期刊文献+

均匀复合混沌序列图像加密算法

Uniform Composite Chaotic Sequence Image Cryptography Algorithm
下载PDF
导出
摘要 针对目前混沌加密方法系统易识别和序列在其值域内分布不均匀的缺陷,提出了一种先对图像进行二维猫映射置乱预处理,然后叠加均匀分布的复合混沌序列对图像进行加密的方法,并且分析了该方法的加密效果、抗统计攻击及系统识别攻击能力. In allusion to the bugs of some chaotic cryptography that the recognize is easy to recognize and the sequence's distributing is asymmetry,a new data cryptology is brought forward which uses the Arnold cat map pretreatment then XOR the uniform composite choatic sequence.The encrypted effect and the capability of resisting to the statistical attack and system recognition attack is analyzed.
作者 彭欢 尹洋
出处 《吉首大学学报(自然科学版)》 CAS 2006年第5期23-26,共4页 Journal of Jishou University(Natural Sciences Edition)
关键词 均匀复合混沌序列 图像加密 统计分析 uniform composite choatic-sequence image cryptography statistical analysis
  • 相关文献

参考文献6

  • 1[1]MAO Yao-bin,CHEN Guan-rong,LIAN Shi-guo.A Novel Fast Image Encryption Scheme Based on 3D Chaotic Baker Maps[J].Bifurcation and Chaos,2004,14:3 613-3 624.
  • 2[2]PO-HAN LEE,SOO-CHANG PEI,YIH-YUH CHEN.Generating Chaotic Stream Ciphers Using Chaotic Systems[J].Chinese Journal of Physics,2003,41(6):559-581.
  • 3[3]FETHI BELKHOUCHE,UVAIS QIDWAI.Binary Image Encoding Using 1D Chaotic Maps[J].IEEE Region 5,2003 Annual Technical.Conference,2003,11:39-43.
  • 4[4]MOHAMED I SOBHY,ALAA-ELDIN R SHEHATA.Methods of Attacking Chaotic Encryption and Countermeasures[J].2001 IEEE International Conference Acoustics,Speech,and Signal Processing,2001,2:1 001-1 004.
  • 5白薇,刁鸣,龚剑扬.混合混沌序列及其同步方案[J].应用科技,2003,30(7):18-20. 被引量:1
  • 6吴敏,丘水生.一种采用复合混沌信号的两级混沌加密方案[J].无线电通信技术,2003,29(4):13-16. 被引量:1

二级参考文献13

  • 1USHIO T. Chaotic synchronization and controlling chaos based on contraction mapping[ J ]. Phys Lett A,1995,198 : 14 - 22.
  • 2Kocarev L, Halle K S, Eckert K, et al. Experimental Demonstration of Secure Communication Via Chaotic Synchronization [J].Int J Bifur Chaos, 1992;2(3) :709 -713.
  • 3Parlitz D, Chua L O, Kocarev L, et al. Transmission of Digital Signals by Chaotic Synchronization [J] .Int J Bifur Chaos,1992;2(3) :973 - 977.
  • 4Short K M, Unmasking a Modulated Chaotic Communications Scheme [J] .Int J Bifur Chaos,1996;6(2) :367 - 375.
  • 5Yang T, Yang L B, Yang C M. Breaking Chaotic Secure Communication Using a Spectrogram [J] . Phys Lett A, 1998;247(5) :105 - 111.
  • 6Yang T, Wu C W, Chua L O.Cryptography based on Chaotic Systems [J] .IEEE Tram CAS I,1997;44(5):469 - 472.
  • 7Sobhy M I, Shehata A - E R. Methods of Attacking Chaotic Encryption and Countermeasures [ A ]. 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing [ C ],2001;2:1001 - 1004.
  • 8Matsumoto T, Chua L O, Kobayashi K. Hyperchaos: Laboratory Experiment and Numerical Confirmation [ J ]. IEEE Trans CAS I,1986;33(11) :1143 - 1147.
  • 9Tamasevicius A. Hyperchaotic circuits: State of the art [ C ]. In:Proc 5th Int Workshop Nonlinear Dynamics Electronic Systems(NDES'97), Moscow Russia, 1997:97 -102.
  • 10贾占峰,张琪,郑君里.异步码分多址通信中混沌扩频序列的研究[J].清华大学学报(自然科学版),1999,39(7):111-115. 被引量:17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部