期刊文献+

两个新的数字图像加密效果评价准则 被引量:4

Two New Digital Image Encryption Effect Evaluation Criterions
下载PDF
导出
摘要 图像信息熵和灰度变化平均值是两个常用的图像加密效果评价准则。分析指出,图像信息熵和灰度变化平均值受图像尺寸大小的影响较大,为此提出了两个新的图像加密效果评价准则:直方图均衡度和游程统计量。直方图均衡度可用于基于像素灰度值变换的加密过程的评价,游程统计量可用于图像坐标置换的加密过程的评价。新方法表达简单,计算便捷,其显著优点是与图像大小无关,不需要借助原图像。 Image information entropy and gray modification average value are two familiar image encryption effect eva- luation criterions. We pointed out that these two criterions are influenced obviously by the size of images,and two new image encryption effect evaluation criterions were presented, that is,histogram proportion degree and run statistic. His- togram proportion degree can be used in the effect evaluation of image encryption algorithm based on the image pixel gray values modification, and run statistic can be used in the effect evaluating of image encryption algorithm based on the image pixel coordinate permutation. The proposed criterions are simple on expression and convenient in computation, their main advantages are having litter effect on the size of images and the computing process are only related with the encrypted image.
出处 《计算机科学》 CSCD 北大核心 2010年第2期264-268,共5页 Computer Science
基金 陕西省自然科学研究计划项目(SJ08F24)资助
关键词 图像加密 图像信息熵 灰度变化平均值 评价准则 Image encryption, Image information entropy,Gray modification average value,Evaluation criterion
  • 相关文献

参考文献14

二级参考文献64

  • 1商艳红,李南,熊昌镇,邹建成.基于纹理特征的数字图像置乱效果分析[J].武汉大学学报(理学版),2004,50(A01):213-216. 被引量:4
  • 2徐江峰,尚晋,胡静.基于连续混沌系统和Hash函数的图像加密算法[J].计算机应用,2004,24(12):61-63. 被引量:12
  • 3郭建胜,金晨辉.对基于广义猫映射的一个图像加密系统的已知图像攻击[J].通信学报,2005,26(2):131-135. 被引量:29
  • 4卢振泰,黎罗罗.一种新的衡量图像置乱程度的方法[J].中山大学学报(自然科学版),2005,44(B06):126-129. 被引量:37
  • 5Y Matias, A Shamir. A video scrambling technique based on space filling curves. In: C Pomerance ed. Advances in Cryptology(CRYPTO'87), Lecture Notes in Computer Science 93, Berlin: Springer-Verlag, 1988. 398~417
  • 6Qi Dongxu, Zou Jianchen, Han Xiaoyou. A new class of scrambling transformation and its application in the image information covering. Science in China(Series E), 2000, 43(3), 304~312
  • 7侯启槟 周晓旭 杨小帆.基于骑士巡游的图像像素置乱算法[M].中国科学院自动化与信息技术学术年会,北京,2003..
  • 8Ding Wei, Yan Weiqi, Qi Dongxu. Digital image scrambling. Progress in Natural Science, 2001, 11(6): 454~460
  • 9H Cheng, X Li. Partial encryption of compressed images and videos. IEEE Trans on Signal Processing, 2000, 48(8): 2439~2451
  • 10Alan Watt, Fabio Policarpo. The Computer Image. Essex: Addison Wesley Longman Limited, 1998

共引文献189

同被引文献30

  • 1李联.信息安全中的DES加密算法[J].现代电子技术,2005,28(9):118-120. 被引量:21
  • 2熊家军,李庆华.信息熵理论与入侵检测聚类问题研究[J].小型微型计算机系统,2005,26(7):1163-1166. 被引量:14
  • 3王迤冉,朱维军,詹新生.基于图像加密的置乱性能分析研究[J].计算机工程与设计,2006,27(24):4729-4731. 被引量:16
  • 4陈燕梅,张胜元.基于交叉熵的数字图像置乱程度评价方法[J].中国图象图形学报,2007,12(6):997-1001. 被引量:25
  • 5何明星,林昊.AES算法原理及其实现[J].计算机应用与研究,2002(12):61-63.
  • 6廖晓峰,肖迪,陈勇,等.混沌密码学原理及其应用[M].北京:高等教育出版社.2009:38-38.
  • 7Fridrich J. Symmetric cipher based on two dimensional chaotic maps[J]. International Journal of Bifurcation and Chaos, 1998,8(6) .. 1259-1284.
  • 8Wolfeam S. Cryptography with cellular automata[C]//Lecture Notes in Computer Science, Advances in Cryptology.. Pro- ceedings of the Crypto' 85. Berlin : Springer Verlag, 1986,218 .. 429 431.
  • 9Hopfield J J. Neural networks and physical system with emergent collective computertational abilities[J]. Proceedings of the National Academy of Sciences, 1982,79(2) .. 2554-2558.
  • 10Waibel A, Hanazawa T, Hinton G. Phoneme recognition using time delay neural networks[J]. IEEE Transactions on Acous- tics,Speech and Sigual Proceesing, 1989,37 ..328-339.

引证文献4

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部