期刊文献+

基于仿射和复合混沌的图像加密新算法 被引量:21

An Encryption Algorithm for Image Based on Affine and Composed Chaos
下载PDF
导出
摘要 随着多媒体的广泛应用,数字图像的安全性变得越来越重要.针对数字图像的特点,基于三维仿射变换和混沌,提出一种新的空域加密算法.先置乱像素的位置并根据像素坐标混合像素的值,然后按行交替进行非线性的扩散、代换,如此迭代至少3轮.代换时用中间结果扰动耦合的多个混沌系统以进行自适应的加密,置乱参数由混沌系统自动生成,置乱操作可以直接作用于任意宽高比的图像,不需要进行预处理.稍加改动算法使之处理对象为频域量化后系数,便可转换为频域加密算法.理论分析表明:算法密钥空间巨大,可抵御穷举攻击;明密文映射关系复杂,可有效地抵御选择明文攻击;算法符合模块化设计思想,采用的混沌系统形式简单,易于并行实现.实验结果表明:算法加密效果好,敏感性强,符合密码学中的混淆与扩散原则,安全性高. With the popular application of multimedia, the security of digital image becomes more and more important. According to the feature of digital image and on the basis of three-dimension affine transformation and chaos, a novel spatial domain encryption algorithm is proposed. Firstly, it scrambles pixel position and confuses pixel value according to the corresponding coordination. Secondly, it takes a series of nonlinear diffusion and substitution in turn for all lines. The algorithm proceeds with the above two steps for at least 3 times, and it can be conveniently converted to the frequency domain algorithm while replacing the processed data in the spatial domain with quantized coefficients in the frequency domain. In the process of substitution, pixel value is introduced to perturb multiple chaos systems that are coupled together for self-adaptive encryption. In the encryption process, the scrambling parameters are generated by chaos systems automatically, and the scrambling function is compatible with images at any ratio of length to width without any preprocessing. Theoretical analysis shows that the algorithm has huge key space to defend against violent attack, the mapping relation between the plaintext and the ciphertext is complex enough to resist chosen plaintext attack efficiently, and the algorithm using simple chaos systems is designed modularly in order to be realized parallelly conveniently. Experimental results show that the algorithm takes good encryption result, gets strong sensitivity, conforms to confusion and diffusion principles in cryptography, and achieves high security.
出处 《计算机研究与发展》 EI CSCD 北大核心 2013年第2期319-324,共6页 Journal of Computer Research and Development
关键词 图像加密 仿射 混沌 置乱 自适应 image eneryption affine chaos scramble self-adaptive
  • 相关文献

参考文献5

二级参考文献32

  • 1龙敏,丘水,生彭飞.利用超混沌加密技术加强RSA算法的研究[J].计算机工程与应用,2005,41(4):168-169. 被引量:3
  • 2万娟,吴楚,张源安.超混沌语音加密的网络传输[J].计算机工程与应用,2005,41(18):154-156. 被引量:1
  • 3[1]Hong Zhou,Xie-Ting Ling.Problems with the chaotic inverse system encryption approach.IEEE Trans on Circuits and Systems I:Fundamental Theory and Applications,1997,44(3):268-271
  • 4[4]G Baier,M Klein.Maximum hyperchaos in generalized Henon maps.Physics Letters A,1990,151(6/7):281-284
  • 5[8]胡磊,王鹏,等.应用密码学手册.北京:电子工业出版社,2005.161-165
  • 6Cheng Howard, Li Xiao-bo. Partial encryption of compressed images and videos [ J ]. IEEE Transactions on Signal Processing,2000,48 (8) :2439 - 2551.
  • 7Dang P P, Chan P M. Image encryption for secure internet multimedia applications [ J ]. IEEE Transactions on Consumer Electronics, 2000,46 ( 3 ): 395 - 403.
  • 8Yen Jui-cheng, Guo Jiun-in. A new chaotic key-based design for image encryption and decryption [ A ].ISCAS2000-IEEE International Symposium on Circuits and Systems [ C ]. Geneva, Switzerland: IEEE ,2000.49 - 52.
  • 9Jessa M. Data encryption algorithms using one-dimensional chaotic maps [ A ]. ISCAS2000-IEEE International Symposium on Circuits and Systems [ C ]. Geneva, Switzerland: IEEE,2000.711 - 714.
  • 10Sobhy Mohamed I. Shehata, Alaa-El-Din [ J ]. International Journal of Bifurcation & Chaos in Applied Sciences& Engineering,2000,10(12) :2831 -2839.

共引文献128

同被引文献169

引证文献21

二级引证文献119

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部