期刊文献+

基于位平面变换的数字图像加密算法 被引量:9

Digital Image Encryption Algorithm Based on Bit-plane Transformation
在线阅读 下载PDF
导出
摘要 已有数字图像加密算法存在算法运行时间成本高及加密图像抗攻击性弱等问题。为此,提出一种基于位平面变换的数字图像加密算法。该算法将图像分解为若干位平面,通过定义一种混沌序列的新变换对图像位平面进行换位加密,从而置乱像素点位置,在位平面间增加密钥进行乱序处理实现图像像素点灰度值的变化。实验结果证明,该算法具有较大的密钥量,可以抵抗剪切攻击、噪声攻击、统计分析等多种攻击,且加解密速度较快。 Aiming at the problem that existing digital image encryption algorithms have high operation time cost and the anti-attacking of the encrypted image is weak, a digital image encryption algorithm based on bit-plane transformation is proposed. This algorithm decomposes the image into a number of bit planes, and defines a new transform to achieve the pixel position scrambling by the plane transposed encryption, and achieves the change of the image pixel gray value by adding keys. Experimental results show that the image encryption algorithm has a larger amount of keys, and it can resist some attacks such as shear attack, noise attack, statistical analysis, and the speed of encryption and decryption is fast.
出处 《计算机工程》 CAS CSCD 2013年第6期185-189,共5页 Computer Engineering
基金 国家林业公益性行业科研专项基金资助项目(201204715)
关键词 图像加密 位平面 序列变换 位置混乱 灰度值 抗攻击性 image encryption bit-plane sequence transformation position scrambling gray value anti-attacking performance
  • 相关文献

参考文献10

二级参考文献61

共引文献50

同被引文献103

  • 1张颖,杨玥.Arnold双置乱图像加密算法[J].辽宁工程技术大学学报(自然科学版),2013,32(10):1429-1432. 被引量:9
  • 2闵连权.基于双置乱的图像加密算法[J].测绘科学,2006,31(3):71-72. 被引量:4
  • 3李名威,冯勇,李林静.一种新的基于像素置乱的图像加密算法[J].黑龙江科技信息,2007(04X):68-69. 被引量:4
  • 4王向阳,胡峰丽.一种基于重要位平面的鲁棒图像检索算法[J].中国图象图形学报,2007,12(9):1647-1652. 被引量:4
  • 5Wang P Z,Gao H X,Cheng M T,et al.A new image encryption algorithm based on hyperchaotic mapping[C] //Preceedings of the IEEE International Conference on Computer,Application & System Modeling.Taiyuan,2010:428-432.
  • 6Sun F Y,Liu S T,Li Z Q,et al.A novel image encryption scheme based on spatial chaos map[J] .Chaos Solitions & Fractals,2008,38(3):631-640.
  • 7Bennett C H,Brassard G.Quantum cryptography:public key distribution and coin tossing[C] //Preceedings of the IEEE International Conference on Computers,Systems & Signal Processing.Bangnlore,India,1984:175-179.
  • 8Bruss D.Optimal eavesdropping in quantum cryptography with six states[J] .Phys Rev Lett,1998,2(81):3018-3021.
  • 9Sun B L,Hao S F,Zhang X,et al.An improved method of quantum key distribution protocol[C] //Preceedings of the IEEE Intemational Forum on Computer Science-Technology and Applications.Chongqing,China,2009:115-117.
  • 10Sharma R D,De A.A new secure model for quantum key distribution protocol[C] ∥Preceedings of the IEEE International Conference on Industrial and Information Systems.Kandy,2011:462-466.

引证文献9

二级引证文献24

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部