期刊文献+

基于时钟变换的复合混沌图像加密研究 被引量:5

Research on Compound Chaos Image Encryption Method with Time-Varying
在线阅读 下载PDF
导出
摘要 为解决一维混沌加密系统密钥空间和安全性差等问题,提出了一种基于时钟变换的复合混沌图像加密方法。该算法使用分段线性混沌映射,k阶Chebychev映射以及一维Logistic映射相复合的方式产生像素位置置乱矩阵和像素值变换矩阵。利用系统时钟变化法,随机改变复合混沌系统的多级初始参数,从而提高了图像信息传输的安全性,达到了近似"一次一密"的安全思想。采用MatLab7.0仿真实现。结果表明,该算法具有良好的加密效果且密钥空间较大。 In order to solve the one-dimensional chaotic encryption key space and the poor security,a com- posite based on the clock to transform the chaotic image encryption method. The algorithm uses piece- wise linear chaotic maps, k-order Chebychev maps and one-dimensional Logistic map phase composite way to generate the pixel position of scrambling matrix and the pixel value transformation matrix. Use of system clock change,random changes in the level of initial parameters of the hybrid chaotic system, thereby enhancing the security of the transmission of image information, and reached a similar "one se- cret" security thinking. The simulation realization MatLab7.0. The results show that the algorithm has good encryption key space.
出处 《吉林大学学报(信息科学版)》 CAS 2012年第3期291-296,共6页 Journal of Jilin University(Information Science Edition)
基金 总装备部靶场测试基金资助项目(KYC-XZ-XM-2010-032)
关键词 复合混沌 图像加密 Chebychev映射 LOGISTIC映射 密钥 compound chaos image encryption chebychev mapping logistic mapping secret key
作者简介 褚影(1980-),女,辽宁开原人,长春理工大学博士研究生,主要从事图像信息处理研究,(Tel)86—13843195785(E—mail)chuying0926@126.com; 王小曼(1956-),女,长春人,长春理工大学教授,博士生导师,主要从事通信与信息处理研究(Tel)86-13356869769(Email)wmftys@126.com。
  • 相关文献

参考文献10

二级参考文献42

共引文献41

同被引文献53

  • 1王英,郑德玲,鞠磊.基于Lorenz混沌系统的数字图像加密算法[J].北京科技大学学报,2004,26(6):678-682. 被引量:43
  • 2高铁杠,陈增强,袁著祉,顾巧论.基于混沌密码流的IC卡数据加密算法设计与实现[J].仪器仪表学报,2006,27(1):58-60. 被引量:4
  • 3高铁杠,顾巧论,陈增强.超混沌强化对称加密算法的研究与应用[J].计算机工程与设计,2007,28(1):36-37. 被引量:6
  • 4LORENZ E N. Deterministic Nonperiodic Flow [ J]. Journal of Atmosphere Science, 1963, 20(2) : 130-141.
  • 5YU W B, CHIC J, WEI X P, et al. Image Encryption Algorithm Based on High-Dimensional Chaotic Systems [ C]///2010 International Conference on Intelligent Control and Information Processing. Dalian, China: [ s. n. ], 2010: 463-467.
  • 6FRIDICH J. Symmetric Ciphers Based on Two Dimensional Chaotic Maps [ J]. Int J Bifurcation and Chaos, 1998, 8 (6): 1259-1284.
  • 7SCHAIRNGER J. Fast Eneryption of Image Data Using Chaotic Kolmogrov Flow [ J ]. J Electronic Eng, 1998, 7 (2): 318-325.
  • 8YEN J C, GUO J I. A New Chaotic Key Based Design of Image Encryption and Decryption [ C ]//Procedings of the IEEE International Symposium Circuits and Systems. Geneva, Switzerland: IEEE, 2000: 49-52.
  • 9CHEN G, UETA T. Yet Another Chaotic Attractor [J]. Int J of Bifurcation and Chaos, 1999, 9(7) : 1465-1466.
  • 10GAO Tie-gang, CHEN Zeng-qiang, CHEN Guan-rong, et al. A Hyperchaos Generated from Chen's System [ J]. International Journal of Modern Physics C, 2006, 17(4) : 102-107.

引证文献5

二级引证文献21

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部