期刊文献+

基于混沌系统和DNA编码的量子图像加密算法 被引量:6

Quantum Image Encryption Algorithm Based on Chaotic System and DNA Coding
在线阅读 下载PDF
导出
摘要 为了确保量子信息的安全,结合混沌系统和DNA编码理论,提出了一种基于混沌系统和DNA编码的量子图像加密算法.首先将图像进行量子编码;然后利用Logistic混沌产生幺正矩阵对量子图像进行置乱;再利用Lorenz混沌产生自然DNA矩阵并且动态选择DNA加法操作进行DNA运算,计算后得到幺正矩阵对量子图像再次加密;最后对量子图像进行测量得到经典密文图像.通过仿真实验和直方图、相关性、NPCR (number of pixel change rate)像素改变率等指标分析,结果表明加密后的图像灰度分布均匀,各灰度级均分布于在1 000左右,相邻像素相关性更低,相关系数平均值0.002,NPCR像素改变率为99.6%,加密效果好且具有良好的安全性. To ensure the security of quantum information, a quantum image encryption algorithm based oncombining a chaotic system and DNA coding is proposed. Firstly, the image is expressed as a quantumsuperposition state, and the quantum image is then scrambled by a unitary matrix generated by logistic chaos.Next, using Lorenz chaos to generate a natural DNA matrix and selecting DNA addition rules dynamically toperform DNA calculations, the unitary matrix is obtained to encrypt the quantum image. Finally, the quantumimage is measured and the classic ciphertext image is obtained. From simulation experiments and histograms,correlation, and number of pixel change rate (NPCR) analysis, results indicated that the image histogram issmoother, grayscales average distribution is approximately 1 000, the correlation of adjacent pixels is low,average correlation coefficient is 0.002, and the NPCR is 99.6%. The conclusion is that the algorithm producesacceptable encryption effects and provides effective security.
作者 张健 霍达 ZHANG Jian;HUO Da(College of Information and Computer Engineering,Northeast Forestry University,Harbin 150040,China;Heilongjiang Province Tuo Meng Science and Technology Co.Ltd.,Harbin 150040,China)
出处 《西南交通大学学报》 EI CSCD 北大核心 2018年第6期1142-1149,共8页 Journal of Southwest Jiaotong University
基金 中央高校基本科研业务费专项资金资助项目(2572017CB35)
关键词 混沌系统 DNA编码 量子图像 图像加密 chaotic system DNA coding quantum image image encryption
  • 相关文献

参考文献12

二级参考文献97

  • 1陈晖,朱甫臣.量子保密通信系统分析[J].信息安全与通信保密,2005,27(5):32-34. 被引量:2
  • 2韩凤英,朱从旭,胡玉平.一种基于高维混沌系统的彩色图像加密新算法[J].计算机应用,2007,27(8):1888-1890. 被引量:13
  • 3Fridrich J. Symmetric ciphers based on two-dimensional chaotic maps [J]. Iht J Bifurcation Chaos, 1998, 8(6): 1259
  • 4Fridrich J. Image encryption based on chaotic maps [J].Sys Man Cybem Comput Cybern Simul, 1997, 2(1): 1105
  • 5Short K M. Steps toward unmasking secure communications [J]. Int J Bifurcation Chaos, 1994, 4(4): 959
  • 6Short K M. Unmasking a modulated chaotic communications Scheme [J]. Int J Bifurcation Chaos, 1996, 6(2): 367
  • 7Yang T, Yang L B, Yang C M. Breaking chaotic switching using generalized synchronization: Examples [J]. IEEE Trans Circuits Syst I, 1998, 45(10): 1062
  • 8Yang T, Yang L B, Yang C M. Applicationof neural networks to unmasking chaotic secure communication [J].Phys D, 1998, 124:248
  • 9廖晓峰,肖迪,陈勇,等.混沌密码学原理及应用[M].北京:科学出版社,2009.
  • 10韩凯.量子计算机与量子保密通信[J].大众科技,2007,9(11):67-68. 被引量:1

共引文献179

同被引文献17

引证文献6

二级引证文献18

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部