Title: Image encryption for offshore wind power based on 2D-LCLM and Zhou Yi eight trigrams
Authors: Lei Kou; Jinbo Wu; Fangfang Zhang; Peng Ji; Wende Ke; Junhe Wan; Hailin Liu; Yang Li; Quande Yuan
Addresses: Institute of Oceanographic Instrumentation, Qilu University of Technology (Shandong Academy of Sciences), Qingdao, China ' School of Information and Automation Engineering, Qilu University of Technology (Shandong Academy of Sciences), Jinan, China ' School of Information and Automation Engineering, Qilu University of Technology (Shandong Academy of Sciences), Jinan, China ' School of Information and Automation Engineering, Qilu University of Technology (Shandong Academy of Sciences), Jinan, China ' Department of Mechanical and Energy Engineering, Southern University of Science and Technology, Shenzhen, China ' Institute of Oceanographic Instrumentation, Qilu University of Technology (Shandong Academy of Sciences), Qingdao, China ' Institute of Oceanographic Instrumentation, Qilu University of Technology (Shandong Academy of Sciences), Qingdao, China ' School of Electrical Engineering, Northeast Electric Power University, Jilin, China ' School of Computer Technology and Engineering, Changchun Institute of Technology, Changchun, China
Abstract: Offshore wind power is an important part of the new power system. Due to the complex and changing situation in the oceans, its normal operation and maintenance cannot be done without information such as images; therefore, it is especially important to transmit the correct image in the process of information transmission. In this paper, we propose a new encryption algorithm for offshore wind power based on two-dimensional lagged complex logistic mapping (2D-LCLM) and Zhou Yi eight trigrams. Firstly, the initial value of the 2D-LCLM is constructed by the Sha-256 to associate the 2D-LCLM with the plaintext. Secondly, a new encryption rule is proposed from the Zhou Yi Eight Trigrams to obfuscate the pixel values and generate the round key. Then, 2D-LCLM is combined with the Zigzag to form an S-box. Finally, the simulation experiment of the algorithm is accomplished. The experimental results demonstrate that the algorithm is resistant to common attacks and has prefect encryption performance.
Keywords: image encryption; complex chaotic system; 2D-LCLM; Zhou Yi eight trigrams; offshore wind power.
DOI: 10.1504/IJBIC.2023.133505
International Journal of Bio-Inspired Computation, 2023 Vol.22 No.1, pp.53 - 64
Received: 30 Sep 2022
Accepted: 10 Apr 2023
Published online: 18 Sep 2023 *