期刊文献+

交替分段相互置乱的双混沌序列图像加密算法 被引量:19

Image Encryption Algorithm Based on Reciprocally-Disordered Diploid Chaotic Sequences Alternated in Subsection
下载PDF
导出
摘要 基于混沌的图像加密方法在安全性、适应性上具有优势.文中在对原有的混沌图像加密算法安全性分析的基础上,提出了一种基于Logistic和Chebyshev双混沌映射的数字灰度图像加密算法.借助基于明文产生的辅助密钥、初始密钥以及由双混沌系统产生交替分段相互置乱的密码序列是本算法的核心.计算机仿真及统计特性、安全性分析表明,该加密算法具有良好的加密效果和较高的安全性能,密钥空间达到255×10120. As the image encryption based on chaos is of high security and adaptability,this paper analyzes the security of the conventional image encryption algorithms based on chaotic systems and proposes a new image encryption algorithm based on diploid Logistic and Chebyshev chaotic maps.The auxiliary and the initial secret keys based on original image,as well as the reciprocally-disordered cipher sequences alternated in subsection and generated by the diploid chaotic systems,are the kernel parts of the proposed algorithm.Both the simulated and statistical results and the security analysis show that the proposed algorithm is of excellent encryption effect and high security,with a key space being up to 255×10120.
出处 《华南理工大学学报(自然科学版)》 EI CAS CSCD 北大核心 2010年第5期27-33,共7页 Journal of South China University of Technology(Natural Science Edition)
基金 国家自然科学基金资助项目(60802004) 中央高校基本科研业务费专项资金资助项目(2009ZM0011)
关键词 混沌系统 加密 辅助密钥 置乱 chaotic systems encryption auxiliary key order-disorder
  • 相关文献

参考文献8

  • 1乌旭,陈尔东,胡家升.一种基于混沌的图像加密改进方法[J].大连理工大学学报,2004,44(5):754-757. 被引量:12
  • 2Patidar V,Pareek N K,Sud K K.A new substitution-diffusion based image cipher using chaotic standard and logistic maps[J].Communications in Nonlinear Science and Numerical Simulation,2009,14(7):3056-3075.
  • 3Narendra Singh,Aloka Sinha.Optical image encryption using Hartley transform and Logistic map[J].Optics Communications,2009,282(6):1104-1109.
  • 4Kocarev L,Maggio G M,Ogorzalek M,et al.Introduction to the special issue[J].IEEE Transactions on Circuits and Systems-I:Fundamental Theory and Applications,2001,48(12):1385-1388.
  • 5彭飞,丘水生,龙敏.外部密钥控制系统参数的图像加密算法[J].华南理工大学学报(自然科学版),2005,33(7):20-23. 被引量:11
  • 6Pareek N K,Patidar V,Sud K K.Image encryption using chaotic Logistic map[J].Image and Vision Computing,2006,24(9):926-934.
  • 7Liao Xiao-feng,Li Xue-ming,Chen Guan-rong,et al.A digital secure image communication scheme based on the chaotic Chebyshev map[J].International Journal of Communication Systems,2004,17(5):437-445.
  • 8丁玮,齐东旭.数字图像变换及信息隐藏与伪装技术[J].计算机学报,1998,21(9):838-843. 被引量:327

二级参考文献19

  • 1苏中民,林行良.图视秘密的任意分存[J].计算机学报,1996,19(4):293-299. 被引量:26
  • 2江早,中国图象图形学报,1998年,3卷,1期,83页
  • 3齐东旭,分形及其计算机生成,1994年
  • 4王育民,保密学.基础与应用,1990年
  • 5YEN J C, GUO J I. A new chaotic key-based design for image encryption and decryption[A]. Proceedings of IEEE 2000 International Symposium on Circuits and Systems [C]. Geneva: Qmni Press, 2000.
  • 6YEN J C, GUO J I. A new image encryption algorithm and its VLSI architecture [A]. Proceedings of IEEE 1999 Workshop on Signal Processing Systems [C]. Taipei: Omni Press, 1999. 430-437.
  • 7FRIDRICH J. Image encryption based on chaotic maps, systems, man, and cybernetics [A]. Proceedings of IEEE 1997 International Conference on System, Man and Cybernetics [C]. Orlando: Omni Press, 1997.
  • 8YEN J C, GUO J I. Efficient hierarchical chaotic image encryption algorithm and its VLSI realization [A]. Proceedings of IEEE 2000 International Conference on Vision, Image and Signal Processing [C]. [s l]: Omni Press, 2000. 167-175.
  • 9BOURBAKIS N G. Image data compression- encryption using G-scan patterns [A]. Proceedings of IEEE 1997 International Conference on Systems, Man and Cybernetics [C]. Orlando: Omni Press, 1997.
  • 10LI Shu-jun, ZHENG Xuan. On the security of an image encryption method [A]. Proceedings of IEEE 2002 International Conference on Image Processing [C]. [s l]: Omni Press, 2002.

共引文献345

同被引文献145

引证文献19

二级引证文献114

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部