期刊文献+

一种新的基于混沌序列的图像分块加密方法 被引量:2

A New Image Blocking Encryption Arithmetic Based on Chaotic Sequences
下载PDF
导出
摘要 给出一种新的图像置乱加密算法并进行实验验证.首先给定一对初始值和参数,以此作为密钥生成混沌序列及其主遍历矩阵,把一幅较大的图像分解为适当大小的图像子块,根据混沌序列的主遍历矩阵,对图像子块进行置乱;然后再选择另一对初始值和参数,生成一个新的混沌序列及其主遍历矩阵,以该主遍历矩阵对图像的每个子块进行置乱加密;最后,把加密后的图像隐藏到一幅适当的载体图像中. A new image encryption algorithm was presented.First,a given initial value and a parameter as password were used to generate a Chaos sequences and its ergodic matrix,and the original image was divided into small blocks of suitable size which were scrambled by the ergodic matrix.Then another given initial value and parameter were used to scramble each of the blocks in the same way.Then the encrypted image was embedded in a suitable image.Experiment results showed that the algorithm was effective and useful.
出处 《集美大学学报(自然科学版)》 CAS 2007年第4期345-350,共6页 Journal of Jimei University:Natural Science
基金 福建省自然科学基金资助项目(2006J0408) 福建省教育厅科研基金资助项目(JA00423)
关键词 图像加密 混沌序列 遍历矩阵 置乱变换 image encryption Chaos sequences ergodic matrix scrambling transformation
  • 相关文献

参考文献9

二级参考文献94

  • 1WANG XingyuanSchool of Electronic and Information Engineering, Dalian University of Technology, Dalian 116024, China.Relation of chaos activity characteristics of the cardiac system with the evolution of species[J].Chinese Science Bulletin,2002,47(24):2042-2048. 被引量:21
  • 2李海泉.计算机软件安全技术综述(上)[J].计算机世界月刊,1995(10):26-40. 被引量:2
  • 3苏中民,林行良.图视秘密的任意分存[J].计算机学报,1996,19(4):293-299. 被引量:26
  • 4李宇寰.组合数学[M].北京:北京师范学院出版社,1998..
  • 5Honsinger C.W., Jones P., Rabbani M., Stoffel J.C.. Lossless recovery of an original image containing embedded data. U.S. Patent No. 6,278,791, 2001
  • 6Fridrich J., Goljan M., Du R.. Lossless data embedding for all image formats. In: Proceedings of the SPIE Photonics West, Vol.4675, Electronic Imaging 2002, Security and Watermarking of Multimedia Contents IV, San Jose, California, 2002, 572~583
  • 7Tian J.. Wavelet-based reversible watermarking for authentication. In: Proceedings of the SPIE Photonics West, Vol.4675, Electronic Imaging 2002, Security and Watermarking of Multimedia Contents IV, San Jose, California, 2002, 679~690
  • 8Holliman M., Memon N.. Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes. IEEE Transactions on Image Processing, 2000, 9(3): 432~441
  • 9Fridrich J., Goljan M., Memon N.. Cryptanalysis of the Yeung-Mintzer fragile watermarking technique. Journal of Electronic Imaging, 2002, 11(2): 262~274
  • 10Wu J., Zhu B., Li S., Lin F.. Efficient oracle attacks on Yeung-Mintzer and variant authentication schemes. In: Proceedings of the IEEE International Conference on Multimedia & Expo (ICME'04), Taiwan, 2004

共引文献575

同被引文献11

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部