期刊文献+

一种新的可逆二维混沌映射图像加密算法 被引量:4

Image encryption approach based on a new invertible two-dimensional map
原文传递
导出
摘要 提出了一种用于图像加密的可逆二维混沌映射,该映射由左映射和右映射两个子映射组成。通过对图像的拉伸和折叠处理,实现了图像的混沌加密。首先沿图像的对角线方向将正方形图分为上下两个部分并重新组合成一个平行四边形的图像;然后利用平行四边形图像的两列像素之间的像素数目差将某列中的像素插入到相邻下一列像素之间。经过这样的过程,原始图像拉伸成为一条直线。最后按照原始图像的大小将这条直线折叠成为一个新的图像。推导出了映射的数学表达式,设计了密钥产生的方法,分析了图像加密算法的安全性问题。仿真验证了该图像加密算法的有效性。 A new invertible two-dimensional map which can be used in image encryption is proposed. The map consists of the left map and the right map. It can encrypt images by processing image stretch-and-fold. Firstly a square image is divided in- to two parts by diagonal and a parallelogram is reformed. Utilizing the difference of the pixel numbers of two adjacent columns of the parallelogram image, each pixel in a column is inserted to the adjacent column. Then, the original image can be stretched to a line. Finally the line is fold over to a new square image which size is same as the original image. The algorithm of the map is formlated, a method of key generation is designed and the security of the proposed image encryption is analyzed. The simula- tion results show that the proposed encryption approach is valid.
作者 黄峰 冯勇
出处 《光学技术》 EI CAS CSCD 北大核心 2007年第6期823-826,共4页 Optical Technique
基金 国家自然科学基金资助项目(60474016)
关键词 信息光学 二维混沌映射 图像加密 混沌 information optics two-dimensional chaotic map image encryption chaos
  • 相关文献

参考文献15

  • 1Bruce Schneier. Applied Cryptography-Protocols, algorithms, and source code in C (Second edition)[M]. New York: John Wiley & Sons, Inc, 1996.
  • 2Chang C C, et al. A new encryption algorithm for image encrptosystem[J]. The Journal of System and Software, 2001, 58(7) : 83-91.
  • 3Shannon C E. Communication Theory of Secrecy Systems[J]. The Bell System Technical Journal, 1949, 28(4) : 656-715.
  • 4Matthews R. On the derivation of a "chaotic" encryption algorithm [J]. Cryptologia, 1989, ⅩⅢ(1) : 29-42.
  • 5Habutsu T, Nishio Y, Sasase I, et al. A secret key cryptosystem by iterating a chaotic map[A], in Advance in Cryptolngy-Euro- Crypt' 91, Lecture Notes in Computer Science[C]. Berlin: Spinger-Verlag, 1991.
  • 6Jui-Cheng Yen, Jiun-In Guo. A new chaotic key-based design for image encryption and decryption[J]. Proc of IEEE, 2000, 4:49-52.
  • 7Wheeler D D. Problems with with Chaotic Cryptosystems [ J ]. Cryptologia, 1991, Ⅻ(3): 243-250.
  • 8Li S, Mou X, Cai Y, et al. Problems with a probabilistie encryption scheme based on chaotic systems [J ]. Int J Bifure Chaco, 2003, 11:3063-3077.
  • 9Bourbakis N, Alexopoulos C. Picture data encryption using SCAN patterns[J]. Pattern Recognition, 1992, 25 (6): 567-581.
  • 10Manicearn S S, Bourbkis N G.. Image and video encryption using scan patterns[J]. Pattern Recognition, 2003, 37(4): 725-737.

二级参考文献12

  • 1KennethRCastleman 朱志刚.数字图像处理[M].北京:电子工业出版社,2002..
  • 2Fabien A P, Petitcolas R J, Anderson, et al. Information hiding -- a survey[J]. Proceedings of the IEEE, 1999,87(7): 1062-1078.
  • 3Goodman J W, Lawrence R W. Digital image formulation from electronically detected holograms[J]. Applied Physics Letter, 1967,11(3): 77-79.
  • 4Niu Xiamu, Sun Shenghe. Adaptive graylevel digital watermark[A]. Proceedings of ICSP2000[C]. Beijing: Publishing House of Electronics Industry, 2000.
  • 5Juan R, Hernandea, Martin Arnado, et al. DCT-domain watermarking techniques for still images: detector performance analysis and a new structure [J]. IEEE Transactions on Image Processing, 2000,9(1): 55-68.
  • 6Wolfgan R B, Podilchuk C I, Delp E J. Perceptual watermarks for digital images and video[J].Proceedings of the IEEE,1999,87(7):1108-1126.
  • 7Chche E, Marquet P, Depeursinge C. Spatial filtering for zero-order and twin-image elimination in digital off-axis holography[J]. Appl Opt, 2000,39(23): 4070-4075.
  • 8雒江涛,郭洪,付丙瑞,梁二军.利用傅里叶变换计算全息术实现计算机图像的全息变换[J].激光与光电子学进展,1999,36(S1):151-153. 被引量:5
  • 9李忠源,郭全成,任亚萍.图像中的信息隐含及水印技术[J].电子学报,2000,28(4):61-63. 被引量:21
  • 10丁玮,闫伟齐,齐东旭.基于置乱与融合的数字图象隐藏技术及其应用[J].中国图象图形学报(A辑),2000,5(8):644-649. 被引量:68

共引文献4

同被引文献33

  • 1HuaiXinCAO,ZongBenXU.Lipschitz Operators and the Solvability of Non-linear Operator Equations[J].Acta Mathematica Sinica,English Series,2004,20(3):499-506. 被引量:2
  • 2贾云锋,曹怀信.一类非线性算子的Fréchet导数及其应用[J].福州大学学报(自然科学版),2004,32(6):673-676. 被引量:2
  • 3陈永强,孙华宁.基于二维混沌映射的数字图像加密算法[J].武汉工业学院学报,2004,23(4):45-47. 被引量:9
  • 4C C Chang, M S Hwang, T S Chen. A new Encryption Algorithm for Image Encrptosystem[J ]. The Journal of System and Software, 2001, 58(7): 83-91.
  • 5N Bourbakis, C Alexopoulos. Picture data encryption using SCAN patterus[J]. Pattern Recognition, 1992, 25 (6): 567-581.
  • 6S S Maniccam, N G. Bourbkis. Image and Video Encryption Using Scan Patterns[J]. Pattern Recognition, 2003, 37(4):725-737.
  • 7E Ziedan, M Fouad, H Salem. Application of Data Encryption Standard to Bitmap and JPEG Images. The 20th National Radio Science Conference[M]. Cairo, Egypt, 2003.
  • 8C J Kuo. Novel Image Encryption Technique and its Application in Progressive Transmission[J]. J Flectron Imaging, 1993, 2(4): 345-351.
  • 9H K Chang, J L Liou. An Image Encryption Scheme based on Quadtree Compression Scheme. Proceedings of the International Computer Symposium[M]. Taiwan, 2001.
  • 10J Fridrich. Symmetric Ciphers Based on Two - dimensional Chaotic Maps[J]. Int J Bifurcation and Chaos, 1998, 8(6) : 1259-1284.

引证文献4

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部