期刊文献+

基于Hash函数和多混沌系统的图像加密算法 被引量:9

Image encryption algorithm based on Hash function and multiple chaotic systems
下载PDF
导出
摘要 为了实现对数字图像的有效保护,提出一种基于Hash函数和多混沌系统的图像加密算法。该算法通过像素置乱、灰度置乱及灰度扩散实现图像加密。在像素置乱过程中,采用Lorenz混沌系统和Hash函数构造置乱序列,而在灰度置乱过程中,基于多表代替密码理论和Logistic混沌系统,提出了一种图像灰度置乱方法,并对灰度进行扩散。理论分析和仿真实验结果表明,该算法具有高的安全性能,在抵抗统计攻击、差分攻击、穷举攻击和选择明文攻击方面都具有良好的性能。 In order to protect image effectively, a multiple chaotic image encryption algorithm based on Hash function and multiple chaotic systems is presented, which implemented image encryption through shuffling and substituting. In the pixel permutation process, Lorenz chaotic system and Hash function is employed. In the process of grey value substituting, an image grey level scrambling algorithm based on polyalphabetic substitution cipher and Logistic chaotic system is proposed, at last, the grey is diffused. Theoretical analyses and simulated experiment show that, the proposed algorithm has excellent performances against attacks, in particular statistical attacks, differential attacks, limited attacks and chosen plain image attack.
出处 《计算机工程与设计》 CSCD 北大核心 2010年第1期141-144,共4页 Computer Engineering and Design
基金 河南省教委自然科学基金项目(2006520014)
关键词 哈希函数 多表代替 多混沌 相关性 差分攻击 Hash function polyalphabetic substitution multiple chaotic systems correlation differential attacks
  • 相关文献

参考文献9

二级参考文献42

  • 1丁玮,闫伟齐,齐东旭.Digital image scrambling[J].Progress in Natural Science:Materials International,2001,11(6):454-460. 被引量:13
  • 2朱从旭,李力,陈志刚.基于多维混沌系统组合的图像加密新算法[J].计算机工程,2007,33(2):142-144. 被引量:31
  • 3高志国 龙文辉.反黑客教程[M].北京:中国对外翻译出版公司,1999..
  • 4B Schneier.应用密码学--协议、算法与C源程序[M].北京:机械工业出版社,2000..
  • 5一松信.数据保护和加密研究--计算机网络的安全性[M].北京:科学出版社,1991..
  • 6E N Lorenz.混沌的本质[M].北京:气象出版社,1997..
  • 7MATTHEWS R.On the derivation of a Chaotic Encryption algorithm[J].Cryptologia,1989, 13(1):29-42.
  • 8FRIDRICH J. Secure image ciphering based on chaos[R]. Final report for AFRL. Rome New York USA, 1997.
  • 9YEN JC, GUO JI. A new chaotic key-based design for image encryption and ecryption[A]. Proc. IEEE Int. Conf. Circuits and Systems[C], 2000, 4.49-52.
  • 10CHEN GR, MAO YB, CHUI CK. A symmetric image encryption scheme based on 3D chaotic cat maps[J].Chaos, Solitons and Fractals, 2004, 21: 749-761.

共引文献131

同被引文献70

  • 1李太勇,贾华丁,吴江.基于三维混沌序列的数字图像加密算法[J].计算机应用,2006,26(7):1652-1654. 被引量:30
  • 2Alvarez G, Li Shujun. Some Basic Cryptographic Requirements for Chaos-based Cryptosystems[J]. International Journal of Bifur- cation and Chaos, 2006, 16(8): 2129-2151.
  • 3Yu Simin. Generation of n×m-scroll Attracors Under a Chua- circuit Framework[J]. International Journal of Bifurcation and Chaos, 2007, 17(11): 3951-3964.
  • 4KIM H, WEN J T, VILLASENOR J D. Binary arithmetic coding with key-based interval splitting [ J]. IEEE Trans on Signal Process Letter,2006,f3 (2) :69-72.
  • 5BOSE R, PATHAK S. A novel compression and encryption scheme using variable model arithmetic coding and coupled chaotic system [ J]. IEEE Trans on Circuits and Systems I: Regular Papers, 2006,53(4) :848-857.
  • 6MAO Yi-nian, WU Min. A joint signal processing and cryptographic approach to muhimedia encryption[ J]. IEEE Trans on Image Pro- cessing, 2006,15 ( 7 ) : 2061 - 2075.
  • 7KIM H,WEN J T,VILLASENOR J D. Secure arithmetic coding[ J]. IEEE Trans on Signal Process,2007,55(5 ) :2263-2272.
  • 8KATTI R S, SRINIVASAN S K, VOSOUGHI A. On the security of randomized arithmetic codes against ciphertext-only attacks[ J]. IEEE Trans on Information Forensics and Security, 2011,6 ( 1 ) : 19- 27.
  • 9SHAPIRO J M. Embedded image coding using zerotrees of wavelet co- efficients[J]. IEEE Trans on Signal Processing, 1993,41 ( 12 ) : 3445-3462.
  • 10SUN Hung-min, WANG King-hang. Designing an arithmetic code for multimedia files eornpression and eneryption[ C ]//Proe of the 2nd In- ternational Workshop on Computer Science and Engineering. 2009: 444 - 448.

引证文献9

二级引证文献58

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部