期刊文献+

基于混沌理论的位变换图像加密算法 被引量:4

A bit transformation image encryption algorithm based on chaotic map
下载PDF
导出
摘要 为提高图像加密的安全性和加密速度,提出一种基于混沌理论的图像位平面的加密方法,同步地对每个像素点进行加密,在位平面上对行和列分别进行变换,并依靠混沌映射的初值敏感性来增加算法的随机性,保证加密的安全性,从而达到安全加密的目的。利用三维混沌映射的三个随机,将图像进行一维与二维、行与列的多次转化,达到彻底打乱图像的目的。仿真实验结果表明,该方法的加密效果理想,密钥量大,具有极高的安全性,并且加密速度也很快,对256×256的灰度图像,加密速度不超过0.1s,同时可以抵抗相关性分析及灰度直方图分析。 To improve the safety and speed of image encryption, a bit-shift image encryption algorithm based on chaotic map was proposed. Every pixel point could be encrypted synchronously, and the image was encrypted based on bit-shift operation in row and column. The random of algorithm was improved depending on initial value sensitivity of chaotic map, and the safety was guaranteed. Using three random sequence from three-dimensions chaotic map, the image was changed many times from one-dimension and two-dimensions, and row and column. This method can thoroughly disturb the image. Experimental results show that the algorithm was rapid, big key and secure. For a 256 × 256 image, the encryption time is less than 0.1 second. Application of this method could not only break the relation between each pixel but also resist the analysis of gray level histogram.
出处 《电机与控制学报》 EI CSCD 北大核心 2013年第10期97-100,108,共5页 Electric Machines and Control
关键词 图像加密 Amold CAT映射 混沌映射 快速加密 image encryption Arnold cat map chaotic map rapid encryption
  • 相关文献

参考文献15

  • 1VINOD Patidar. A robust and secure chaotic standard map based pseudorandom permutation-substitution scheme for image encryption[J].{H}Optics communication,2011,(19):4331-4339.
  • 2ARROYO David. Comment on Image encryption with chaotically coupled chaotic maps[J].Physica,2010,(12):1002-1006.
  • 3LU J,CHEN G. A new chaotic attractor coined[J].Bifurcation and Chaos,2002,(10):659-661.doi:10.1142/S0218127402004620.
  • 4KWOK H S,WALLACE K S. A fast image encryption system based on chaotic maps with finite precision representation[J].{H}Chaos Solitons and Fractals,2007,(04):1518-1529.doi:10.1016/j.chaos.2005.11.090.
  • 5LU J,CHEN G. A new chaotic attractor coined[J].Bifurcation and Chaos,2002,(03):659-661.doi:10.1142/S0218127402004620.
  • 6BANERJEE S. Synchronization of spatiotemporal semiconductor lasers and its application in color image encryption[J].{H}Optics communication,2011,(09):234-236.
  • 7JOHN Fredy Barrera. Experimental opto-digital synthesis of encrypted sub-samples of an image to improve its decoded quality[J].{H}Optics communication,2011,(19):454-459.
  • 8LI Jun. Double-image encryption on joint transform correlator using two-step-only quadrature phase-shifting digital holography Original Research Article[J].{H}Optics communication,2011,(19):787-793.
  • 9LI Jun. Image encryption with two-step-only quadrature phase-shifting digital holography original research article[J].Optik-International Journal for Light and Electron Optics,2011,(20):987-993.
  • 10ABBAS Cheddad. A hash-based image encryption algorithm[J].{H}Optics communication,2010,(06):588-593.

二级参考文献5

共引文献38

同被引文献42

  • 1王兴元,王明军.超混沌Lorenz系统[J].物理学报,2007,56(9):5136-5141. 被引量:87
  • 2禹思敏.混沌系统与混沌电路[M].西安:西安电子科技大学出版社,2011.
  • 3Matthews R.On the derivation of a "chaotic" encryption algorithm[J].Cryptologia,1989,13 (1):29-42.
  • 4Fridrich J.Symmetric ciphers based on two-dimensional chaotic maps[J].International Journal of Bifurcation and Chaos,1998,8(6):1259-1284.
  • 5Yen J C,Guo J I.A new chaotic key-based design for image encryption and decryption[C]//Proceedings of IEEE International Symposium on Circuits and Systems,May 28-31,2000,Geneva.New York:IEEE Xplore,2000:49-52.
  • 6Dachselt F,Schwarz W.Chaos and cryptography[J].IEEE Transactions on Circuits and Systems Ⅰ:Fundamental Theory and Applications,2001,48(12):1498-1509.
  • 7FU C, MENG W, ZHAN Y, et al. An efficient and secure medical image protection scheme based on chaotic maps [J]. Computers in Biology and Medicine, 2013, 43(8) : 1000 - 1010.
  • 8ZHANG Y, XIAO D, SHU Y, et al. A novel image encryption scheme based on a linear hyperbolic chaotic system of partial differ- ential equations [ J]. Signal Processing: Image Communication, 2013, 28(3): 292-300.
  • 9ZHU H, ZHAO C, ZHANG X. A novel image encryption-compres- sion scheme using hyper-chaos and Chinese remainder theorem [ J]. Signal Processing: Image Communication, 2013, 28(6): 670-680.
  • 10KONDAKCI S.Analysis of Information Security Reliability:A Tu- torial[J].Reliability Engineering & System Safety,2015,133:275-299.

引证文献4

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部