期刊文献+

pi序列的似混沌特性及其在图像加密中的应用 被引量:1

Chaos-like characteristics of pi series and its application to image encryption
下载PDF
导出
摘要 提出一新的概念——pi序列,并利用非线性时间序列分析方法揭示pi序列的似混沌特性。然后提出一种基于pi序列的图像加密算法,对数字图像分别进行像素位置和像素值扰乱。最后图像加密算法的安全性分析结果表明此加密算法很强地抵抗统计攻击与差分攻击。 A new concept of pi series is proposed and its chaos-like characteristics have been found by the method of nonlinear time series.Then a new image encryption algorithm based on pi series is proposed to diffuse pixel positions and confuse pixel values.According to the security analysis,the image encryption algorithm demonstrates strong resistance towards exterior attacks such as statistical attacks and differential attacks.
作者 陈婷 李锋
出处 《计算机工程与应用》 CSCD 北大核心 2008年第12期98-100,共3页 Computer Engineering and Applications
基金 莙政中国大学生见习进修基金(CURE)
关键词 pi序列 似混沌特性 图像加密算法 安全性分析 pi series chaos-like characteristics image encryption algorithm security analysis
  • 相关文献

参考文献8

  • 1Bailey D H,Borwein J M,Borwein P B,et al.The quest for pi[R]. 1996.
  • 2Henry D I,Gilplin M E.Observed chaotic data[M].New York:Springer- Verlag, 1996.
  • 3Holger K,Thomas S.Nonlinear time series analysis[M].Cambridge: Cambridge University Press,2004.
  • 4Chen G R,Mao Y B,Chui C K.A symmetric image encryption scheme based on 3D chaotic cat maps[J].Chaos Solitons and Fractals,2004,21:749-761.
  • 5Zhang L H,Liao X F,Wang X B.An image encryption approach based on chaotic maps[J].Chaos Solitons and Fractals,2005,24: 759-765.
  • 6Belkhouche F,Qidwa U.Binary image encoding using 1D chaotic maps[C]//IEEE Region 5,2003 Annual Technical Conference,2003: 39-43.
  • 7Kim H S,Eykholt R,Salas D.Nonlinear dynamics,delay times and embedding windows[J].Physica D, 1999,127:48-69.
  • 8Wolf A,Swift J B,Swinney H L,et al.Detennining Lyapunov exponents from a time series[J].Physica D,1985,16:285-317.

同被引文献12

  • 1龚云帆,徐健学.混沌信号与噪声[J].信号处理,1997,13(2):112-118. 被引量:22
  • 2Kim H S,Eykholt R,Salas D.Nonlinear dynamics,delay times and embedding windows[J].Physica D, 1999,127:48-69.
  • 3Grassberger P,Procaccia I.Measuring the strangeness of strange attractor[J].Physica D, 1983,9 : 189-208.
  • 4Wolf A,Swift J B,Swinney H L,et al.Detecting Lyapunov exponents from a time series[J].Physica D, 1985,16:285-317.
  • 5Zhang L H,Liao X F,Wang X B.An image encryption approach based on chaotic maps[J].Chaos Solitons and Fractals,2005,24: 759-765.
  • 6Chen G R,Mao Y B,Chui C K.A symmetric image encryption scheme based on 3D chaotic maps[J].Chaos Solitons and Fractals, 2004,21:749-761.
  • 7Wang Yuan-zhi,Ren Guang-yong,Jiang Ju-lang.Image encryption method based on chaotic map[C]//2nd IEEE Conference on Industrial Electronics and Applications,2007:2558-2560.
  • 8Ren Hong-e,Shang Zhen-wei,Wang Yuan-zhi.A chaotic algorithm of image encryption based on dispersion sampling[C]//8th International Conference on Electronic Measurement and Instruments, 2007 : 836-839.
  • 9Zhang Yong-hong,Kang Bao-sheng,Zhang Xue-feng.Image encryption algorithm based on chaotic sequence[C]//16th International Conference on Artificial Reality and Telexistence Workshops, 2006 : 221-223.
  • 10Fan Jiu-lun,Zhang Xue-feng.Image encryption algorithm based on chaotic system[C]//7th International Conference on Computer- Aided Industrial Design and Conceptual Design,2006:1-6.

引证文献1

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部