期刊文献+

一种新的基于比特置乱的超混沌图像加密算法 被引量:14

A Novel Hyperchaotic Image Encryption Algorithm Based on Bit Scrambling
下载PDF
导出
摘要 提出了一种新的基于超混沌和比特替换的图像加密算法.算法所采用的混沌系统为Hyperhenon映射和Kent映射,而且在加密过程中引入了与图像本身特性密切相关的参数.首先是利用Kent映射所产生的一组混沌序列来对明文图像位置进行置乱;再通过Hyperhenon映射产生的混沌序列,结合该混沌序列的特性来对每个像素进行内部比特置乱和像素扩散,从而使明文图像达到更好地加密效果.实验仿真结果显示,新的加密算法既能较好地抵抗统计特性分析和差分攻击,又能有效抵抗选择明文(密文)攻击,还具有密钥空间大、加密效果好等优点. We propose a new chaotic image encryption algorithm based on hyperchaotic and bit substitution.The algorithm uses Hyperhenon map and Kent map,and makes the encryption process be related closely with the plaintext image's self characteristics.First,A chaotic sequence generated by Kent map is used to make image position global scrambling;Then,use Hyperhenon map to generate a chaotic sequence,and by using properties of the chaotic sequence to scramble internal bit of each pixel and pixel diffusion so that plain image information can be well hidden.The simulation results show that the algorithm can better resist statistical characterization,differential attack,and can effectively resist chosen plaintext(ciphertext)attacks,and have big key space,good encryption effect.
作者 谢国波 王添
出处 《微电子学与计算机》 CSCD 北大核心 2016年第7期28-32,38,共6页 Microelectronics & Computer
基金 广东省重大科技专项(2012A080103010) 广东省重点实验室建设专项(2011A091000046) 粤港关键领域重点突破项目(2012A080107007) 广东省科技计划项目(2012B060500071) 广东省自然科学基金(2014A030313512)
关键词 混沌系统 图像加密 比特 Kent映射 Hyperhenon映射 chaotic systems image encryption bit Kent map Hyperhenon map
  • 相关文献

参考文献10

  • 1Guan Z H, Huan W J. Chaos based image encryption algorithm[J]. Physics Letters A, 2005, 364 (1/3) : 153-157.
  • 2Wang X Y,Lei Y. A novel chaotic image encryption algo rithrn based on water wave drop diffusion models[J]. Op- tics Communications, 2012,285 (20) :4033-4042.
  • 3周蕊,于晓明,焦占亚.一种基于混沌序列的数字图像加密算法[J].微电子学与计算机,2010,27(12):62-64. 被引量:7
  • 4李玲,王伟男,李津杰,江进.基于Logistic映射和超混沌的自适应图像加密算法[J].微电子学与计算机,2012,29(1):42-46. 被引量:23
  • 5郑继明,高文正.彩色图像的混沌加密算法[J].计算机工程与设计,2011,32(9):2934-2937. 被引量:7
  • 6Zhu Z L, Zhang W, Kwok-Wo W. A chaos based sym- metric image encryption scheme using a bit-level per- mutavion[J]. Information Sciences, 2011, 181 (6) 1171-1186.
  • 7Zhu C X, Liao C L,Deng X H. Breaking and improving an image encryption scheme based on total shuffling scheme[J].Nonlinear Dynamics, 2013,71 ( 1/2) :25-34.
  • 8Teng L,Wang X Y. A hit-level image encryption algo- rithm based on water wave motion and water drop dif fusion models [J]. Optics Communications, 2012, 285 (20) : 4048-4054.
  • 9Liao X F, Lai S Y, Zhou Q. A novel image encryption algorithm based on self-adaptive wave transmission [J]. Signal Processing, 2010,90 (9) : 2714-2722.
  • 10Kanso A, Ghebleh M. A novel image encryption algo- rithm based on a 3D chaotic map[J]. Communications in Nonlinear Science and Numerical Simulation, 2012, 17(4) :2943-2959.

二级参考文献27

  • 1焦占亚,胡予濮.一种密钥的设计和管理方法[J].微电子学与计算机,2004,21(10):158-160. 被引量:2
  • 2李小鹏,周平.一类二维离散混沌系统在不同系统参数下的自适应混沌同步[J].重庆邮电学院学报(自然科学版),2005,17(1):102-104. 被引量:5
  • 3Pareek N K, Vinod Patidar, Sud K K. Image encryption using chaotic logistic map [J]. Image and Vision Computing, 2006,24 (9):926-934.
  • 4Chen Wei-bin,Zhang Xin.Image encryption algorithm based on Henon chaotic system[C].IASP2009.Taizhou:IEEE Press,2009: 94-97.
  • 5Peng Jun,Jin Shang-zhu, Chen Guo-rong,et al.An image encryption scheme based on chaotic map [C]. ICNC'08. Jinan: IEEE Press,2008:595-599.
  • 6Yu Hong-lei, Wu Guang-shou. The compounded chaotic sequence research in image encryption algorithm[C]. 2009 WRI global congress on intelligent system.Xiamen:IEEE Press,2009: 252-256.
  • 7Musheer Ahmad, Chanki Gupta, Ankit Varshney. Digital image encryption based on chaotic map for secure transmission [C]. Multimedia, Signal Processing and Communication Technologies.Aligarh:IEEE Press,2009:292-295.
  • 8Sabery K M,Yaghoobi M.A new approach for image encryption using chaotic logistic map[C]. International Conference on Advanced Computer Theory and Engineering.Phuket:IEEE Press, 2008:585-590.
  • 9Gao T G, Chen Z Q. A new image encryption algorithm based on hyper-chaos [J]. Physics Letters A, 2008, 372(4): 394-400.
  • 10Pareek N K, Patidar V, Sud V V. Image encryption using chaotic logistic map [J]. Image and Vision Computing,2006,24 (9) :926-934.

共引文献33

同被引文献111

引证文献14

二级引证文献78

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部