期刊文献+

一种改进的混沌序列产生方法 被引量:20

An Extended Generation of Chaotic Sequences
下载PDF
导出
摘要 介绍了一种混沌二值序列的产生方法,该方法以混沌动力学模型为基础,利用非线性的方法产生的混沌二值序列具有较好的随机性和初值敏感性,同时,还给出了该方法在图像加密中的应用。实验表明,该方法具有较好的效率和安全性。 This paper presents a method which can generate binary chaotic sequences nonlinearly based on chaos systems,the sequences are random and sensitive to the initial conditions,and we also give the use of this method in image encryption.Simulation results show that the algorithm has good efficiency and safety.
出处 《计算机工程与应用》 CSCD 北大核心 2006年第23期31-33,共3页 Computer Engineering and Applications
基金 国家自然科学基金资助项目(编号:60572133)
关键词 混沌序列 图像加密 非线性离散化 chaotic sequences,image encryption,nonlinear dispersion
  • 相关文献

参考文献8

  • 1R A J Matthews.On the derivation of a chaotic encryption algorithm[J].C ryptologia,1989 ;4:29~42
  • 2T Habutsu,Y Nishio,I Sasase et al.A secret cryptosystem by iterating a chaotic map[C].In:Advances in Cryptology EURCRYPT'91,Berlin:Springer-Verlag,1991:127~140
  • 3M E Bianco,G L Mayhew.US patent No.5[S].1994:365~588
  • 4Zhang Han,Wang Xiu Feng et al.A new image encryption algorithm based on chaos system[C].In:International Conference on Robotics,Intelligent Systems and Signal Processing,Changsha,China,2003:778~782
  • 5Andrew T Parker,Kevin M Short.Reconstructing the keystream from a chaotic encryption scheme[J].IEEE transactions on Circuits and Systems-I Fundamental Theory and Applications,2001 ;48(5)
  • 6纪震,李慧慧,肖薇薇,张基宏.基于混沌序列的数字水印信号研究[J].电子学报,2004,32(7):1131-1134. 被引量:31
  • 7胡汉平,刘双红,王祖喜,吴晓刚.一种混沌密钥流产生方法[J].计算机学报,2004,27(3):408-412. 被引量:36
  • 8黄润生.混沌理论及其应用[M].武汉大学出版社

二级参考文献21

  • 1[4]Fukumasa H., Kohno R., Imai H.. Design of pseudonoise sequences with good odd and even correlation properties for DS/CDMA. IEEE Journal of Selected Areas in Communications, 1994, 12(5) :828~836
  • 2[5]Kohda T., Tsuneda A.. Statistics of chaotic binary sequences. IEEE Tranactions on Information Theory, 1997, 43(1):105~112
  • 3[6]Kohda T., Tsuneda A.. Pseudonoise sequences by chaotic nonlinear maps and their correlation properties. IEICE Transactions on Communications,1993, E76-B(8):855~862
  • 4[7]Andreyev Y., Dmitriev A.S., Kuminov D., Starkov S.. Maps with stored information in multiple-access communications systems. In: Proceedings of the NDES'97,Communication, 1997, 185~190
  • 5[11]Hammons R.A., Kumar V.P.. On a recent 4-Phase sequence design for CDMA. IEICE Transactions on Communications, 1993, E76-B (8) :804~813
  • 6[13]Gonzalez J.A., Pino R.. Chaotic and stochastic functions. Physica A, 2000, 276: 425~432
  • 7[1]Lasota A., Mackey M.C.. Chaos, Fractals and Noise. New York: Springer-Verlag, 1994
  • 8[2]Matthews R. A. J.. On the derivation of a "chaotic" encryption algorithm. Cryptologia, 1989, 13: 29~42
  • 9[3]Mitchell D.E.. Nonlinear key generators. Cryptologia, 1990, 14: 350~354
  • 10I J Cox,J Kilian,T Shamoon.Secure spread spectrum watermarking for multimedia[J].IEEE Trans on Image Processing,1997,6(12):1673-1687.

共引文献62

同被引文献127

引证文献20

二级引证文献70

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部