期刊文献+

基于耦合触发细胞自动机的图像加密算法 被引量:8

Image Encryption Algorithm Based on Coupled Toggle Cellular Automata
在线阅读 下载PDF
导出
摘要 提出了一种基于一维触发细胞自动机的图像加密技术。根据图像文件类型的特点,在加密前对图像进行了简单的预处理,将每个像素点的信息分割成两部分;相应地,密钥也被分成两部分,从而将原始图像信息分成两部分并加密。本加密系统采用的是对称耦合式的触发细胞自动机结构,一方面,加密算法和解密算法可以共享该结构,从而降低了硬件的实现代价;另一方面,基于此结构,对加密后的信息进行了密钥共享和分存,确保只有在同时获得一对密文时才能正确解密。触发细胞自动机的反转规则由子密钥流和图像信息本身共同决定,而且在细胞状态迭代的过程中能自适应地进行调整。密钥空间,即反转规则表,随着细胞自动机邻居半径增大呈指数增长,所以可以根据不同的安全性要求,通过增加细胞自动机的邻居半径来实现。仿真实验证实了该算法的有效性,并得到了较好的加密效果。 A novel image encryption algorithm, which is based on one dimension cellular automata (1-D CA), was proposed. Before encryption, unlike other algorithms, a simple pretreatment was adopted to conceal visual information of original image, which was separated into two parts according to its information characteristic. These two parts were encrypted parallelly. Since secret key was divided into two subkeys corresponding to two subsections of image,only olatai- ning two parts of cipher text could receive decrypt correctly. The key o{ this encryption system is the inverse rules of toggle cellular automata which is not only based on secret key generated by a keystream generator, but also depends on image itself. Furthermore, symmetrical-coupled structure of CAs simplifies the cryptosystem's hardware. The proposed image encryption method satisfies the properties of confusion and diffusion due to the wonderful CA substitution as well as the pretreatment. The characteristics of the proposed image encryption system are sharable hardware structure by encryption and decryption, key sharing, self-adaptive inverse rules, very large number of keys and favorable fault tolerance. Simulation results for gray image show that the proposed image encryption method works as out expectations.
出处 《计算机科学》 CSCD 北大核心 2009年第2期214-219,共6页 Computer Science
基金 国家自然科学基金(60473014) 国家博士学科点科研基金项目(20030486049)资助
关键词 图像加密 触发细胞自动机 密钥共享与分存 对称耦合结构 Image eneryption, Toggle cellular automata, Key divided-deposit, Syrmmetrical-coupled
  • 相关文献

参考文献18

  • 1丁玮,齐东旭.数字图像变换及信息隐藏与伪装技术[J].计算机学报,1998,21(9):838-843. 被引量:327
  • 2Shamir A. How to share a secret[J]. Communications of ACM, 1979,22(11) :612-613
  • 3Naor M, Shamir A. Visual cryptography//Proc, of Eurocrypt ' 94. 1994:1-12
  • 4曹珍富.A threshold key escrow scheme based on public key cryptosystem[J].Science China(Technological Sciences),2001,44(4):441-448. 被引量:16
  • 5Shannon C E. Communication theory of secrecy systems[J]. Bell System Technical Journal, 1994,28 (4) : 656-715
  • 6Salam F, Marsden J, Varaiya P. Arnold diffusion in the swing equations of a power system[J].IEEE Trans. Circuits and Systems, 1984,31 (8) : 29-42
  • 7李昌刚,韩正之,张浩然.图像加密技术综述[J].计算机研究与发展,2002,39(10):1317-1324. 被引量:102
  • 8Matthews R. On the derivation of a Chaotic encryption algorithm[J].. Cryptologia, 1989,13 ( 1 ):29-42
  • 9Hedieu D , Ogorzalek M J . Indentifiability and identification of chaostic systems based on adaptive synchronization[J]. IEEE Trans. on Circuits and Systems, 1997,44(10) : 948-962
  • 10Yang T, Yang Linbao, Yang Chunmei. Application of neural networks to unmasking chaotic seeure communication[J]. Physiea D, 1998,124 : 248-257

二级参考文献20

  • 1苏中民,林行良.图视秘密的任意分存[J].计算机学报,1996,19(4):293-299. 被引量:26
  • 2高志国 龙文辉.反黑客教程[M].北京:中国对外翻译出版公司,1999..
  • 3B Schneier.应用密码学--协议、算法与C源程序[M].北京:机械工业出版社,2000..
  • 4一松信.数据保护和加密研究--计算机网络的安全性[M].北京:科学出版社,1991..
  • 5E N Lorenz.混沌的本质[M].北京:气象出版社,1997..
  • 6江早,中国图象图形学报,1998年,3卷,1期,83页
  • 7齐东旭,分形及其计算机生成,1994年
  • 8王育民,保密学.基础与应用,1990年
  • 9Wolfram S.. Cryptography with cellular automata, advances in cryptology. In: Crypto'85 Proceedings, LNCS, 218, Berlin:Springer-Verlag, 1986. 429~432
  • 10Guan P.. Cellular automata public-key cryptosystems. Complex Systems, 1987, 1:51~57

共引文献438

同被引文献54

引证文献8

二级引证文献15

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部