期刊文献+

基于Lorenz混沌系统的数字图像加密算法 被引量:43

Digital Image Encryption Algorithm Based on Three-Dimension Lorenz Chaos System
下载PDF
导出
摘要 鉴于传统图像加密技术和低维混沌加密技术各自的局限性,将Lorenz混沌系统与数字图像置乱技术相结合,设计了一种基于三维混沌系统的数字图像加密算法.首先,对系统输出的实数值混沌序列进行预处理;其次,以此实数值混沌序列直接构造图像置乱索引矩阵;最后,以8×8块为单位实现数字图像的空域加密.分析与仿真结果表明:预处理后的实数值混沌序列具有更强的伪随机特性,更理想的相关特性;三维混沌系统有更大的密钥空间,使算法具有很强的抗破译性和抗攻击性;系统三维输出的同时利用,可实现三个或多幅图像的并行加密,提高了算法的加密效率. The Lorenz chaos system was applied to the digital image encryption based on the thought of the higher secrecy of a three-dimension chaos system. Firstly, it carried out pretreatment to a real chaos sequence produced by the system. Secondly, the index matrix of pixel permutation was structured directly by this real chaos sequence. Finally, digital image encryption was realized in the space domain. The results of analysis and simulation show that pretreating the real chaos sequence has the stronger pseudo-random, the better autocorrelation and mutual correlation characteristic. Additionally, the bigger secret-key space of the three-dimension chaos system, the stronger the algorithm can be against decryption attack. Three outputs of the system not only can realize the parallel encryption of three or more images, but also increase the more encryption efficiency of the algorithm.
出处 《北京科技大学学报》 EI CAS CSCD 北大核心 2004年第6期678-682,共5页 Journal of University of Science and Technology Beijing
基金 黑龙江省自然科学基金资助课题(No.F0211)
关键词 图像加密 LORENZ系统 预处理 置乱索引矩阵 <Keyword>image encryption Lorenz system pretreatment encryption index matrix
  • 相关文献

参考文献6

  • 1Fridrich J. Symmetric ciphers based on two-dimensional chaotic maps [J]. Iht J Bifurcation Chaos, 1998, 8(6): 1259
  • 2Fridrich J. Image encryption based on chaotic maps [J].Sys Man Cybem Comput Cybern Simul, 1997, 2(1): 1105
  • 3Short K M. Steps toward unmasking secure communications [J]. Int J Bifurcation Chaos, 1994, 4(4): 959
  • 4Short K M. Unmasking a modulated chaotic communications Scheme [J]. Int J Bifurcation Chaos, 1996, 6(2): 367
  • 5Yang T, Yang L B, Yang C M. Breaking chaotic switching using generalized synchronization: Examples [J]. IEEE Trans Circuits Syst I, 1998, 45(10): 1062
  • 6Yang T, Yang L B, Yang C M. Applicationof neural networks to unmasking chaotic secure communication [J].Phys D, 1998, 124:248

共引文献1

同被引文献290

引证文献43

二级引证文献214

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部