期刊文献+

基于复合混沌加密的虹膜识别安全性研究 被引量:1

Research of the Security of Iris Recognition Based on Composite Chaos Encryption
下载PDF
导出
摘要 为保证虹膜信息在网络传输中的安全,提出Arnold变换与OCML混沌系统相结合,针对虹膜图像的复合混沌加密系统对虹膜信息进行加密.首先,利用Arnold变换置乱并混淆虹膜图像,然后通过镜像算法解决Arnold变换中零点不变性问题,最后对置乱后的虹膜图像通过OCML混沌系统进行加密.实验表明,该算法密钥空间大,统计特性好,密钥敏感性强,加密速度快,平均加密时间70 ms. To ensure the iris information transmitted in network safely, a compound chaos encryption system(CCES) is proposed, which is the combination of Arnold transform and OCML, to encrypt iris image. Using Arnold transform is to shuf- fle and confuse iris image, and then by mirrored method to solve the question of zero position invariable. Finally, the shuffled iris image is encrypted by OCML chaos system. The experiment shows that this algorithm has such advantages: larger key space, better key sensitivity and statistical characteristics, faster encryption speed. The average encryption time is about 70ms.
出处 《河南师范大学学报(自然科学版)》 CAS CSCD 北大核心 2009年第3期68-70,共3页 Journal of Henan Normal University(Natural Science Edition)
基金 国家自然科学基金(60605009)
关键词 复合混沌 镜像 虹膜图像 密钥空间 compound chaos mirrored iris image key space
  • 相关文献

参考文献4

二级参考文献19

  • 1刘向东,焉德军,朱志良,王光兴.基于排序变换的混沌图像置乱算法[J].中国图象图形学报(A辑),2005,10(5):656-660. 被引量:35
  • 2Long Min Peng Fei Qiu Shuisheng Chen Yanfeng.Implementation of a new chaotic encryption system and synchronization[J].Journal of Systems Engineering and Electronics,2006,17(1):43-47. 被引量:7
  • 3MAO Yao-bin, CHEN Guan-rong, LIAN Shi-guo.A novel fast image encryption scheme based on the 3D chaotic baker maps [J]. International Journal of Bifurcation and Chaos, 2004, 14(10): 3613-3624.
  • 4CHEN Guan-rong, MAO Yao-bin, Charles K. A symmetric image encryption scheme based on 3D chaotic cat maps [J]. Chaos, Solitons and Fractals,2004, 21(3):749 - 761.
  • 5ZHANG Lin-hua, LIAO Xiao-feng, WANG Xuebing. An image encryption approach based on chaoticmaps [J]. Chaos, Solitons and Fractals, 2005, 24(3) : 759 - 765.
  • 6Chee C Y, XU Dao-lin, Bishop S R. A zero-crossing approach to uncover the mask by chaotic encryption with periodic modulation [J]. Chaos, Solitons and Fractals, 2004, 21(5): 1129- 1134.
  • 7BU Shou-liang, WANG Bing-hong. Improving the security of chaotic encryption by using a simple modulating method [J]. Chaos, Solitons and Fractals, 2004,19(4) : 919- 924.
  • 8Alvarez G, Montoya F, Romera M, et al. Cryptanalyzing an improved security modulated chaotic encryption scheme using ciphertext absolute value [J]. Chaos,Solitons and Fractals, 2005, 23(5) : 1749 - 1756.
  • 9GUAN Zhi-hong, HUANG Fang-jun, GUAN Wen-jie. Chaos-based image encryption algorithm [J].Physics Letters A, 2005, 346(1 - 3) : 153 - 157.
  • 10GAO Hao-jiang, ZHANG Yi-sheng, LIANG Shu-yun, et al. A new chaotic algorithm for image encryption [J].Chaos, Solitons and Fractals, 2006, 29(2): 393- 399.

共引文献90

同被引文献7

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部