期刊文献+

基于二维Logistic映射和二次剩余的图像加密算法 被引量:12

A Novel Image Encryption Scheme with 2D-Logistic Map and Quadratic Residue
下载PDF
导出
摘要 针对公共网络中数字图像的安全传播问题,提出了一种基于二维Logistic混沌映射和二次剩余的图像加密算法.该加密算法利用二维Logistic映射的优良随机性,对明文图像进行2次置乱,极大地改变了图像像素位置.然后把置乱图像展开成二进制序列,按照8位一组进行分块,再利用二次剩余密码体制对每个分块进行加密,有效地改变了明文图像的信息.最后,对该算法进行直方图分析、信息熵分析、密钥敏感性分析以及明文图像和密文图像的相关系数分析等仿真实验.实验表明该算法能抵抗统计攻击、信息熵攻击,是一种较安全的图像通信方式. Considering the importance of image transmission in the public net, a new image encryption algorithm was proposed based on the 2D-Logistic chaos and quadratic residue. Firstly, the original image was shuffled twice with the 2D-Logistic chaos map, and the positions of the original image were changed sufficiently. Then, the shuffled image was turned into a binary sequence, and every 8 bits were called a block. For each block, quadratic residue was applied to encrypt the block, then, the encrypted binary sequence was turned into the encrypted image. Therefore, the statistical information of plain image was changed drastically by the proposed scheme. The proposed image scheme was tested by various types of experiment and security analyses such as histogram analysis, information entropy, key sensitivity and correlation coefficient analysis. All these analyses demonstrated that the proposed scheme can resist statistical attack, information entropy attack, and it is very proper for secure image communication.
机构地区 东北大学理学院
出处 《东北大学学报(自然科学版)》 EI CAS CSCD 北大核心 2014年第1期20-23,共4页 Journal of Northeastern University(Natural Science)
基金 国家自然科学基金资助项目(61202085) 辽宁省自然科学基金资助项目(201202074)
关键词 图像加密 图像置乱 图像扩散 二维LOGISTIC映射 二次剩余 image encryption image permutation image diffusion 2D-Logistic map quadratic residue
  • 相关文献

参考文献10

  • 1Smaoui N,Kanso A. Cryptography with chaos and shadowing[J].Chaos Solitons &Fractals,2009,(04):2312-2321.
  • 2Behnia S,Akhshani A,Akhavan A. Applications of tripled chaotic maps in cryptography[J].Chaos Solitons &Fractals,2009,(01):505-519.
  • 3Baptista M S. Cryptography with chaos[J].{H}Physics Letters A,1998,(1/2):50-54.doi:10.1016/S0375-9601(98)00086-3.
  • 4Amigo J M,Kocarev L,Szczepanski J. Theory and practice of chaotic cryptography[J].{H}Physics Letters A,2007,(03):211-216.doi:10.1016/j.physleta.2007.02.021.
  • 5ZhuZL,Zhang W,Wong K W. A chaos-based symmetric image encryption scheme using a bit-level permutation[J].{H}Information Sciences,2011,(06):1171-1186.
  • 6Ye R. A novel chaos-based image encryption scheme with an efficient permutation-diffusion mechanism[J].{H}Optics communication,2011,(22):5290-5298.
  • 7Ye G. Image scrambling encryption algorithm of pixel bit based on chaos map[J].{H}Pattern Recognition Letters,2010,(05):347-354.
  • 8Zhu H G,Zhao C,Zhang X D. A novel image encryptioncompression scheme using hyper-chaos and Chinese remainder theorem[J].{H}Signal Processing:Image Communication,2013,(06):670-680.
  • 9Tong X J. The novel bilateral-diffusion image encryption algorithm with dynamical compound chaos[J].{H}JOURNAL OF SYSTEMS AND SOFTWARE,2012,(04):850-858.
  • 10May R M. Simple mathematical models with very compficated dynamics[J].{H}NATURE,1976,(10):459-467.

同被引文献109

  • 1赵玉新,李刚,李磊.基于混沌流密码体制的电子海图数据加密方法[J].哈尔滨工程大学学报,2007,28(1):60-64. 被引量:7
  • 2黎娅,徐江峰.基于混沌的图像加密技术进展[J].河南师范大学学报(自然科学版),2005,33(3):150-151. 被引量:10
  • 3郑晓鸣,吕士颖,王晓东.免疫接种粒子群的聚类算法[J].电子科技大学学报,2007,36(6):1264-1267. 被引量:10
  • 4Pei Q. Q., Wang X., Li Y., et al. Adaptive watermarking with improved embedding capacity [ J ]. Systems and Software, 2013, 86( 11 ) : 2841 -2848.
  • 5Zebbiche K., Khelifi F.. Efficient wavelet-based reversible Journal of perceptual watermark masking for robust fingerprint image watermarking [ J ]. IET Image Processing, 2014, 8( 1 ) : 23 -32.
  • 6Wang S. , Sun W. , Guo Y. N. , et al.. Design and analysis of fast image encryption algorithm based on multiple chaotic systems in real-time security car[ J]. International Journal of Security and its Applications, 2013, 7(6): 229-240.
  • 7Pareek N K,Patidar V,Sud K K.Image encryption using chaotic logistic map[J].Image and Vision Computing,2006,24:926-934.
  • 8Robert M May.Simple mathematical models with very complicated dynamics[J].Nature,1976,261:459-467.
  • 9Ye G, Wong KW. An efficient chaotic image encryption algo- rithm based on a generalized Arnold map[J]. Nonlinear Dy namics, 2012. 69 (4): 2079-2087.
  • 10Wang Y, Wong KW, Liao X. et al. A chaos-based image en- eryption algorithm with variable control parameters [J ]. Chaos, Solitons & Fractals, 2009, 41 (4): 1773-1783.

引证文献12

二级引证文献51

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部