期刊文献+

结合多混沌映射和输出反馈的图像加密算法 被引量:6

A New Image Encryption Algorithm Based on Multiple Chaotic Maps and Output-Feedback
原文传递
导出
摘要 提出了一种结合多个Logistic混沌映射和逐段正弦混沌映射的图像加密算法。通过m个Logistic混沌映射的多次迭代,分别产生m个分段正弦混沌映射的初值和参数值,由m个分段正弦混沌映射迭代产生图像加密密钥序列,并引入密文输出反馈机制,对图像像素值逐点进行2轮异或加密。实验表明,该算法使密文对明文和密钥都充分敏感,加密图像像素值具有类随机均匀分布特性,相邻像素具有零相关特性,而且算法具有密钥空间大、加密速度快的优越性。 A new chaotic image encryption algorithm based on multi logistic maps(LMs) and piecewise sine chaotic maps(PSCMs) is proposed.The initial values and system parameters of the m PSCMs are generated by four LMs via iteration.By using the m-PSCMs chaotic secret key stream are generated.The image is encrypted two rounds by the chaotic secret key stream pixel by pixel and ciphertext output-feedback technology is introduced.The experimental results demonstrate that the extremely sensitive to the key and the plaintext,the ciphered image has random-like distribution behavior of grey values,the adjacent pixels have zero co-correlation properties.Furthermore,the algorithm shows the advantages of large key space and high speed of encryption.
出处 《武汉大学学报(信息科学版)》 EI CSCD 北大核心 2010年第5期528-531,共4页 Geomatics and Information Science of Wuhan University
基金 国家自然科学基金资助项目(60902044) 中南大学首批研究生培养扶植基金资助项目(71333000482)
关键词 图像加密 LOGISTIC混沌映射 正弦混沌映射 输出反馈 image encryption Logistic chaotic maps sine chaotic maps output-feedback
  • 相关文献

参考文献10

  • 1Zhang L, Liao X, Wang X. An Image Encryption Approach Based on Chaotic Maps[J]. Chaos, Solitons and Fractals, 2005, 24(3): 759-765.
  • 2Wang S, Kuang J, Li J, et al. Chaos-based Communications in a Large Community[J]. Physical Review g Statistical, Nonlinear, and Soft Matter Physics, 2002, 66(6) :1-4.
  • 3Chen G, Mao Y, Charles K. A Symmetric Image Encryption Scheme Based on 3D Chaotic Cat Maps [J].Chaos, Solitons and Fractals, 2004, 21(3): 749-761.
  • 4Guan Z, Huang F, Guan W. Chaos-based Image Encryption Algorithm [J].Physics I.etters A , 2005, 346 (1/3): 153-157.
  • 5朱从旭,陈志刚,欧阳文卫.一种基于广义Chen's混沌系统的图像加密新算法[J].中南大学学报(自然科学版),2006,37(6):1142-1148. 被引量:26
  • 6Behnia S, Akhshani A, Mahmodi H, et al. A Novel Algorithm for Image Encryption Based on Mixture of Chaotic Maps[J]. Chaos, Solitons and Fractals, 2008, 35(2):408-419.
  • 7Wang X, Zhao J, Zhang Z. A Chaotic Cryptosystem Based on Multi-one-dimensional Maps [J]. Modern Physics Letters B, 2009, 23(2): 183-189.
  • 8郭锦娣,周雁舟.基于混合混沌序列的对称图像加密算法设计[J].武汉大学学报(信息科学版),2008,33(10):1084-1087. 被引量:6
  • 9Li S, Mou X, Cai Y, et al. On the Security of a Chaotic Encryption Scheme: Problems with Computerized Chaos in Finite Computing Precision[J]. Computer Physics Communications, 2003, 153(1) : 52-58.
  • 10Webster A F, Tavares S E. On the Design of S-boxes[M]. Berlin: Springer- Verlag, 1985:523-53.

二级参考文献28

共引文献30

同被引文献43

  • 1飞龙.国外保护非物质文化遗产的现状[J].文艺理论与批评,2005(6):59-66. 被引量:97
  • 2朱从旭,陈志刚,欧阳文卫.一种基于广义Chen's混沌系统的图像加密新算法[J].中南大学学报(自然科学版),2006,37(6):1142-1148. 被引量:26
  • 3王银花,柴晓冬,周成鹏,冯兆艳,左言胜.基于分数傅里叶变换的混沌图像加密方法[J].计算机工程,2007,33(12):172-174. 被引量:14
  • 4黎全,赵凯,邓正才,何焰兰,吕治辉,黄水花.对一种混沌加密图像方法的破译研究[J].国防科技大学学报,2007,29(3):45-49. 被引量:10
  • 5Li S, Mou X, Cai Y, et al. On the Security of a Chaotic Encryption Scheme: Problems with Com- puterized Chaos in Finite Computing Precision[J]. Computer Physics Communications, 2003, 153 (1) : 52-58.
  • 6Zhu Zhi-liang, Zhang Wei,Wong K-W, et al. A chaos-based sym- metric image encryption scheme using a bit-level permutation[J]. Information Sciences, 2011,181 : 1171-1186.
  • 7Zhang Jun, Li Jin-ping, Wang Lu-qian. A New Compound ChaosEncryption Algorithm for Digital Images[C] // 2010 Internation- al Forum on Information Technology and Applications (IFITA 2010). Kunming, China: IEEE Computer Society, 2010 : 277-279.
  • 8Wang Yong, Wong K-W, Liao Xiao-feng, et al. A new chaos- based fast image encryption algorithm[J]. Applied Soft Compu- ting, 2011,11 : 514-522.
  • 9Xu Yang. Design of streams encryption key generator based on Chaos Theory[C]//2009 Pacific-Asia Conference on Knowledge Engineering and Software Engineering (KESE 2009 ). Shen- zhen, China, IEEE Computer Society, 2009:213-216.
  • 10MART1NO F D, SESSA S. Fragile watermarking tamper detection with images compressed by fuzzy transform[ J]. lnfornmtion Sci- ences, 2012, 195(1): 62-90.

引证文献6

二级引证文献26

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部