期刊文献+

基于混沌的数字信息置乱方法及应用 被引量:3

Chaotic-based digital information disorder and its application
下载PDF
导出
摘要 利用cat-混沌映射,对数字信息进行位置置乱;在此基础上,将混合光学双稳模型作为混沌源,以特定的初值作为秘钥,生成一组二进制混沌序列,与数字信息特定的二进制位进行异或运算,实现数字信息的加密。对加密信息进行逆运算,便能将信息还原。由于混沌序列对初值极为敏感,初值微小的改变都会产生完全不同的序列,从而保证了置乱过程的惟一性和不可破译性。可根据实际需要只对隐秘数据二进制的高位进行异或操作,在保证信息置乱效果的同时,提高算法的运行效率。该方法可直接应用于数字水印的生成、数据加密、解密及信息隐藏等。提出三种方案,对数字图像的置乱实验结果表明了算法的有效性。 In this paper. A cat chaotic mapping is used firstly to disorder the coordinate of the information. Based on this, using the arithematic of chaotic model, we obtain a chaotic binary sequence which will be performed exclusive or operation with certain binary bits of the digital information. Thereby we obtain the encrypted message. In order to restore the information, the disordered information should be performed inverse exclusive or operation and inverse cat mapping. For the chaotic random sequence is sensitive to the initial value, which guarantees the uniqueness and unbreakable of the disordering process. The technique which we put forward can be applied directly on digital watermark's making, data encryption techniques, information's hiding and so on. In the end we put forward three schemes, the experiment results regarding digital image prove the efficiency of the method.
作者 郑成勇
出处 《佛山科学技术学院学报(自然科学版)》 CAS 2006年第1期21-24,共4页 Journal of Foshan University(Natural Science Edition)
关键词 混沌序列 CAT映射 数字信息置乱 异或运算 数字水印 chaotic sequence cat mapping digital information disorder exclusive or operation digital watermark
  • 相关文献

参考文献5

二级参考文献21

  • 1孙枫,秦红磊,徐耀群,郝燕玲.基于混沌的分组密码置换网络的设计[J].中国工程科学,2000,2(9):47-49. 被引量:7
  • 2王亥,胡健栋.Logistic-MaP混沌扩频序列[J].电子学报,1997,25(1):19-23. 被引量:90
  • 3[1]J Jiang and A Armstrong. Data hiding approach for efficient image indexing[J]. Electronics letters-7th, 2002,38(23):1424-1425.
  • 4[2]F Hartung, M Kutter, Multimedia watermarking techniques [J]. Processing of the IEEE, 1999,87(7):1079-1107.
  • 5[3]D R Frey. Chaotic digital encoding: An approach to secure communication[J]. IEEE Trans on CAS-II, 1993,40(10):660-666.
  • 6[4]R Muzzini, G Setti, R Rovatti. Chaotic comples spreading sequences for asynchronous DS-CDMA-Part I: System modeling and results[J]. IEEE Trans on CAS-I, 1997,44(10):937-947.
  • 7[5]G Voyatzis, I Pitas. Chaotic mixing of digital images and applications to watermarking [J]. Proceedings of ECMAST'96, 1996,2:687-694.
  • 8[6]G Voyatzis, I Pitas. Digital image watermarking using mixing systems [J]. Computer & Graphics, 1998,22(4):405-416.
  • 9[7]Naoki Masud, Kazuyuki Aibara. Cryptosystems With Discretized Chaotic Maps [J]. IEEE Trans Circuit and Systems, 2002,49(1):28-40.
  • 10Horvatic P,Information Security for Global Information Infrastructures IFIP/SEC,2000年,181页

共引文献78

同被引文献18

引证文献3

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部