期刊文献+

基于混沌映射组合的高效图像加密新算法 被引量:1

New Efficient Algorithm of Image Encryption Based on Combined Chaotic Maps
下载PDF
导出
摘要 提出了一种结合Logistic映射和标准混沌映射的混沌图像加密算法.由Logistic映射和标准混沌映射产生的混沌序列生成中间密钥,利用像素密文输出控制后继明文的加密密钥生成,使密文对明文具有敏感性.仿真结果表明,该密码系统的时间开销很小;密钥空间足以抵抗强力攻击;密文对明文或初始密钥的任何微小变化均有强烈敏感性;密文分布均匀,相邻像素满足零相关性.故该密码系统具有高安全性. A new chaotic encryption algorithm based on combined Logistic map and standard chaotic map was proposed. The chaotic sequences randomly generated by the Logistic map and standard chaotic map were adopted to generate intermediate key. Then the generated ciphertext of encrypted pixels was used to control the generation of encryption key of successor plaintent to make the ciphertext sensitive to the plaintext, Simulation results showed that the proposed cryptosystem requires very little time to encrypt the plaintext. The key space is large enough to resist the brute-force attack. The ciphertext varies sensitively with any minimal changes of the initial secret key and the plaintext. For the encrypted image, the distribution of pixel-values has a random-like behavior and the values of adjacent pixels satisfy zero correlation, showing that the proposed scheme is of high reliability.
作者 廖雪峰
出处 《温州大学学报(自然科学版)》 2010年第1期33-40,共8页 Journal of Wenzhou University(Natural Science Edition)
关键词 图像加密 LOGISTIC映射 标准混沌映射 Image Encryption Logistic Map Standard Chaotic Map
  • 相关文献

参考文献8

  • 1Wong K W. A Fast Chaotic Cryptography Scheme with Dynamic Look-up Table [J]. Physics Letters A, 2002, 298(4): 238-242.
  • 2Wong K W, Ho S W, Yung C K. A Chaotic Cryptography Scheme for Generating Short Ciphertext [J]. Physics Letters A, 2003, 310(1): 67-73.
  • 3Pareek N K, Patidar V, Sud K K. Discrete Chaotic Cryptography Using External Key [J]. Physics Letters A, 2003, 309(1-2): 75-82.
  • 4Huang F, Guan Z H. A Modified Method of a Class of Recently Presented Cryptosystems [J]. Chaos, Solitons and Fractals, 2005, 23(5): 1893-1899.
  • 5Jakimoski G, Kocarev L. Analysis of Some Recently Proposed Chaos-based Encryption Algorithms [J]. Physics Letters A, 2001, 291(6): 381-384.
  • 6Patidar V, Pareek N K, Sud K K. A New Substitution-diffusion Based Image Cipher Using Chaotic Standard and Logistic Maps [J]. Communication in Nonlinear Science and Numerical Simulation, 2009, 14(7): 3056-3075.
  • 7Schneier B. Applied Cryptography: Protocols, Algorithms and Source Code in C [M]. 2nd. New York: John Wiley and Sons, 1996: 330-340.
  • 8Chen G, Mao Y, Chui C K. A Symmetric Image Encryption Scheme Based on 3D Chaotic Cat Maps [J]. Chaos, Solitons and Fractals, 2004, 21(3): 749-761.

同被引文献10

引证文献1

二级引证文献10

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部