Laser & Optoelectronics Progress, Volume. 62, Issue 4, 0437001(2025)
Encryption and Decryption of Image and Video Signals Using Expanded Chaotic Keys
Fig. 4. Three-level random codes after dual-threshold sampling and quantization. (a) Code diagram; (b) eye diagram
Fig. 5. Original keys of 0/1 bits and keys after error correction by reconciliation
Fig. 6. Mersenne twister algorithm for expanding chaotic keys and expanded chaotic keys@80 Gbit/s
Fig. 8. Bias function and autocorrelation function of expanded chaotic keys. (a) |e[N]|; (b) C[K]
Fig. 10. Number of passed NIST tests for expanded chaotic keys at different rates
Fig. 11. Security analysis of keys.(a) (b) Keys of legitimate user and eavesdropper before and after expansion; (c) cross correlation of expanded keys between legitimate user and eavesdropper
Fig. 12. Results of image encryption and decryption using expanded chaotic keys. (a) Original image; (b) encrypted image; (c)‒(f) decrypted images under different BERs, EBER=10-1, EBER=5×10-2, EBER=1×10-2, EBER=0
Fig. 13. Results of video encryption and decryption using expanded chaotic keys. (a) (d) (g) Original video; (b) (e) (h) encrypted video; (c) (f) (i) decrypted video
Get Citation
Copy Citation Text
Yihe Huang, Junli Wang, Longsheng Wang, Pengfa Chang, Anbang Wang. Encryption and Decryption of Image and Video Signals Using Expanded Chaotic Keys[J]. Laser & Optoelectronics Progress, 2025, 62(4): 0437001
Category: Digital Image Processing
Received: Jun. 3, 2024
Accepted: Jun. 17, 2024
Published Online: Feb. 12, 2025
The Author Email:
CSTR:32186.14.LOP241415