期刊文献+

基于混沌和细胞自动机的图像加密算法 被引量:9

Chaos and cellular automata based image encryption algorithm
下载PDF
导出
摘要 为了设计加密性能好、容易实现的加密系统,充分利用混沌系统的密码学特性和细胞自动机良好的加密性能,提出了一种基于混沌系统和触发细胞自动机的图像加密算法。算法先利用混沌序列对图像进行加密处理;通过构造反转规则建立触发细胞自动机,并根据触发细胞自动机的迭代规则对图像进行二次加密。加密过程简单高效,且具有较大的密钥空间,可以保证系统的安全性。实验结果表明,该算法具有较好的加解密性能,且较小的邻域半径即可得到良好的加密效果,因此非常便于硬件实现。 To design high performance and easily implementation encryption system, an image encryption algorithm based on chaos and toggle cellular automata (TCA) is proposed. Firstly, a chaotic sequence is generated, and then the origin image is en- crypted with the sequence. After that, a TCA is constructed by setting up the inversion rule. Finally, the image which has been processed by chaotic sequence is encrypted again by utilizing the TCA iteration method. The proposed encryption algorithm is simple and effective and it has a large secret key space. The results of simulation experiments indicate that this image encryption algorithm has a good performance and it is convenient for hardware implementation.
作者 彭川 李元香
出处 《计算机工程与设计》 CSCD 北大核心 2012年第7期2526-2529,2535,共5页 Computer Engineering and Design
基金 国家自然科学基金项目(60873114) 国家863高技术研究发展计划基金项目(2007AAO1Z290) 中南民族大学中央高校科研业务专项基金项目(CZQ11006)
关键词 混沌系统 触发细胞自动机 图像加密 反转规则 迭代 chaotic system TCA image encryption inversion rule iteration
  • 相关文献

参考文献3

二级参考文献34

  • 1张文涛,卿斯汉,吴文玲.对一个基于细胞自动机的分组密码变形的分析[J].软件学报,2004,15(5):767-771. 被引量:9
  • 2Wolfram S. Cryptography with cellular automata[J]. Advances in Cryptology, 1985 : 429- 432.
  • 3Tomassini M, Sipper M, Perrenoud M. On the Generation of High-Quality Random Numbers by Two-Dimensional Cellular Autoamta[J]. IEEE Trans. on Computer, 2000, 49 (10) : 1146- 1151.
  • 4Guan Sheng uei, Zhang Shu, Quieta M T. 2-D CA Variation With Asymmetric Neighborship for Pseudorandom Number Generation[J]. IEEE Trans. on computer-aided design of integrated circuits and systems, 2004,23 (3) : 378-388.
  • 5Guan Sheng-uei, Zhang Shu. An Evolutionary Approach to the Design of Controllable Cellular Automata Structure for Random Number Generation[J]. IEEE Trans. on Evolutionary Computation,2003,7(1) :23-36.
  • 6Guan P. Cellular automata public-key eryptosystem[J]. Complex Systems, 1987,1 : 51-57.
  • 7Nandi S, Kar B K, Pal P. Chaudhuri, Theory and application of cellular automata in cryptography[J]. IEEE Trans. on Computer, 1994,43(12) : 1346-1356.
  • 8Sen S, Shaw C, Ray D, et al. Cellular Automata Based Cryptosystem (CAC)[C]//Proceedings of the 4th International Conference on Information and Communications Security. Singapore, 2002 ; 303-314.
  • 9Gutowitz H, Victor J D, Knight B W. Local structure for cellular automata[J]. Physica D, 1987,28 : 18-48.
  • 10Karl J. Reversiblity of 2 D cellular automata is undecidable [J]. Physica D, 1990,45(1-3) : 379-385.

共引文献27

同被引文献100

引证文献9

二级引证文献35

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部