期刊文献+

基于虹膜特征的密钥生成和AES算法的图像加密

Image Encryption Research Based on Keys Generated by Iris Feature and AES Algorithm
下载PDF
导出
摘要 针对传统加密算法密钥长、记忆困难、不易安全持有等特点,提出虹膜特征密钥提取和AES加密算法相结合的图像加密算法.该算法利用db2小波分解的虹膜区域,提取第三层的虹膜关键特征高频系数,通过使用随机映射函数生成一个192位的密钥.随后将该算法与经典的Arnold算法的同时应用于图像加密实验.实验结果表明,利用该算法得到的加密图像的安全性更高. The encryption algorithm has disadvantages like the long key making memory difficult and uneasy safekeeping,which causes a potential threat to the information security.Based on the combination of iris feature key extraction and AES encryption algorithm,this paper proposes an image encryption algorithm,The algorithm uses DB2 wavelet decomposition of the iris region,extracting the third layer of the iris key features of high frequency coefficients,through the use of random mapping function to generate a 192 bit key.The algorithm and the classical Arnold algorithm are applied to image encryption experiments at the same time.Experimental results show that the security of the encrypted image is higher by using the algorithm.
作者 解瑞云 海本斋 XIE Ruiyun HAI Benzhai(Computer Science and Technology Department, H enan Institute of Technology, Xinxiang 453000, China College of Computer and Information Technology, Henan Normal University,Xinxiang 453007, China)
出处 《河南师范大学学报(自然科学版)》 CAS 北大核心 2016年第5期163-168,共6页 Journal of Henan Normal University(Natural Science Edition)
基金 国家自然科学基金(U1404602) 河南省高等学校重点科研项目(15B520006) 河南省科技攻关重点项目(162102310442) 河南师范大学青年科学基金(2014QK30)
关键词 虹膜特征 小波变换 AES 图像加密 iris feature wavelet transform AES image encryption
  • 相关文献

参考文献2

二级参考文献11

  • 1Courtois L G N.An algebraic masking method to protect AES against power attacks[EB/OL].(2005).http://eprint.iacr.org/2005.
  • 2Cid C,Leurent G.An analysis of the XSL algorithm[C] //Roy B.Lecture Notes in Computer Science 3788:Advances in Cryptology-ASIACRYPT 2005.Berlin:Springer-Verlag,2005:333-352.
  • 3Ars G,Fangere J C,Imai H,et al.Comparison between XL and Grobner basis algorithms[C] //Lecture Notes in Computer Science 3329:Advances in Cryptology-ASIACRYPT 2004.Berlin:Springer-Verlng,2004:338-353.
  • 4Daemen V R J.AES and the wide trail design strategy[C] //Eurocrypt 2002.Berlin:Springer-Verlag,2002:108-109.
  • 5John Dangman, The Importance of Being Random: Statistical Principles of Iris Recognition[ M]. Pattern Recognition. 1-13.
  • 6Libor Masek. Recognition of Human Iris Patterns for Biometric Identification [EB/OL]. http://www.csse. uwa. edu. au/- pk/studentprojects/libor, 2003.
  • 7R P Wildes. Iris Recognition: An Emerging Biometric Technology[J]. Proceeding of IEEE, 1997, 85(9):1348-1363.
  • 8W W Boles, B Boashasho A Human Identification Technique Using Images of the Iris and Wavelet Transform [J]. IEEE Transactions on Signal Processing, 1998,46 (4) : 1185-1188.
  • 9中国科学院自动化研究所.CASIA虹膜图像数据库(v1.0)[EB/OL].http://www.sinobiometrics.com,.
  • 10John Dangman. High Confidence Visual Recognition of Person by a Test of Statistical Independence[J]. IEEE Trans. Pattern Anal. Machine Intelligence, 1993, 15 (11): 1148-1161.

共引文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部