期刊文献+

基于交叉耦合映像格子的图像加密方案的设计 被引量:1

Design of Image Encryption Scheme Based on Cross Coupled Map Lattice
下载PDF
导出
摘要 交叉耦合映像格子是一种用于描述时空系统混沌状态的模型,基于交叉耦合映像格子的混沌特性提出了一种新颖的图像加密方案,用Chebyshev映射提供交叉耦合映像格子的初值,并用所产生的时空混沌序列值对原图像进行迭代和置乱处理,经发送方发送,通信双方同步后,接收方通过解密方案得到相应的解密图像,实现了图像的保密通信.方案的密钥空间较大,因此具有较高的安全保密特性,同时对初值的高度敏感性提高了加密方案的抗攻击能力.仿真结果验证了方案的可行性,并且体现了应用在图像加密中的交叉耦合映像格子算法的有效性和优越性. A novel image encryption scheme is proposed based on the chaotic feature of cross CML (coupled map lattice) which is a model for describing the chaotic states of spatiotemporal systems. The scheme uses Chebyshev mapping to provide the initial value of cross CML and utilizes the generated spatiotemporal chaos sequences to encrypt source image by the process of iteration and permutation. After the encryption image is sent from the sender, the receiver will receive the image decrypted by the decryption scheme once the communication is synchronized, which realizes the secure communication of the image. The scheme has the property of high security because its key space is large, and the high sensitivity to the initial value enhances the anti-attack ability of the encryption scheme. The simulation results show that the scheme is feasible and that the cross CML algorithm used in image encryption is effective and superior.
出处 《信息与控制》 CSCD 北大核心 2011年第6期740-746,共7页 Information and Control
基金 国家863计划资助项目 河北省自然科学基金资助项目(F2010001320)
关键词 交叉耦合映像格子(CML) 图像加密 CHEBYSHEV映射 保密通信 cross coupled map lattice (CML) image encryption Chebyshev mapping secure communication
  • 相关文献

参考文献15

  • 1Kocarev L, Jakimoski G. Logistic map as a block encryption algorithm[J]. Physics Letters A, 2001, 289(4/5): 199-206.
  • 2Pareek N K, Patidar V, Sud K K. Image encryption using chaotic Logistic map[J]. Image and Vision Computing, 2006, 24(9): 926-934.
  • 3Wu X G, Hu H P, Zhang B L. Analyzing and improving a chaotic encryption method[J]. Chaos, Solitons & Fractals, 2004, 22(2): 367-373.
  • 4Zhang L H, Liao X F, Wang X B. An image encryption ap- proach based on chaotic maps[J]. Chaos, Solitons & Fractals, 2005, 24(3): 759-765.
  • 5Singh N, Sinha A. Optical image encryption using Hartley transform and Logistic map[J]. Optics Communications, 2009, 282(6): 1104-1109.
  • 6Zhang W, Peng J, Yang H Q, et al. A digital image encryption scheme based on the hybrid of cellular neural network and lo- gistic map[C]//Proceedings of the 2nd International Symposium on Neural Networks. Berlin, Germany: Springer-Verlag, 2005: 860-867.
  • 7Fridrich J. Symmetric ciphers based on two dimensional chaotic maps[J]. International Journal of Bifurcation and Chaos, 1998, 8(6): 1259-1284.
  • 8Chen G R, Mao Y B, Chui C K. A symmetric image encryp- tion scheme based on 3D chaotic Cat maps[J]. Chaos, Solitons & Fractals, 2004, 21(3): 749-761.
  • 9Wang K, Pei, Zou L H, et al. On the security of 3D Cat map based symmetric image encryption scheme[J]. Physics Letters A, 2005, 343(6): 432-439.
  • 10Tong X J, Cui M G. Image encryption scheme based on 3D Baker with dynamical compound chaotic sequence cipher gen- erator[J]. Signal Processing, 2009, 89(4): 480-491.

二级参考文献22

  • 1廉士国,茅耀斌,王执铨.Baker映射的三维扩展及其在多媒体加密中的应用[J].控制与决策,2004,19(6):714-717. 被引量:9
  • 2盛利元,孙克辉,李传兵.基于切延迟的椭圆反射腔离散混沌系统及其性能研究[J].物理学报,2004,53(9):2871-2876. 被引量:43
  • 3刘向东,焉德军,朱志良,王光兴.基于排序变换的混沌图像置乱算法[J].中国图象图形学报(A辑),2005,10(5):656-660. 被引量:35
  • 4Sobhy M I, Shehata A-E R. Methods of Attacking Chaotic Encryption and Countermeasures. In:IEEE International Conference on Acoustics, Speech, and Signal Processing, 2001, 2: 1001-1004
  • 5FRIDRICH J. Symmetric ciphers based on two dimensional chaotic maps [J]. Intentional J of Bifurcation and Chaos, 1998, 8(6) : 12:59- 84.
  • 6CHEN G R, MAO Y B, CHUI C K. A symmetric image encryption scheme based on 3D chaotic cat maps[ J]. Chaos, Solutions & Fractals, 2004, 21 (3) :749-761.
  • 7LI Shu-jun, ZHENG Xuan. Cryptanalysis of a chaotic image encryption method [ C ]//Proc of IEEE International Symposium on Circuits and Systems. 2002:708- 711.
  • 8KOCAREV L. Chaos-based cryptography:a brief overview[ J ]. I EEE Circuits and Systems, 2001,1 (3) : 6-21.
  • 9PONOMARENKO V I, PROKHOROW M D. Extracting information masked by the chaotic signal of a time-delay system [ J ]. Physical Review E, 2002, 66: 3-5.
  • 10Jaklmoski G, Kocarev L. Chaos and cryptography: block encryption ciphers based on chaotic maps. IEEE trans. on CAS-I, 2001,48(2) : 136-169.

共引文献12

同被引文献5

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部