University(Natural Science Edition), 2018, 36(3): 76 -79 .
[2] BAO Jinping, ZHENG Lianbin, YU Keli, SONG Xue, TIAN Jinyuan, DONG Wenjing. Skinfold Thickness Characteristics of Yi Adults in Daliangshan,China[J]. Journal of Guangxi Normal University(Natural Science Edition), 2018, 36(3): 107 -112 .
[3] LIN Yongsheng, PEI Jianguo, ZOU Shengzhang, DU Yuchao, LU Li. Red Bed Karst and Its Hydrochemical Characteristics of Groundwater in the Downstream of Qingjiang River, China[J]. Journal of Guangxi Normal University(Natural Science Edition), 2018, 36(3): 113 -120 .
[4] ZHANG Ru, ZHANG Bei, REN Hongrui. Spatio-temporal Dynamics Analysis and Its Affecting Factors of Cropland Loss in Xuangang Mining Area, Shanxi, China[J]. Journal of Guangxi Normal University(Natural Science Edition), 2018, 36(3): 121 -132 .
[5] LI Xianjiang, SHI Shuqin, CAI Weimin, CAO Yuqing. Simulation of Land Use Change in Tianjin Binhai New Area Based on CA-Markov Model[J]. Journal of Guangxi Normal University(Natural Science Edition), 2018, 36(3): 133 -143 .
[6] WANG Mengfei, HUANG Song. Spatial Linkage of Tourism Economy of Cities in West River Economic Belt in Guangxi, China[J]. Journal of Guangxi Normal University(Natural Science Edition), 2018, 36(3): 144 -150 .
[7] LIU Guolun, SONG Shuxiang, CEN Mingcan, LI Guiqin, XIE Lina. Design of Bandwidth Tunable Band-Stop Filter[J]. Journal of Guangxi Normal University(Natural Science Edition), 2018, 36(3): 1 -8 .
[8] TENG Zhijun, LÜ Jinling, GUO Liwen, XU Yuanyuan. Coverage Strategy of Wireless Sensor Network Based on Improved Particle Swarm Optimization Algorithm[J]. Journal of Guangxi Normal University(Natural Science Edition), 2018, 36(3): 9 -16 .
[9] LIU Ming, ZHANG Shuangquan, HE Yude. Classification Study of Differential Telecom Users Based on SOM Neural Network[J]. Journal of Guangxi Normal University(Natural Science Edition), 2018, 36(3): 17 -24 .
[10] HUANG Kaijiao, XIAO Feiyan. A Stochastic Predator-prey System with Beddington-DeAngelis Functional Response[J]. Journal of Guangxi Normal University(Natural Science Edition), 2018, 36(3): 32 -40 .