期刊文献+

基于相邻像素间比特置乱的图像加密算法 被引量:10

Image encryption algorithm based on scrambled bits between adjacent pixels
在线阅读 下载PDF
导出
摘要 针对现有单一像素点间比特置乱的图像加密算法存在对所用混沌序列不敏感,以及抵御选择明(密)文攻击弱的问题,提出一种相邻像素点间比特置乱的方式,用Kent、Logistic混沌映射对明文图像进行像素位置全局置乱、相邻像素比特置乱以及扩散操作。相邻两像素点置乱充分利用像素点全局置乱后的图像相关性极低这一特性,解决单一像素点进行比特置乱时对所用的混沌序列不敏感问题。采用正反双向不同混沌序列扩散结合明文的哈希值SHA-256,有效抵御选择明(密)文攻击。实验结果表明,该算法对明文、密钥敏感性强,密文分布均匀、相邻像素相关性低,能较好抵御统计分析、差分攻击和选择明(密)文攻击。 The existing image encryption algorithms are insensitive to the chaotic sequences used,and the ability to resist chosen plaintext(ciphertext)attacks is weak.A method of bit scrambling between adjacent pixels was proposed.Kent and Logistic chaotic maps were used to perform global scrambling of pixel positions,scrambling of adjacent pixel bits and diffusing operations on plaintext images.The scrambling of two adjacent pixels made full use of the feature that the global scrambling of pixels has very low image relevance,so as to solve the problem that a single pixel is not sensitive to the chaotic sequence used in the bit scrambling.The positive and negative bidirectional diffusion of different chaotic sequences and the hash value SHA-256 of the plaintext were used to resist the chosen ciphertext attack effectively.Experimental results show that the proposed algorithm has strong sensitivity to plaintext and key,uniform ciphertext distribution and low correlation between adjacent pixels,which can better resist statistical analysis,differential attack and selective attack.
作者 郭媛 敬世伟 周艳艳 GUO Yuan;JING Shi-wei;ZHOU Yan-yan(School of Computer and Control Engineering,Qiqihar University,Qiqihar 161006,China)
出处 《计算机工程与设计》 北大核心 2020年第7期1829-1835,共7页 Computer Engineering and Design
基金 国家自然科学基金项目(61872204) 黑龙江省自然科学基金项目(F2017029) 黑龙江省省属高等学校基本科研业务费科研基金项目(135109236) 研究生研究基金项目(YJSCX2019042)。
关键词 图像加密 比特置乱 SHA-256 混沌映射 选择明(密)文攻击 image encryption bit scrambling SHA-256 chaotic mapping chosen plaintext(ciphertext)attacks
  • 相关文献

参考文献11

二级参考文献73

  • 1孔涛,张亶.Arnold反变换的一种新算法[J].软件学报,2004,15(10):1558-1564. 被引量:83
  • 2彭飞,丘水生,龙敏.外部密钥控制系统参数的图像加密算法[J].华南理工大学学报(自然科学版),2005,33(7):20-23. 被引量:11
  • 3陶然,邓兵,王越.分数阶FOURIER变换在信号处理领域的研究进展[J].中国科学(E辑),2006,36(2):113-136. 被引量:80
  • 4朱从旭,李力,陈志刚.基于多维混沌系统组合的图像加密新算法[J].计算机工程,2007,33(2):142-144. 被引量:31
  • 5廖晓峰,肖迪,陈勇,等.混沌密码学原理及应用[M].北京:科学出版社,2009.
  • 6PISARCHIK A N, ZANIN M. Image encryption with cha-otically coupled chaotic maps[J]. Physics Letters, 2008, 372: 2645-2652.
  • 7GAO T G, CHEN Z Q. Image encryption base on a new total shuffiing algorithm[J]. Chaos, Solitons & Fractals, 2008, 38: 213-220.
  • 8GUAN Z H, HUANG F J, GUAN W 1. Chaos based image encryption algorithm[J]. Physics Letters A, 2005, 346(1-3): 153-157.
  • 9SEMPERE V, ALBERO T, SILVESTRE 1. Analysis of communication alternatives in a heterogeneous network for a supervision and control system[J]. Computer Communications, 2006, 29(8): 1133-1145.
  • 10TENNY R, TSIMRING L S, LARRY I, et al, Using distributed nonlinear dynamics for public key encryption[J]. Physical Review Letters, 2003, 90(4): 047903.

共引文献187

同被引文献77

引证文献10

二级引证文献35

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部