期刊文献+

基于可逆元胞自动机的图像加密算法 被引量:2

Image Encryption Based on Reversible Cellular Automata
下载PDF
导出
摘要 提出一种基于一维可逆元胞自动机(RCA)的新的图像加密算法,算法中可逆元胞自动机(RCA)规则和随机数据的应用使得图像具有更高安全性。可逆元胞自动机(RCA)加密算法将已知灰度图像变为二值图像.然后将其数据重新排列成一0-1序列,应用可逆元胞自动机(RCA)规则实现图像加密。灰度图像加密的仿真结果表明所提出的算法满足混合特性和扩散特性,一般的解密算法根本不可能对这种加密图像解密。 A new approach to image encryption was proposed based on one dimensional reversible cellular automata (RCA). The encryption method can encrypt images with higher security because RCA rules and randomness of the data were used in the process of encryption. When using RCA to encrypt, such application converted the given gray level image into binary image and rearranges the data as a sequence of 0-1 data. The use of RCA' s principles implemented image encryption. Simulation results for gray level images expatiated that the proposed encryption method satisfied the properties of confusion and diffusion. However, more perfect guess of encryption key made decryption impossible, this encryption method worked well as it's expectated.
出处 《辽宁工业大学学报(自然科学版)》 2008年第3期183-187,共5页 Journal of Liaoning University of Technology(Natural Science Edition)
关键词 元胞自动机(CA) 可逆元胞自动机(RCA) 图像加密 cellular automata (CA) reversible cellular automata (RCA) image encryption
  • 相关文献

参考文献14

  • 1[1]Chuang T,Lin J.A new multiresolution approach to still image encryption[J].Pattern Recognition Image Anal.1999,9(3):431-436.
  • 2[2]Scharinger J.Fast encryption of image data using chaotic Kolmogorov flows[J].Electronic Imaging,1998,17:318-325.
  • 3[3]Chuang T,Lin J.New approach to image encryption[J].Electronic Imaging,1998,4:350-356.
  • 4[4]He M Z,Cai L Z,Liu Q,etal.Multiple image encryption and watermarking by random phase matching[J].Optics Communications,2005,247:29-37.
  • 5[5]Lukac R,Plataniotis K N.A cost-effective encryption scheme for color images[J].Real-Time Imaging,2005,11:454-464.
  • 6[6]Ateniese G,Blundo C.Visual cryptography for general access structure[J].Information and Computation,1996,129 (2):86-106.
  • 7[7]Lukac R,Plataniotis K N.Image representation based secret sharing[J].Communications of the CCISA,2005,11(2):103-114.
  • 8[8]Lin C C,Tsai W H.Visual cryptography for gray-level images by dithering techniques[J].Pattern Recognition Letters,2003,24(1-3):349-358.
  • 9[9]Lukac R.,Plataniotis K N.Cost-effective encryption of natural image[J].Proceedings of 22nd Biennial Symposium on Communications,2004:89-91.
  • 10[10]Chang H,Liu J.A linear quadtree compression scheme for image encryption[J].Signal Process:Image Commune,1997,10(4):279-290.

同被引文献20

  • 1向辉,石教英.MPEG音频快速加密算法[J].系统仿真学报,2001,13(S2):263-266. 被引量:2
  • 2樊雷,茅耀斌,孙金生.一种结合猫映射与Logistic映射的语音加密算法[J].控制与决策,2004,19(10):1167-1170. 被引量:9
  • 3全笑梅,张鸿宾.基于小波包域听觉感知分析的统计音频水印算法[J].电子学报,2007,35(4):673-678. 被引量:11
  • 4Pecora L, Carroll T. Synchronization in chaotic systems. Physical review letters, 1990,64(8) :821-824.
  • 5Fridrich J. Symmetric ciphers based on two-dimensional chaotic maps. International Journal of Bifurcation and Chaos, 1998,8(6) : 1259-1284.
  • 6Wolfram S. Cryptography with cellular automata. In: Advances in Cryptology: Proceedings of CRYPTO' 85. Berlin: Springer, 1985.429-432.
  • 7Zhao X L, Li Q M, Xu M W. A Synmmetric cryptography based on extended cellular automata. In: Proceedings of the 2005 IEEE Systems, Man, & Cyberhetics Society, Hawaii, USA, 2005.499-503.
  • 8Puhua G. Cellular automaton public-key cryptosystem. Complex Systems, 1987,1(5) :51-57.
  • 9Mihaljevic M, Zheng Y, Imai H. A family of fast dedicated one-way hash functions based on hnear cellular automata over GF (q). IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sc/ences, 1999, 82 (1):40-47.
  • 10Wolfram S. A new kind of science. Champaign, IL: Wolfram Media, 2002.435-441.

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部