Laser & Optoelectronics Progress, Volume. 62, Issue 4, 0437001(2025)

Encryption and Decryption of Image and Video Signals Using Expanded Chaotic Keys

Yihe Huang1,2、*, Junli Wang1,2, Longsheng Wang1,2,3, Pengfa Chang1,2, and Anbang Wang4,5,6
Author Affiliations
  • 1Key Laboratory of Advanced Transducers and Intelligent Control System, Ministry of Education, Taiyuan University of Technology, Taiyuan 030024, Shanxi , China
  • 2College of Electronic Information and Optical Engineering, Taiyuan University of Technology, Taiyuan 030024, Shanxi , China
  • 3State Key Laboratory of Applied Optics, Changchun Institute of Optics, Fine Mechanics and Physics,Chinese Academy of Sciences, Changchun 130033, Jilin , China
  • 4Key Laboratory of Photonic Technology for Integrated Sensing and Communication, Ministry of Education, Guangdong University of Technology, Guangzhou 510006, Guangdong , China
  • 5Guangdong Provincial Key Laboratory of Photonics Information Technology, Guangdong University of Technology, Guangzhou 510006, Guangdong , China
  • 6Institute of Advanced Photonics Technology, School of Information Engineering, Guangdong University of Technology, Guangzhou 510006, Guangdong , China
  • show less
    Figures & Tables(13)
    Schematic diagram of the proposed scheme
    Experimental setup
    Experimental results of chaos synchronization
    Three-level random codes after dual-threshold sampling and quantization. (a) Code diagram; (b) eye diagram
    Original keys of 0/1 bits and keys after error correction by reconciliation
    Mersenne twister algorithm for expanding chaotic keys and expanded chaotic keys@80 Gbit/s
    Bitmap of expanded chaotic keys
    Bias function and autocorrelation function of expanded chaotic keys. (a) |e[N]|; (b) C[K]
    Results of NIST tests for expanded chaotic keys at 80 Gbit/s
    Number of passed NIST tests for expanded chaotic keys at different rates
    Security analysis of keys.(a) (b) Keys of legitimate user and eavesdropper before and after expansion; (c) cross correlation of expanded keys between legitimate user and eavesdropper
    Results of image encryption and decryption using expanded chaotic keys. (a) Original image; (b) encrypted image; (c)‒(f) decrypted images under different BERs, EBER=10-1, EBER=5×10-2, EBER=1×10-2, EBER=0
    Results of video encryption and decryption using expanded chaotic keys. (a) (d) (g) Original video; (b) (e) (h) encrypted video; (c) (f) (i) decrypted video
    Tools

    Get Citation

    Copy Citation Text

    Yihe Huang, Junli Wang, Longsheng Wang, Pengfa Chang, Anbang Wang. Encryption and Decryption of Image and Video Signals Using Expanded Chaotic Keys[J]. Laser & Optoelectronics Progress, 2025, 62(4): 0437001

    Download Citation

    EndNote(RIS)BibTexPlain Text
    Save article for my favorites
    Paper Information

    Category: Digital Image Processing

    Received: Jun. 3, 2024

    Accepted: Jun. 17, 2024

    Published Online: Feb. 12, 2025

    The Author Email:

    DOI:10.3788/LOP241415

    CSTR:32186.14.LOP241415

    Topics