期刊文献+

基于信息隐藏的混沌JPEG图像加密算法 被引量:6

Chaotic Image Encryption Algorithm Based on Information Hiding
下载PDF
导出
摘要 结合图像数据冗余性特点和图像压缩过程给出一种JPEG图像加密算法。在加密过程中:一方面结合压缩方法的特性,构造了加密算法,使得加密尽量不影响压缩;另一方面引入128bit的随机数,每次加密该随机数均不同。加密完成后,将该随机数嵌入到加密后图像的最低有效位后得到最终的密文图像。实验和分析表明该算法具有较好的安全性。此外,虽然加密过程导致图像DCT系数的损失,但并不影响解密后图像的视觉效果。 A chaotic image encryption algorithm based on information hiding is proposed by combi- ning the redundancy of image data and the idea of information hiding. The sub-key is generated by the user key and a 128bit random number, making the sub-key different for every encryption proce- dure. Hence, the encryption algorithm is resistant to both chosen plain-text attack and chosen ci- pher-text attack. In addition, the random number used in eneryption is embedded in the image by information hiding technique, so that receivers do not need a related random number generator to re- cover the key. Experimental results show that the algorithm is more secure.
机构地区 信息工程大学
出处 《信息工程大学学报》 2014年第2期148-155,共8页 Journal of Information Engineering University
关键词 四维混沌系统 图像加密 冗余性 4D chaotic system image encryption redundancy
  • 相关文献

参考文献13

  • 1Lian S G, Sun J S, Wang Z Q. Security analysis of a chaos-based image encryption algorithm [ J . Physica A : Statistical and Theoretical Physics, 2005, 351 (2-4): 645-661.
  • 2廉士国,王执铨.Standard映射及其三维扩展在多媒体加密中的应用[J].东南大学学报(自然科学版),2003,33(z1):90-94. 被引量:5
  • 3Lakhani G. Modified JPEG Huffman Coding[ J ]. IEEE Trans. Image Processing, 2003, 12 (2) : 159-169.
  • 4Chen G, Mao Y B, Chui C K. A symmetric image encryption scheme based on 3D chaotic cat maps[J]. Chaos, Solitons & Fractals ,2004, 21 (3) :749-761.
  • 5Wang K, Pei W J, Zou L H. On the security of 3D catmap based symmetric image encryption scheme[ J]. Physics Letters A, 2005, 343 : 432- 439.
  • 6Guan Z H, Huang F J, Guan W J. Chaos-based image encryption algorithm[J]. Phys. Lett. A, 2005,346:153-157.
  • 7Zhang L H, Liao X F, Wang X B. An image encryption approach based on chaotic maps [ J]. Chaos, Solitons & Fractals, 2005,24 ( 3 ) : 759-765.
  • 8Lian S G, Sun J, Wang Z. A block cipher based on a suitable use of chaotic standard map[ J ]. Chaos, Solitons & Fractals, 2005,26( 1 ) :117-129.
  • 9Bernie Sin-Hung Kwok, Ching-Hung Yuen. An efficient diffusion approach for chaos-based image encryption [ J]. Chaos, Solitons and Fractals, 2009,41 (5):2652-2663.
  • 10Wong K W, BS-H. Kwok, W S Law. A fast image encryption scheme based on chaotic standard map[ J]. Physics Letters A, 2008, 372( 15 ) :2645-2652.

二级参考文献10

  • 1[1]Wu C W, Rul'kov N F. Studying chaos via 1-D maps - a tutorial [J]. IEEE Trans on Circuits and SystemsI: Fundamental Theory and Applications, 1993, 40(10):707-721.
  • 2[2]Habutsu T, Nishio Y, Sasase I, et al. A secret key cryp-tosystem by iterating chaotic map [J]. Lect Notes Comput Sci, 1991, 547:127-140.
  • 3[3]Tsueike M, Ueta T, Nishio Y. An application of two-dimensional chaos cryptosystem [R]. Tech Rep of IEICE, NLP96-19, May 1996. (in Japanese)
  • 4[4]Naoki Masuda, Kazuyuki Aihara. Cryptosystems with discretized chaotic maps [J]. IEEE Trans on Circuits and SystemsI: Fundamental Theory and Applications, 2002, 49(1):28-40.
  • 5[5]Scharinger J. Kolmogorov systems: internal time, irreversibity and cryptographic applications [A]. In: Dubois D, ed. Proceedings of the AIP Conference on Computing Anticipatory Systems [C].In: Woodbury, NY: Amer Inst of Phys, 1998. 437.
  • 6[6]Pichler F, Scharinger J. Finite dimensional generalized Baker dynamical systems for cryptographic applications [J]. Lect Notes in Comput Sci, 1996, 1030: 465-476.
  • 7[7]Pichler F, Scharinger J. Efficient image encryption based on chaotic maps [M]. Johannes Kepler University, Linz, Austria, preprint, 1996.
  • 8[8]Fridrich J. Symmetric ciphers based on two-dimensional chaotic maps [J]. Int J Bifurcation and Chaos, 1998,8(6):1259-1284.
  • 9[9]Jackson E A. Perspectives in nonlinear dynamics [M]. Cambridge:Cambridge University Press, 1991.
  • 10[10]Shannon C. Communication theory of secrecy systems [J]. Bell System Technical Journal, 1949, 28: 656-715.

共引文献4

同被引文献29

引证文献6

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部