期刊文献+

基于三维混沌系统的图像加密算法 被引量:3

Image encryption method based on three-dimension chaotic system
下载PDF
导出
摘要 为了改进图像加密算法的安全性和效率,提出了一种基于三维混沌系统和位运算的数字图像加密算法,利用三维混沌序列的坐标分量分别产生置换序列和二值序列,在对待加密图像进行预处理的基础上,先应用混沌置换序列对预处理的结果图像进行基于灰度值位序列的置换操作,然后再应用产生的二值序列对结果图像的灰度值位序列进行位异或加密运算。实验结果表明,该算法具有良好的安全性和加密效果。 In order to extend the effect and security of image encryption algorithm.An image encryption algorithm is presented based on three-dimension chaotic system and bit-computation.The permutation sequences and binary sequences are generated using three-dimension chaotic system.Firstly,the image is pretreated using chaotic system and permutation transformation,then the pixel's gray value's bit sequences are permuted using the permutation sequences generated before,at last,the pixel's gray value's bit sequences are computed by using XOR operating and the binary sequences.Simulation results show that the algorithm has good efficiency and the effect and security of the encryption algorithm are well.
出处 《计算机工程与应用》 CSCD 北大核心 2007年第34期49-51,共3页 Computer Engineering and Applications
基金 国家自然科学基金(the National Natural Science Foundation of China under Grant No.60572133) 陕西省教育厅专项科研计划项目(No.06JK193) 计算机网络与信息安全教育部重点实验室开放课题资助项目。
关键词 图像加密 混沌系统 置换序列 位运算 image encryption chaotic system permutation sequence bit-computation
  • 相关文献

参考文献10

  • 1Matthews R A J.On the derivation of a chaotic encryption algorithm[J].Cryptologia, 1989,13 ( 1 ) : 29-42.
  • 2Habutsu T,Nishio Y,Sasase I,et al.A secret cryptosystem by iterating a chaotic map[C]//Advances in Cryptology EURCRYPT'91.Berlin : Springer-Verlag, 1991 : 127 - 140.
  • 3Athanasios Nikolaidis,Ioannis Pitas.Region based image watermarking[J].IEEE Transactions on Image Processing,2001,10(11 ): 1726- 1740.
  • 4Zhang Jia-shu,Tian Lei,Tai Heng-ming.A new watermarking method based on chaotic maps[C]//IEEE International Conference on Multimedia and Expo(ICME),Taipei,Taiwan,27-30 June,2004: 939-942.
  • 5Wang Ying,Zheng De-ling,Ju Lei,et al.The spatial encryption of digital images based on high-dimension chaotic system[C]//Proceedsings of the 2004 IEEE Conference on Cybernetics and Intelligent Systems,Singapore, 1-3 December, 2004 : 1172-1176.
  • 6张雪锋,范九伦,康宝生.一种抗剪切变换攻击的数字图像加密算法[J].系统仿真学报,2006,18(8):2260-2263. 被引量:19
  • 7高山青,张士杰,刘镔,罗向阳,刘粉林.一种基于四值混沌阵列的数字图像加密算法[J].中国图象图形学报,2006,11(2):244-250. 被引量:6
  • 8Zhang Han,Wang Xiu-feng.A new image encryption algorithm based on chaos system[C]//Proc IEEE Int Conf Robotics,Intelligent Systems and Signal Processing,Changsha,China,October 2003:778-782.
  • 9杨礼珍,陈克非.变换矩阵(mod n)的阶及两种推广Arnold变换矩阵[J].中国科学(E辑),2004,34(2):151-161. 被引量:14
  • 10Horowitz E,Sahni S,Mehta D.Fundamentals of data structures in C++[M]//Freeman W H.NY:[s.n.],1995.

二级参考文献22

  • 1刘镔,张永强,刘粉林.一种新的数字化混沌扰动方案[J].计算机科学,2005,32(4):71-74. 被引量:14
  • 2邹建成 铁小匀.数字图像的Arnold变换及其周期性[A]..中国计算机图形学学术会议论文集[C].杭州,2000..
  • 3Dedieu H,Ogorzalek M J.Indentifiability and identification of chaotic systems based on adaptive synchronization[J].IEEE Transactions on Cirruits and Systems-Ⅰ:1997,44(10):948 ~ 962.
  • 4李树均.数字化混沌密码的分析与设计[D].西安:西安交通大学,2003.
  • 5Li S J,Mou X,Cai Y.Pseudo-random bit generator based on couple chaotic systems and its application in stream-ciphers cryptography[A].In:Progress in Cryptology-INDOCRYPT 2001:Second International Conference on Cryptology[C],Chennai,India,2001,LNCS 2247:316 ~ 329.
  • 6Li S J,Mou X,Cai Y,et al.On the security of a chaotic encryption scheme:Problems with computerized chaos in finite computing precision[J].Computer Physics Communications,2003,153 (1):52 ~58.
  • 7Athanasios Nikolaidis,Ioannis Pitas.Region -Based Image Watermarking[J].IEEE Transactions on Image Processing (S1057-7149),2001,10(11):1726-1740.
  • 8Jiashu Zhang,Lei Tian,Heng-Ming Tai.A New Watermarking Method Based on Chaotic Maps[C]//IEEE International Conference on Multimedia and Expo.2004,939-942.
  • 9Jui-Cheng Yen,Jiun-In Guo.A new chaotic key-based design for image encryption and decryption[J].IEEE International Conference on Circuits and Systems (ISBN 0-7803-5482-6),2000(4):49-52.
  • 10N K Pareek,Vinod Patidar,K K Sud.Discrete chaotic cryptography using external key[J].Physics Letters A (S0375-9601).2003,309:75-82.

共引文献34

同被引文献17

引证文献3

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部