1673-159X

CN 51-1686/N

FANG Yuan, ZHANG Liang, SHEN Yuexin, et al. A Secure Encryption Method for Double Chaos Data in Power Networks Under Key Matrix Node Transformation[J]. Journal of Xihua University(Natural Science Edition), 2025, 44(4): 107 − 112. DOI: 10.12198/j.issn.1673-159X.5480
Citation: FANG Yuan, ZHANG Liang, SHEN Yuexin, et al. A Secure Encryption Method for Double Chaos Data in Power Networks Under Key Matrix Node Transformation[J]. Journal of Xihua University(Natural Science Edition), 2025, 44(4): 107 − 112. DOI: 10.12198/j.issn.1673-159X.5480

A Secure Encryption Method for Double Chaos Data in Power Networks Under Key Matrix Node Transformation

  • To ensure the security of power network data, a secure encryption method for power network dual chaotic data under key matrix node transformation is proposed. Power network data was compressed without loss. Logistic mapping method and Henono mapping method are employed to generate three chaotic power network data sequences. The sequence is the initial encryption matrix.The matrix nodes are transformed to obtain the data permutation matrix. This matrix is then multiplied with the initial encryption matrix, and fractional Fourier transform is applied to transform different horizontal directions, resulting in a complex matrix for power network data encryption. The amplitude spectrum of this matrix is calculated, and it is converted from the frequency domain to the spatial domain to complete the first power data encryption. This process is repeated to achieve the second encryption.The experimental results show that this method can achieve lossless compression of power network data and effectively encrypt image and character power network data, with good application effects.
  • loading

Catalog

    Turn off MathJax
    Article Contents

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return