Paper
20 September 2024 A secure encryption algorithm for substation inspection images based on chaotic map and DNA coding
Minrong Wu, Wenqi Duan, Longyu Yang
Author Affiliations +
Proceedings Volume 13269, Fourth International Conference on Advanced Algorithms and Signal Image Processing (AASIP 2024); 132690E (2024) https://doi.org/10.1117/12.3045491
Event: Fourth International Conference on Advanced Algorithms and Signal Image Processing (AASIP 2024), 2024, Kuala Lumpur, Malaysia
Abstract
Aiming at the problem of improving the security of inspection image in the case of limited computing resources in substation intelligent patrol, this paper proposes a secure encryption algorithm for substation inspection image based on chaotic mapping and DNA coding. The algorithm uses the hash value of the image as the original key, realizes the secure sharing of the original key, and expands the key space. The algorithm uses one-dimensional chaotic map to generate chaotic sequence, and uses chaotic sequence to block encryption of image. Then, on the basis of DNA coding, the algorithm performed DNA scrambling encryption and DNA diffusion encryption on the image in turn. Experimental results show that this algorithm can effectively resist exhaustive attack, brute force attack and statistical analysis attack, and can effectively improve the security of inspection image. It has a broad application prospect in the field of substation intelligent patrol.
(2024) Published by SPIE. Downloading of the abstract is permitted for personal use only.
Minrong Wu, Wenqi Duan, and Longyu Yang "A secure encryption algorithm for substation inspection images based on chaotic map and DNA coding", Proc. SPIE 13269, Fourth International Conference on Advanced Algorithms and Signal Image Processing (AASIP 2024), 132690E (20 September 2024); https://doi.org/10.1117/12.3045491
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Image encryption

Inspection

Diffusion

Matrices

Receivers

Binary data

Computer security

Back to Top