期刊文献+

一种基于混合反馈的混沌图像加密算法 被引量:10

New chaotic image encryption algorithm based on hybrid feedback
下载PDF
导出
摘要 针对现有基于混沌分组密码的图像加密算法中,扩散函数扩散速度慢、需要多轮迭代才能抵抗差分攻击的缺点,提出了一种新的基于密文和输出混合反馈的混沌图像加密算法。该算法利用密文扰动混沌系统的初始值,既改善了数字混沌的退化,又能使扩散函数具有非常快的扩散速度。经过实验验证,该算法只需正反两轮迭代,就能达到较高的安全性和较快的加解密速度。 Aiming at the defects of diffusion function with lower diffusing speed and needing multiple round iteration to resist differential attack in the image encryption algorithm based on chaotic block cipher, a new chaotic image encryption algorithm based on output-cryptograph mixed feedback was proposed. It can improve the degradation of digital chaotic and diffusing speed of diffusion function through perturbating initial value of chaotic system with ciphertext. Experimental results show that the iterative algorithm only requires a positive iteration and an inverse iteration to achieve higher levels of security and faster encryption speed,
出处 《计算机应用》 CSCD 北大核心 2008年第2期434-436,共3页 journal of Computer Applications
关键词 图像加密 混合反馈 混沌分组密码 image encryption hybrid feedback chaotic block cipher
  • 相关文献

参考文献6

  • 1FRIDRICH J.Symmetric ciphers based on two-dimensional chaotic maps[J].Int.J.Bifurcation and Chaos,1998,8(6):1259-1284.
  • 2廉士国,王执铨.Standard映射及其三维扩展在多媒体加密中的应用[J].东南大学学报(自然科学版),2003,33(z1):90-94. 被引量:5
  • 3MAO Y,CHEN G,CHUI C K.A symmetric image encryption scheme based on 3D chaotic Cat maps[J].Chaos,Solitons Fractals,2004,21(1):749-761.
  • 4PAPADIMITRIOU S,BOUNTIS T,MAVROUDI S,et al.A Probabilistic symmetric encryption scheme for very fast secure communication based on chaotic systems of difference equations[J].International Journal on Bifurcation & Chaos,2001,11(12):3107-3115.
  • 5XIAO D,LIAO X,DENG S.One-way hash function construction based on the chaotic map with changeable-parameter[J].Chaos,Solitons and Fractals,2005(24):65-71.
  • 6LI S,CHEN G,MOU X.On the dynamical degradation of digital piecewise linear chaotic maps[J].International Journal of Bifurcation and Chaos,2005,15(10):3119-3151.

二级参考文献10

  • 1[1]Wu C W, Rul'kov N F. Studying chaos via 1-D maps - a tutorial [J]. IEEE Trans on Circuits and SystemsI: Fundamental Theory and Applications, 1993, 40(10):707-721.
  • 2[2]Habutsu T, Nishio Y, Sasase I, et al. A secret key cryp-tosystem by iterating chaotic map [J]. Lect Notes Comput Sci, 1991, 547:127-140.
  • 3[3]Tsueike M, Ueta T, Nishio Y. An application of two-dimensional chaos cryptosystem [R]. Tech Rep of IEICE, NLP96-19, May 1996. (in Japanese)
  • 4[4]Naoki Masuda, Kazuyuki Aihara. Cryptosystems with discretized chaotic maps [J]. IEEE Trans on Circuits and SystemsI: Fundamental Theory and Applications, 2002, 49(1):28-40.
  • 5[5]Scharinger J. Kolmogorov systems: internal time, irreversibity and cryptographic applications [A]. In: Dubois D, ed. Proceedings of the AIP Conference on Computing Anticipatory Systems [C].In: Woodbury, NY: Amer Inst of Phys, 1998. 437.
  • 6[6]Pichler F, Scharinger J. Finite dimensional generalized Baker dynamical systems for cryptographic applications [J]. Lect Notes in Comput Sci, 1996, 1030: 465-476.
  • 7[7]Pichler F, Scharinger J. Efficient image encryption based on chaotic maps [M]. Johannes Kepler University, Linz, Austria, preprint, 1996.
  • 8[8]Fridrich J. Symmetric ciphers based on two-dimensional chaotic maps [J]. Int J Bifurcation and Chaos, 1998,8(6):1259-1284.
  • 9[9]Jackson E A. Perspectives in nonlinear dynamics [M]. Cambridge:Cambridge University Press, 1991.
  • 10[10]Shannon C. Communication theory of secrecy systems [J]. Bell System Technical Journal, 1949, 28: 656-715.

共引文献4

同被引文献112

引证文献10

二级引证文献56

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部