期刊文献+

在线混沌图像保密通信研究 被引量:3

Research of Online Chaotic Image Secure Communications
下载PDF
导出
摘要 本文利用像素值替代和图像位置置乱相结合的方法进行图像信息的加解密,设计并实现了一个网络在线混沌图像保密通信系统,具有保密性和实时性。系统采用Lorenz和Logistic混沌系统,通过密钥同步方案,信息被实时加密后经TCP协议传输;由于混沌映射的初值敏感性和伪随机特性,传输的信息很难被破译,具有较强的保密性。本文对系统的实现方法进行了研究,通信结果表明该系统具有较好的保密性和实用性。 An online chaotic image secure communication system with the encryption/decryption method of grey value substituting and position shuffling is designed and implemented for the network,which is real-time and secure for communications.By the use of the Lorenz and Logistic chaotic systems,with a key synchronization scheme,the original image information can be encrypted in a real-time way and the cipher information is transmitted via TCP.With the properties of randomness and its sensitivity on the initial conditions,the encrypted transmitting messages are secure and difficult to be eavesdropped.The implementation method of the system is studied,and the communication results show its security and practicability.
出处 《计算机工程与科学》 CSCD 北大核心 2011年第4期30-34,共5页 Computer Engineering & Science
基金 国家自然科学基金资助项目(60474076) 江苏省自然科学基金资助项目(BK2010275) 南通市应用研究计划项目(K2010017)
关键词 混沌序列 图像通信 混沌加解密 实时 密钥同步 chaotic sequence image communication chaotic encryption/decryption real-time key synchronization
  • 相关文献

参考文献9

  • 1Matthews R. On the Derivation of a Chaotic Encryption Al-gorithm[J]. Cryptologia, 1989,1: 29-42.
  • 2Chen Guan rong, Mao Yao bao, Chui Charles K. A Symmetric Image Encryption Scheme Based on aD Chaotic Cat Maps [J]. Chaos Solitons & Fractals, 2004, 21(3):749-761.
  • 3Mao Yao bao, Chen Guan rong, Lian Shi-guo. A Novel Fast Image Encryption Scheme Based on 3D Chaotic Baker Maps [J]. International Jouanal of Bifurcation and Chaos, 2004, 14(10):3613-3624.
  • 4Zhang Lin hua, Liao Xiao feng, Wang Xue bing. An Image Encryption Approach Based on Chaotic Maps[J]. Chaos Soil- tons & Fractals, 2005, 24(3):759-765.
  • 5Liao Xiao feng, l.i Xue-ming, Pen Jun, et al. A Digital Secure Image Communication Scheme Based on the Chaotic Chebyshev Map[J]. International Journal of Communication Systems, 2004, 17(5):437-445.
  • 6Liu Nian-sheng, Guo Dong-hui, Gerard Parr. A New Image Steganography for Internet Communications Based on Chaotic Sequences[C]//Proc of Int'l Conf on Intelligent Information Hiding and Multimedia Signal Processing, 2006:121-124.
  • 7Chang Wei der. Digital Secure Communication via Chaotic SystemsEJAq. Digital Signal Processing, 2009,19(4): 693-699.
  • 8Fu Chong, Zhang Zhemchuan, Cao ying yu. An hnproved Image Encryption Algorithm Based on Chaotic Maps[C]// Procof the 3rd Int'l Conf on Natural Computation, 2007: 189-193.
  • 9王英,郑德玲,王振龙.空域彩色图像混沌加密算法[J].计算机辅助设计与图形学学报,2006,18(6):876-880. 被引量:23

二级参考文献13

共引文献22

同被引文献25

  • 1张大奇,张永红,康宝生.基于RB曲线融合的数字图像隐藏技术[J].中国图象图形学报,2006,11(2):235-243. 被引量:16
  • 2李鹏,田东平,张楠.基于混沌序列的数字图像隐藏技术[J].信息安全与通信保密,2007,29(6):222-225. 被引量:9
  • 3Jui Cheng Yen, Jiun In Guo. A new image encryption algo- rithm and its VLSI architecture [ C ]// Proc. IEEE Work- shop on Signal Processing Systems. 1999:430-437.
  • 4Jui Cheng Yen, Jiun In Guo. A new chaotic key-based de- sign for image encryption and decryption [ C ]//Proc. IEEE Int. Symposium on Circuits and Systems. 2000,4:49-52.
  • 5Yen Jui Cheng, Jiun In Guo. Efficient hierarchical chaotic image encryption algorithm and its VLSI realisation [ J ]. Vision, Image Signal Process, 2000,147 (2) : 167-175.
  • 6Chen Hun Chen, Jiu Cheng Yen, Jiun In Guo. Design of a new cryptography system [ J ]. Lecture Notes in Computer Science, 2002, 2532 : 1041-1048.
  • 7Li Shujun, Zheng Xuan. Cryptanalysis of a chaotic image encryption method [ C ]// 2002 IEEE International Sympo- sium on Circuits and Systems. 2002, 2:708-711.
  • 8Li Shujun, Zheng Xuan. On the security of an image en- cryption method [ C ]//Proceedings of the 2002 Internation- al Conference on Image Processing. 2002,2:925-928.
  • 9Beldhouche F, Qidwai U. Binary image encoding using 1D chaotic maps [ C ]// IEEE Annual Technical Conference. 2003:39-43.
  • 10Guan Zhihong, Huang Fangjun, Guan Wenjie. Chaos-based image encryption algorithm [ J ]. Physics Letters A, 2005, 346(1-3) :153-157.

引证文献3

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部