期刊文献+

一种带有随机扰动的混沌系统对彩图的加密方案 被引量:1

A New Color Image Encryption Scheme on Perturbing Chaotic Systems
下载PDF
导出
摘要 基于矩阵变换的图像加密方案,提出一种对混沌系统进行扰动的彩色图像加密新方法,并对该加密方案进行了统计分析,密钥空间和敏感性分析,序列随机性分析。实验结果表明加密图像像素值具有类随机均匀分布特性,算法具有强大的可抵抗攻击的密钥空间,安全性高。 According to the scheme of image encryption based on matrix transformation, we proposed a new color image encryption algorithm, which exert a perturbation on the chaotic system. Then we make statistical analysis, key space and key sensitivity analysis, sequence random analysis on the proposed algorithm. The results show that the distribution of pixel-values of the encrypted image has a random-like behavior. And the key space of the algorithm is large enough to resist strong attack, so we can say this scheme is of high security.
出处 《计算机与数字工程》 2009年第2期98-101,共4页 Computer & Digital Engineering
关键词 彩色图像加密 推广的三维Arnold映射 扰动系数 阈值 color image encryption, general 3-D cat map, perturbation coefficient, threshold value
  • 相关文献

参考文献6

二级参考文献46

  • 1SchneierB 吴世忠译.应用密码学——协议、算法与C源程序(第二版)[M].北京:机械工业出版社,2000..
  • 2一松信[日].数据保护和加密研究——计算机网络的安全性[M].北京:科学出版社,1991..
  • 3Dang P P, Chau P M. Image encryption for secure Internet multimedia applications [ J ]. IEEE Transactions on Consumer Electronics,2000,46(8) :395 -403.
  • 4Cox I J, Kilian J, Leighton F T. Secure spread spectrum watermarking for multimedia [J]. IEEE Trans. on Image Processing,1997,6(12) :1673 - 1687.
  • 5Chung K L, Chang L C. Large encryption binary images with higher security [J]. Pattern Recognition Letters, 1998,19(2) :461 -468.
  • 6Chang C C, et al. A new encryption algorithm for image cryptosystems [ J ]. The Journal of Systems and Software, 2001,(7) :83 -91.
  • 7Schwartz C. A new graphical method for encryption of computer data[ J]. Cryptologia,1991,15( 1 ) :43 -46.
  • 8Bourbakis N, Alexopoulos C. Picture data encryption using SCAN patterns [ J ]. Pattern Recognition, 1992,25 (6) : 567 -581.
  • 9Kuo C J. Novel image encryption technique and its application in progressive transmission [ J ]. J. Electron. Imaging, 1993,2(4) :345 -351.
  • 10Chang H K, Liou J L. An image encryption scheme based on quadtree compression scheme [ A ]. Proceedings of the International Computer Symposium [ C]. Taiwan: 2001. 230 -237.

共引文献89

同被引文献6

  • 1FRYSKA S T,ZOHDY M A.Computer dynamics and shadowing of chaotic orbits[J].Physics Letters A,1992,166 (5/6):340 -346.
  • 2MAUGHAN D,SCHERTLER M,SCHNEIDER M,et al.RFC 2408-1998.Intemet Security Association and Key Management Protocol (ISAKMP)[S].
  • 3佟晓筠.复合混沌序列密码在图像加密技术上的研究[D].威海:哈尔滨工业大学,2008.
  • 4RUKHIN A,SOTO J,NECHVATAL J,et al.Vo S-2001.A statistical test suite for random and pseudorandom number generators for cryptographic applications[S].
  • 5刘金梅,丘水生.混沌系统在密码学中的应用现状及展望[J].计算机工程与应用,2008,44(14):5-12. 被引量:5
  • 6盛利元,肖燕予,盛喆.将混沌序列变换成均匀伪随机序列的普适算法[J].物理学报,2008,57(7):4007-4013. 被引量:23

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部