期刊文献+

A fast image encryption algorithm based on only blocks in cipher text 被引量:2

A fast image encryption algorithm based on only blocks in cipher text
下载PDF
导出
摘要 In this paper, a fast image encryption algorithm is proposed, in which the shuffling and diffusion is performed simul- taneously. The cipher-text image is divided into blocks and each block has k x k pixels, while the pixels of the plain-text are scanned one by one. Four logistic maps are used to generate the encryption key stream and the new place in the cipher image of plain image pixels, including the row and column of the block which the pixel belongs to and the place where the pixel would be placed in the block. After encrypting each pixel, the initial conditions of logistic maps would be changed ac- cording to the encrypted pixel's value; after encrypting each row of plain image, the initial condition would also be changed by the skew tent map. At last, it is illustrated that this algorithm has a faster speed, big key space, and better properties in withstanding differential attacks, statistical analysis, known plaintext, and chosen plaintext attacks. In this paper, a fast image encryption algorithm is proposed, in which the shuffling and diffusion is performed simul- taneously. The cipher-text image is divided into blocks and each block has k x k pixels, while the pixels of the plain-text are scanned one by one. Four logistic maps are used to generate the encryption key stream and the new place in the cipher image of plain image pixels, including the row and column of the block which the pixel belongs to and the place where the pixel would be placed in the block. After encrypting each pixel, the initial conditions of logistic maps would be changed ac- cording to the encrypted pixel's value; after encrypting each row of plain image, the initial condition would also be changed by the skew tent map. At last, it is illustrated that this algorithm has a faster speed, big key space, and better properties in withstanding differential attacks, statistical analysis, known plaintext, and chosen plaintext attacks.
作者 王兴元 王倩
出处 《Chinese Physics B》 SCIE EI CAS CSCD 2014年第3期165-172,共8页 中国物理B(英文版)
基金 Project supported by the National Natural Science Foundation of China(Grant Nos.61370145,61173183,and 60973152) the Doctoral Program Foundation of Institution of Higher Education of China(Grant No.20070141014) the Program for Liaoning Excellent Talents in University,China(Grant No.LR2012003) the National Natural Science Foundation of Liaoning Province,China(Grant No.20082165) the Fundamental Research Funds for the Central Universities,China(Grant No.DUT12JB06)
关键词 image encryption shuffle and diffuse simultaneously block cipher logistic map image encryption, shuffle and diffuse simultaneously, block cipher, logistic map
  • 相关文献

参考文献23

  • 1Chen C S,Wang T,Kou Y Z,Chen X C and Li X X 2013 J.Syst.Softw.86 100.
  • 2Guo W,Hu J W and Wei G 2013 J.Comput.8 33.
  • 3Coppersmith D 1994 IBM J.Res.Dev.38 243.
  • 4Han S J,Oh H S and Park J 1996 Spread Spectrum Techniques and Applications Proceedings,September 22–25,1996,Mainz,Germany,p.1310.
  • 5Weidenmueller H A and Mitchell G E 2009 Rev.Mod.Phys.81 539.
  • 6Stollenwerk N,Aguiar M,Ballesteros S,Boto J,Kooi B and Mateus L 2011 Interface Focus 2 156.
  • 7Zhu Z L,Zhai K,Wang B L,Liu H J and Jiang H Y 2009 International Congress on Image and Signal Processing,October 17–19,2009,Tianjin,China,p.322.
  • 8Hegazi A S,Ahmed E and Matouk A E 2012 Commun.Nonlinear Sci.Numer.Simul.18 1193.
  • 9Lu L,Luan L,Meng L and Li C R 2012 Nonlinear Dyn.70 89.
  • 10Volos C K,Kyprianidis I M and Stouboulos I N 2013 Signal Process.93 1328.

同被引文献20

  • 1王兴元.混沌系统的同步及在保密通信中的应用[M].北京:科学出版社,2011.
  • 2Pareek N K,Patidar V,Sud K K.Image encryption using chaotic logistic map[J].Image and Vision Computing,2006,24(9):926-934.
  • 3Kanso A,Ghebleh M.A novel image encryption algorithm based on a 3D chaotic map[J].Commun Nonlinear Sci Numer Simulat,2012,17(7):2943-2959.
  • 4Adleman L M.Molecular computation of solutions to combinatorial problems[J].Science,1994,266(11):1021-1024.
  • 5Gehani A,LaBean T H,Reif J H.DNA-based cryptography[M].Cambridge:Springer,2000,2950:167-188.
  • 6Celland C T,Risca V,Bancroft C.Hiding messages in DNA microdots[J].Nature,1999,399(6736):533-534.
  • 7Zhang Q,Guo L,Wei X.Image encryption using DNA addition combining with chaotic maps[J].Mathematical and Computer Modelling,2010,52(11-12):2028-2035.
  • 8Liu H,Wang X,Kadir A.Image encryption using DNA complementary rule and chaotic maps[J].Applied Soft Computing,2012,12(5):1457-1466.
  • 9Wang Xingyuan.Synchronization of chaotic system and its application in secure communication[M].Beijing:Science Press,2011.
  • 10Wang Bin.Research and application of chaotic theory in image encryption[D].Dalian:Dalian University of Technology,2013.

引证文献2

二级引证文献23

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部