期刊文献+

基于DNA编码的安全高效的图像加密算法 被引量:5

A SECURE AND EFFICIENT IMAGE ENCRYPTION ALGORITHM BASED ON DNA CODING
下载PDF
导出
摘要 提出一种基于DNA随机编码与随机运算结合混沌映射的图像加密算法。由图像的SHA-256的哈希值来生成算法所需要的密钥,将Lorenz和Logistic混沌映射作为密钥发生器,产生所有的初始参数。采用Lorenz混沌映射对图像的像素值进行置换以及生成随机DNA掩码;为了增强随机性以及克服有限的DNA运算规则,通过Logistic映射随机决定的8种DNA编码中的1种对图像逐行进行编码;提出DNA同或运算,进而使编码图像与DNA随机掩码逐行进行Logistic映射随机决定的4种DNA运算中的一种;对运算后的编码图像进行随机解码,得到最终加密图像。仿真结果表明,提出的算法能够抵制各种典型的攻击,具有很强的安全性。 In this paper, an image encryption algorithm based on DNA random coding and random operation combined with chaotic map is proposed. SHA-256 hash of the plain image is used to generate secret keys and Lorenz Map and Logistic Map are applied to generate all parameters the presented algorithm needs. Lorenz chaotic map is exploited to permute the pixels of color components; R, G and B, at the same time generate random DNA masks. In order to get the high randomness and overcome the limitations of DNA computing rules, encode the plain image with DNA rules by rows respectively and different rows are encoded according to eight rules selected by logistic map; Then, employ encoded plain image to conduct DNA operations with encoded DNA masks row by row to obtain an intermediate image and the one of the four DNA operations including proposed DNA XNOR operation executed every row randomly is chosen by logistic map; Finally, randomly decode the intermediate image to get the ultimate cipher image. Simulated experimental results indicated that the proposed algorithm was capable of withstanding typical attacks and had good character of security.
出处 《计算机应用与软件》 北大核心 2018年第1期318-324,共7页 Computer Applications and Software
关键词 Lorenz混沌映射 LOGISTIC混沌映射 DNA编码 SHA-256 Lorenz chaotic map Logistic chaotic map DNA coding SHA-256
  • 相关文献

参考文献2

二级参考文献35

  • 1朱从旭,胡玉平.基于超混沌系统伪随机序列的图像加密算法[J].华中科技大学学报(自然科学版),2012,40(S1):337-341. 被引量:5
  • 2廖晓峰,肖迪,陈勇,等.混沌密码学原理及应用[M].北京:科学出版社,2009.
  • 3罗玉玲,杜明辉.混沌图像编码加密及Hash函数构造研究[D].广州:华南理工大学,2013:11-26.
  • 4FRIDRICH I.Symmetric ciphers based on two-dimensional chaotic maps[J].International Journal of Bifurcation and Chaos,1998,8(6):1259-1284.
  • 5BAOL,ZHOUYQ,CHENCLP,etal.A new chaotic system for image encryption[C]// Proceedings of the 2012 IEEE International Conference on System Science and Engineering.Washington,DC:IEEE Computer Society,2012:69-73.
  • 6AKHAVANA A,SAMSUDINA A,AKHSHANI A.A symmetric image encryption scheme based on combination of nonlinear chaotic maps[J].Journal of the Franklin Institute,2011,348 (6):1797-1813.
  • 7ZHANG G J,LIU Q.A novel image encryption method based on total shuffling scheme[J].Optics Communications,2011,284(12):2775-2780.
  • 8ESLAMI Z,BAKHSHANDEH A.An improvement over an image encryption method based on total shuffling[J].Optics Communications,2013,286(1):51-55.
  • 9TONG X,CUI M.A novel image encryption scheme based on feedback and 3D baker[C]//Proceedings of the 4th IEEE International Conference on Wireless Communications,Networking and Mobile Computing.Washington,DC:IEEE Computer Society,2008:1-4.
  • 10Chen Guanrong,Mao Yaobing,Chui C K.A symmetric image encryption scheme based on 3D chaotic cat map[J].Chaos,Solitons and Fractals,2004,21(3):749-761.

共引文献53

同被引文献42

引证文献5

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部