期刊文献+

基于忆阻细胞自动机的图像像素值置换加密技术 被引量:2

Pixel Value Replacement Method to Encryption Image Based on Memrisitive Cellular Automata
下载PDF
导出
摘要 忆阻细胞自动机是一种全新的细胞自动机,它的响应会引起细胞状态和细胞间链接状态的变化。在分析了忆阻细胞自动机中的细胞间链接状态丰富变化的基础上,设计了一种全新的图像加密算法:以一个W×H的忆阻自动机阵列为公钥,以细胞的初始状态和细胞迭代次数为私钥,将细胞与相邻细胞间的一组链接状态加权后设置成加密矩阵,同时采用像素置换方法对数字图像进行加密。这种加密算法具有较好的混乱特性、扩散特性和良好的保密性、抗蛮力破解特性,能够满足数字图像加密的安全性要求。 Memrisitive cellular automata is a kind of new cellular automata, and its operation can produce transformation of cells state and make its links changed. We analyzed the varied change of cellular automata and the links between the cells, then we designed a new encryption algorithm: use a W×H cells automata arrays as Public-Key, the initial states and respond time as Private-Key,get the links between the cells as a encryption matrix. Meanwhile, we used the pixel value replacement method to encrypt a image. This algorithm has the advantage of confusion and diffusion properties, besides,it owes its advantage in fine security, large key space and diffusion. The algorithm analyzes turn out that this method is of high encryption efficiency and security, which could just meet the digital image demands on security.
出处 《计算机科学》 CSCD 北大核心 2013年第9期133-135,168,共4页 Computer Science
基金 国家自然科学基金(60972155 61101233) 教育部"春晖计划"科研项目(z2011148) 中央高校基本科研业务费专项资金(XDJK2012A007 XDJK2010C02) 重庆市高等学校青年骨干教师资助计划(渝教人〔2011〕65号) 重庆市高等学校优秀人才支持计划(渝教人〔2011〕65号) 留学人员科技活动项目择优资助经费(国家级优秀类 渝人社办〔2012〕186号)资助
关键词 忆阻细胞自动机 图像加密 像素替换 Memristive cellular automata, Image encryption,Pixel value replacement
  • 相关文献

参考文献13

  • 1Adamatzky A.Controllable transmission of information in excita-ble medium:the 2+medium[J].Advanced Materials for Optics and Electronics,1995,5:145-155.
  • 2Alonso-Sanz R.A structurally dynamic cellular automaton with memory[J].Chaos,Solitons and Fractals,2006,32:1285-1295.
  • 3Adamatzky A,Holland O.Phenomenology of excitation in 2D cellular automata and swarm systems[J].Chaos,Solitons & Fractals,1998,3:1233-1265.
  • 4Adamatzky A,Andrew W,Benjamin D L C.Glider-based computing in reaction-diffusion hexagonal cellular automata[J].Chaos,Solitons & Fractals,2006,27(2):287-295.
  • 5Wolfram S.Cryptography with cellular automat[J].Advances in Cryptology,1985,218:429-432.
  • 6Kuang T L.Information hiding based on binary encoding metho-ds and pixel scrambling techniques[J].Applied Optics,2010,49(2):271-277.
  • 7Seredynski F,Bouvry P,Zomaya A Y.Cellular automata computations and secret key cryptography[J].Parallel Computing,2004,30(5):753-766.
  • 8Itoh M,Chua L O.Advanced image processing cellular neuralnetworks[J].International Journal of Bifurcation and Chaos,2007,17:1109-1150.
  • 9Itoh M,Chua L O.Memristor Cellular Automata and Memristor Discrete-Time Cellular Neural Networks[J].International Journal of Bifurcation and Chaos,2009,19(11):3605-3656.
  • 10Adamatzky A,Chua L O.Memristive excitable cellular automata[J].International Journal of Bifurcation and Chaos,2011,21(11):3083-3102.

二级参考文献18

  • 1刘向东,焉德军,朱志良,王光兴.基于排序变换的混沌图像置乱算法[J].中国图象图形学报(A辑),2005,10(5):656-660. 被引量:35
  • 2张小红,闵乐泉.基于语音信号和混沌序列的非对称图像隐藏方案[J].北京科技大学学报,2005,27(6):754-759. 被引量:1
  • 3Long Min Peng Fei Qiu Shuisheng Chen Yanfeng.Implementation of a new chaotic encryption system and synchronization[J].Journal of Systems Engineering and Electronics,2006,17(1):43-47. 被引量:7
  • 4MAO Yao-bin, CHEN Guan-rong, LIAN Shi-guo.A novel fast image encryption scheme based on the 3D chaotic baker maps [J]. International Journal of Bifurcation and Chaos, 2004, 14(10): 3613-3624.
  • 5CHEN Guan-rong, MAO Yao-bin, Charles K. A symmetric image encryption scheme based on 3D chaotic cat maps [J]. Chaos, Solitons and Fractals,2004, 21(3):749 - 761.
  • 6ZHANG Lin-hua, LIAO Xiao-feng, WANG Xuebing. An image encryption approach based on chaoticmaps [J]. Chaos, Solitons and Fractals, 2005, 24(3) : 759 - 765.
  • 7Chee C Y, XU Dao-lin, Bishop S R. A zero-crossing approach to uncover the mask by chaotic encryption with periodic modulation [J]. Chaos, Solitons and Fractals, 2004, 21(5): 1129- 1134.
  • 8BU Shou-liang, WANG Bing-hong. Improving the security of chaotic encryption by using a simple modulating method [J]. Chaos, Solitons and Fractals, 2004,19(4) : 919- 924.
  • 9Alvarez G, Montoya F, Romera M, et al. Cryptanalyzing an improved security modulated chaotic encryption scheme using ciphertext absolute value [J]. Chaos,Solitons and Fractals, 2005, 23(5) : 1749 - 1756.
  • 10GUAN Zhi-hong, HUANG Fang-jun, GUAN Wen-jie. Chaos-based image encryption algorithm [J].Physics Letters A, 2005, 346(1 - 3) : 153 - 157.

共引文献32

同被引文献22

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部