期刊文献+

改进的分块算法在矩形图像加密中的应用 被引量:10

Application of improved blocking algorithm in rectangle image encryption
下载PDF
导出
摘要 为提高图像加密算法抵御穷举攻击、统计分析攻击及差分攻击的能力,提出了一种改进的基于混沌的分块图像加密算法,并用于矩形灰度图像加密。该算法通过对外部密钥分组生成Logistic映射初始条件并迭代生成混沌序列,有效增强了密钥的敏感性。提出三向散布并结合像素值替代算法能够明显增强算法抵御差分攻击的能力;同时为增强算法的鲁棒性,采用反馈机制修改密钥。实验结果表明,该算法较二维混沌图像加密具有更高置乱度,且能够有效抵御穷举攻击、统计分析攻击及差分攻击。 In order to improve image encryption algorithm resistance ability to exaustive attack,statistical attack and differential attack,this paper put forward a modified block encryption algorithm based on chaos,and applied it to rectangle image encryption.This algorithm generated Logistic initial condition by block external keys and chaotic sequence iterately for strengthening the sensitivity of keys.It proposed three-direction dispersion combined with pixel value substitution algorithm to increase the resistance ability to differential attack obviously.Meanwhile,it used feedback mechanism to modify keys.The results show that it not only has higher scrambling degree than two-dimensional chaotic system of image encryption,but also resists exaustive attack,statistical attack and differential attack effectively.
出处 《计算机应用研究》 CSCD 北大核心 2013年第1期282-284,共3页 Application Research of Computers
基金 国家青年科学基金资助项目(61003162)
关键词 分组密码 混沌序列 差分攻击 三向散布 图像加密 block cipher chaotic sequence differential attack three-direction dispersion image encryption
  • 相关文献

参考文献14

  • 1JOLFAEI A, MIRGHADRI A. Image encryption using chaos and block cipher [ J ]. Computer and Information Science, 2011,4 (1) :172-185.
  • 2NAYAK C K, ACHARYA A K, DAS S. Image encryption using an enhanced block based transformation algorithm [ J ]. International Journal of Research and Review in Computer Science,2011,2 (2) :2?5-2?9.
  • 3PATIDAR V, PUROHIT G, SUD K K, et al. Image encryption through a novel permutation-substitution scheme based on chaotic standard map [ C l//Proc of International Workshop on Chaos-Fractals Theories and Applications. 2010 : 164-169.
  • 4刘金梅,丘水生,刘伟平.基于超混沌系统的图像加密算法的安全性分析[J].计算机应用研究,2010,27(3):1042-1044. 被引量:26
  • 5YOON J W, KIM H. An image encryption scheme with a pseudoran- dom permutation based on chaotic maps [ J 1. Communication in Nonlinear Science and Numerical Simulation, 2010, 15 ( 12 ) : 3998-4006.
  • 6JAMEI M K, ENYATIFAR R, HASSANPOUR H. Hybird model of chaotic signal and complete binary tree for image encryption[ J]. In- ternational Journal of the Physical Sciences, 2011,6 (4) : 837- 842.
  • 7MA Xin, FU Chong, LEI Wei-min, et al. A novel chaos-based image image encryption scheme with an improved permutation process [ J ]. International Journal of Advancements in Computing Technolo- gy,2011,3(5) :223-233.
  • 8GOUMIDI D E, HACHOUF F. Modified confusion-diffusion based satellite image cipher using chaotic standard, Logistic and Sine maps [C]//Proc of the 2nd European Workshop on Visual Information Processing. 2011:204- 209.
  • 9PENG Jun, ZHANG Du, LIAO Xiao-feng. A novel algorithm for block encryption of digital image based on chaos [ J ]. International Journal of Cognitive Informatics and Natural Intelligence,2011, 5(1) :59-?4.
  • 10KADIR R, SHAHRIL R, MAAROF M A. A modified image encryp- tion scheme based on 2D chaotic map [ C]//Proc of International Conference on Computer and Communication Engineering. 2010 : 1-5.

二级参考文献26

  • 1WONG K W, KWOK B S K, LAW W S. A fast image encryption scheme based on chaotic standard map [ J]. Physics Letters A, 2008, 372( 15): 2645-2652.
  • 2GAO Tie-gang, CHEN Zeng-qiang. A new image encryption algorithm based on hyper-chaos [J].Physics Letters A, 2008, 372 (4) : 394-400.
  • 3RHOUMA R, BELGHITH S. Cryptanalysis of a new image encryption algorithm based on hyper-chaos [J]. Physics Letters A, 2008, 372 (38) : 5973-5978.
  • 4GUAN Zhi-hong, HUANG Fang-jun, GUAN Wen-jie. Chaos-based image encryption algorithm [ J]. Physics Letters A, 2005, 346 (1- 3) : 153-157.
  • 5COKAL C, SOLAK E. Cryptanalysis of a chaos-based image encryption algorithm [ J]. Physics Letters A, 2009, 373 (15) : 1357- 1360.
  • 6Y Matias, A Shamir. A video scrambling technique based on space filling curves. In: C Pomerance ed. Advances in Cryptology(CRYPTO'87), Lecture Notes in Computer Science 93, Berlin: Springer-Verlag, 1988. 398~417
  • 7Qi Dongxu, Zou Jianchen, Han Xiaoyou. A new class of scrambling transformation and its application in the image information covering. Science in China(Series E), 2000, 43(3), 304~312
  • 8侯启槟 周晓旭 杨小帆.基于骑士巡游的图像像素置乱算法[M].中国科学院自动化与信息技术学术年会,北京,2003..
  • 9Ding Wei, Yan Weiqi, Qi Dongxu. Digital image scrambling. Progress in Natural Science, 2001, 11(6): 454~460
  • 10H Cheng, X Li. Partial encryption of compressed images and videos. IEEE Trans on Signal Processing, 2000, 48(8): 2439~2451

共引文献49

同被引文献89

引证文献10

二级引证文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部