期刊文献+

基于优化耦合映像格子的比特级图像加密方法

Bit-Level Image Encryption Method Based on Optimized Coupled Map Lattice
下载PDF
导出
摘要 现有的比特级图像加密方法通常按照图像数据采集、图像数据分解、图像数据加密这3个相对独立的步骤进行设计,加密效率难以提高。为了在保证安全性的前提下解决这一问题,研究并改进了Logistic映射,提出一种优化Logistic映射。利用此映射进一步改善了耦合映像格子系统的混沌特性。此外,利用优化后的耦合映像格子和压缩感知技术设计了一种比特级数字图像加密方法,将现有比特级图像加密方法中3个相对独立的步骤合而为一,实现了在图像数据采集的同时即完成比特级的信息分解与加密。理论分析和仿真实验结果表明,该方法在保证安全性的同时提高了现有比特级图像加密系统的运行效率。 The existing bit-level image encryption methods are usually designed according to the three relatively independent steps of image data collection,data decomposition and encryption,which causes low efficiency.In order to solve this problem without compromising security,Logistic map was studied and then OLM(Optimized Logistic Map)was proposed to improve the performance of chaotic map as well as the corresponding CML(Coupled Map Lattice).Besides,a bit-level image encryption method was designed by applying OCML(Optimized Coupled Map Lattice)and CS(Compressive Sensing)technologies.It combines three independent steps in encryption methods,which helps to realize the decomposition and encryption of bit-level information during the measurement process.Theoretical analysis and simulation results reveal that the proposed method could improve the efficiency of existing bit-level image encryption system while ensuring security.
作者 沈骞 刘文波 祝勇俊 林毅 SHEN Qian;LIU Wen-bo;ZHU Yong-jun;LIN Yi(College of Automation Engineering,Nanjing University of Aeronautics and Astronautics,Nanjing 211106,China)
出处 《测控技术》 2020年第8期82-90,共9页 Measurement & Control Technology
基金 国家自然科学基金青年基金(31700478)。
关键词 信号处理 混沌 压缩感知 耦合映像格子 图像加密 signal processing chaos compressive sensing coupled map lattice image encryption
  • 相关文献

参考文献5

二级参考文献32

  • 1彭军,李学明,张伟,廖晓峰,Eiji Okamoto.基于耦合映像格子模型的时空混沌二值序列及其性能分析[J].计算机科学,2005,32(2):196-198. 被引量:16
  • 2刘英,孙丽莎.基于三维猫映射的图像加密算法[J].计算机工程与应用,2005,41(36):127-130. 被引量:10
  • 3刘建东,余有明.基于可变参数双向耦合映像系统的时空混沌Hash函数设计[J].物理学报,2007,56(3):1297-1304. 被引量:16
  • 4Matthews R.On the derivation of a 'chaotic' encryption algorithm[J].Cryptologia, 1989,8 ( 1 ) : 29-42.
  • 5Fridrich J.Symmetric ciphers based on two-dimensional chaotic maps[J].International Journal of Bifurcation and Chaos, 1998, 8 (6) : 1259-1284.
  • 6Baptista M S.Cryptography with chaos[J].Physics Letters A, 1998,240:50-54.
  • 7Wong Wai-kit,Lee Lap-piu,Wong Kwok-wo.A modified chaotic cryptographic method[J].Computer Physics Communications, 2001, 138 : 234-236.
  • 8Wong K W.A fast chaotic cryptographic scheme with dynamic look-up table[J].Physics Letters A, 2002,298 : 238-242.
  • 9Wong Kwok-Wo, Ho Sun-Wah, Yung Ching-Ki.A chaotic cryptography scheme for generating short ciphertext[J].Physics Letters A,2003,310:67-73.
  • 10Wang X Y, Yu Q.A block encryption algorithm based on dynamic sequences of multiple chaotic systems[J].Communications in Nonlinear Science and Numerical Simulation, 2009, 14 (2) :574-581.

共引文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部