期刊文献+

基于混沌Hopfield神经网络视觉意义的图像加密算法 被引量:2

Visually meaningful image encryption algorithm based on chaotic Hopfield neural network
下载PDF
导出
摘要 为解决传统加密方案得到的类噪声图像在传输过程中常常会因其视觉效果而受到攻击的问题,提出一种基于混沌Hopfield神经网络的具有视觉意义的双图像加密算法。对混沌Hopfield神经网络迭代生成随机数矩阵,与两幅压缩后的明文图像组合后进行离散余弦变换。通过生命游戏算法生成置乱矩阵来进行置乱。将置乱后的图像分为三部分,通过逆离散余弦变换分别嵌入到彩色载体图像的R、G、B分量中。实验结果表明,该算法密钥空间足够大,传输效率高,密钥敏感性强,能够抵御各种攻击,具有较好的安全性。 To solve the problem that noisy-like images obtained by traditional image encryption algorithms are usually attacked during transmission because of their visual effects,a visually meaningful double image encryption algorithm based on chaotic Hopfield neural network was proposed.The chaotic Hopfield neural network was iterated to generate a random number matrix.The matrix was combined with two compressed plain images and DCT transform was performed.The game of life algorithm was deployed to generate a matrix for permutation.The image was divided into three parts,and embedded into the R、G、B components of a color image by inverse DCT transform,separately.The results show that the key space of the proposed algorithm is big enough,and it has a great transmission efficiency,and is very sensitive to secret keys,as well as a great resistance to various attacks,thus it has a better security.
作者 关一凡 刘立东 蒋东华 荣宪伟 GUAN Yifan;LIU Lidong;JIANG Donghua;RONG Xianwei(School of Information Engineering,Chang’an University,Xi’an 710064,China;School of Physics and Electronic Engineering,Harbin Normal University,Harbin 150025,China)
出处 《电子设计工程》 2022年第7期144-149,共6页 Electronic Design Engineering
基金 国家自然科学基金(61701043)。
关键词 混沌Hopfield神经网络 HASH函数 生命游戏算法 离散余弦变换 图像嵌入 chaotic Hopfield neural network Hash function game of life algorithm DCT transform image embedding
  • 相关文献

参考文献6

二级参考文献45

  • 1蒋本铁,刘嘉辉,徐彬.一种基于混沌和Fibonacci伪随机数列的加密方法[J].东北大学学报(自然科学版),2005,26(9):864-866. 被引量:10
  • 2Wien Hong, Tung-Shou Chen, Han-Yan Wu. An improved reversible data hiding in encrypted images using side match [J]. IEEE Signal Processing Letters, 2012, 19 (4): 199-202.
  • 3Cox IJ, Miller L, Bloon A, et al. Digital watermarking and steganograpphy [ M ]. 2nd ed. SanMateo, CA: Morgan Kaufmann, 2008: 1-13.
  • 4Luo Weiqi, Wang Yuangen, Huang Jiwu. Security analysis on spatial 1 steganography for jpeg decompressed images [J]. IEEE Signal Processing Letters, 2011, 18 (1): 39-42.
  • 5Zhang WM, Li SQ. A coding problem in steganography [J].Designs, Code and Cryptography, 2008, 46 (1): 67-81.
  • 6Fridrich J, Lisonek P. Grid coloring in steganography [J]. IEEE Transactions on Information Theory, 2007, 53 ( 4 ) : 1547-1549.
  • 7Li Fan, Gao Tiegang, Yan Qunting, et al. An extend matrix encoding algorithm for steganography of high embedding effi- ciency [J]. Computers and Electrical Engineering, 2011, 37 (1) : 973-981.
  • 8Qu Zhiguo, Fu Yu, Niu Xinxin, et al. Improved EMD steganography with great embedding rate and high embedding efficiency [C] //Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2009: 348-352.
  • 9Yao Xiaoming, Du Wencai, Wu Weihua. A robust EMD-like stegnographie sehrne [C] //Third International Symposium on Intelligent Information Technology and Security Informatics, 2010: 134-137.
  • 10Babu KS, Raja KB, Rao KUM, et al. Robust and high ca- pacity image steganography using SVD [C] //IET-UK Inter- national Conference on Information and Communication Tech- nology in Electrical Sciences, 2007: 718-723.

共引文献21

同被引文献17

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部