期刊文献+

基于二维CA和CWQ方法的图像加密方案(英文) 被引量:1

A New Image Encryption Scheme Based on Two-Dimensional CA Joint With CWQ Method
下载PDF
导出
摘要 细胞自动机简称CA,是具有离散的空间和时间特性的动力系统.在过去的10多年里,细胞自动机在密码系统和信息安全方面的应用得到了人们相当大的关注和兴趣.本文给出了一种结合格图结构摩尔邻域的二维CA方法和基于四叉树结构的CWQ方法的图像加密方案.首先,二维CA的加密方法可以比仅进行混淆作用的CWQ方法更有效地提高系统的安全性.其次,CWQ方法可以加强具有雪崩效应和扩散性质的二维CA方法的混淆性质.方案具有大密钥量且简单易行适用于数字图像加密等特点. CA is the abbreviation of cellular automata which are dynamical systems with discrete space and time. Considerable interest has been shown over the past decade in the use of cellular automata in cryptography. The aim of this paper is to present a new scheme for image encryption, which combines two-dimensional CA approach we proposed in Moore neighborhood on the graph structure of square lattice and CWQ method based on quad-tree structure. First, the two-dimensional CA encryption approach can strengthen the system' s security more greatly than the confusion-only CWQ method. Second, CWQ method enhances the confusion property of the two-dimenslonal CA approach which satisfies avalanche effect and the property of diffusion. Moreover, an important feature of the proposed scheme is that it has very large number of security keys and simple operations which are especially useful for digital image encryption.
出处 《南京师大学报(自然科学版)》 CAS CSCD 北大核心 2008年第1期1-7,共7页 Journal of Nanjing Normal University(Natural Science Edition)
基金 the NNSF(10671095) China Postdoctoral Science Foundation(20070421028) Jiangsu Planned Projects for Post-doctoral Research Funds(0602023C) Science &Technology Innovation Fund of Nankai University (2006019) the Scientific Research Founda-tion of Guangdong Industry Technical College(2005 -11).
关键词 图像加密 细胞自动机 四叉树结构 图论 小波 image encryption, cellular automata, quad-tree structure, graph theory, wavelet
  • 相关文献

参考文献12

  • 1Yuan C, Zhu B B, Wang Y, et al. Efficient and fully scalable encryption for MPEG-4 FGS[ C]//Proc IEEE Int Symposium on Circuits and Systems, 2003 (2) :620-623.
  • 2Wee S J, Apostolopoulos J G. Secure scablable streaming enabling transcoding without decryption[ C]//Proc IEEE Int Conference on Image Processing, 2001 ( 1 ) :437-440.
  • 3Tosun A S, Feng W C. Lightweight security mechanisms for wireless video transmission[ C]//Proc IEEE Int Conference on Information Technology : Coding and Computing, 2001 : 157-161,
  • 4Wolfram S. Cryptography with cellular automata[ C ]//Advances in Cryptology-CRYPTO 85, Lecture Notes in Computer Science, 1985(218) :429--432.
  • 5Nandy S, Kar B K, Chaudhuri P. Theory and applications of cellular automata in cryptography[J]. IEEE Trans Comput, 1994,43:1 346-1 357.
  • 6Mihaljevic M. Security examination of certain cellular automata based key stream generator[ C]//ISITA 96 - 1996 IEEE Int Symp Inform Theory and Appl, 1996:246-249.
  • 7Chen R, Lu W, Lai J. Image encryption using progressive cellular automata substitution and SCAN[ C]// IEEE ISCAS, 2005(2) :1 690-1 693.
  • 8Chaudhuri P P, Chaudhuri D R, Nandi S, et al. Additive Cellular Automata: Theory and Applications [ M ]. New York: IEEE Press, 1997.
  • 9Sutner K. Additive automata on graphs[J]. Complex Systems, 1995,2(1) :1-25.
  • 10Shapiro J M. Embedded image coding using zerotrees of wavelet coding[ J]. IEEE Transactions on Signal Processing, 1993, 41 (12) :3 445-3 462.

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部