期刊文献+

基于量子密钥分发和像素置乱的图像加密方法研究

Research on image encryption method based on quantum key distribution and pixel scrambling
下载PDF
导出
摘要 鉴于当前经典图像加密算法的局限性及量子密钥分发协议无条件安全的特性,提出一种基于量子密钥分发和像素置乱的图像加密方法。首先通信双方产生量子密钥序列,然后将密钥序列转换成与要加密的图像对应的像素矩阵,将该像素矩阵与对应的图像的像素矩阵元素按位进行异或运算,再利用下一量子密钥序列生成像素置乱矩阵,对图像像素进行置乱变换,最终完成加密。解密方用与发送方相反的方法进行像素位置复原,再利用密钥矩阵进行异或运算即可解密。该算法所有密钥均采用量子密钥分发协议产生,安全性高,实现简单,经实验仿真证明,加密后的图像直方图呈均匀分布,像素相关性非常弱,像素变化率和信息熵高。 In view of the limitations of current classical image encryption algorithms and the unconditional security of quantum key distribution protocol,an image encryption method based on quantum key distribution and pixel scrambling is proposed.Firstly,the communication parties generate the quantum key sequence,then convert the key sequence into the pixel matrix corresponding to the image to be encrypted,perform XOR operation between the pixel matrix and the pixel matrix elements of the corresponding image bit by bit,and then use the next quantum key sequence to generate the pixel scrambling matrix,scrambling and transforming the image pixels,and finally complete the encryption.The decryptor restores the pixel position in the opposite way to the sender,and then decrypts it by XOR operation using the key matrix.All keys of the algorithm are generated by quantum key distribution protocol,which has high security and simple implementation.Experimental simulation shows that the encrypted image histogram is evenly distributed,the pixel correlation is very weak,and the pixel change rate and information entropy are high.
作者 黄红梅 HUANG Hongmei(School of information engineering,Armed Police Force Engineering University,Xi’an 710068,China)
出处 《激光杂志》 CAS 北大核心 2023年第1期96-102,共7页 Laser Journal
基金 陕西省自然科学基金(No.2020JM-361) 武警工程大学基础研究基金项目(No.WJY202003)。
关键词 图像加密 量子密钥分发 BB84协议 像素置乱 image encryption quantum key distribution BB84 protocol pixels scrambling
  • 相关文献

参考文献9

二级参考文献58

  • 1陶然,邓兵,王越.分数阶FOURIER变换在信号处理领域的研究进展[J].中国科学(E辑),2006,36(2):113-136. 被引量:80
  • 2王沛,姚恒,李莉.结合图像空间域和小波域特性的自适应盲水印算法[J].光学精密工程,2006,14(6):1057-1062. 被引量:12
  • 3Wang P Z,Gao H X,Cheng M T,et al.A new image encryption algorithm based on hyperchaotic mapping[C] //Preceedings of the IEEE International Conference on Computer,Application & System Modeling.Taiyuan,2010:428-432.
  • 4Sun F Y,Liu S T,Li Z Q,et al.A novel image encryption scheme based on spatial chaos map[J] .Chaos Solitions & Fractals,2008,38(3):631-640.
  • 5Bennett C H,Brassard G.Quantum cryptography:public key distribution and coin tossing[C] //Preceedings of the IEEE International Conference on Computers,Systems & Signal Processing.Bangnlore,India,1984:175-179.
  • 6Bruss D.Optimal eavesdropping in quantum cryptography with six states[J] .Phys Rev Lett,1998,2(81):3018-3021.
  • 7Sun B L,Hao S F,Zhang X,et al.An improved method of quantum key distribution protocol[C] //Preceedings of the IEEE Intemational Forum on Computer Science-Technology and Applications.Chongqing,China,2009:115-117.
  • 8Sharma R D,De A.A new secure model for quantum key distribution protocol[C] ∥Preceedings of the IEEE International Conference on Industrial and Information Systems.Kandy,2011:462-466.
  • 9Hoi-Kwong L,Chau H F,Ardehali M.Efficient quantum key distribution scheme and proof of its unconditional security[J] .J of Cryptology,2005,3(18):133-165.
  • 10Kartheek D N,Reddy P V,Amamath G.Security in quantum computing using quantum key distribution protocols[C] //Preceedings of the IEEE International Multi-conference on Automation,Computing,Communication,Control and Compressed Sensing.Kottayam,2013:19-25.

共引文献46

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部