期刊文献+

利用混沌Arnold映射的改进图像加密方法 被引量:3

Improved Image Encryption Method Using Chaotic Arnold Mapping
下载PDF
导出
摘要 为了获得密码性更好的图像加密方法以抵御多种攻击,提出一种使用改进独立分量分析(ICA)中的混合矩阵,以及混沌Arnold映射(ACM)的加密。首先,通过插入任意维度的方形图像块从ACM中生成混合矩阵;然后使用混合矩阵和源图像实施混合过程,以得到加密图像。其中加密图像取决于图像源的数量。最后,使用改进的ICA方法对图像进行解密,即JADE方法的批处理。仿真实验和对比分析表明:与其他同类方法相比,所提方法在对比度、信息熵和直方图方面更优,可以抵御如熵攻击,各种统计攻击等。具有一定的应用价值。 To obtain a better cryptographic image encryption system to resist a variety of attacks,the hybrid matrix of an improved independent component analysis(ICA)and the chaotic Arnold mapping(ACM)encryption are adopted for the the proposed encryption algorithm.Firstly,a hybrid matrix is generated from the ACM by inserting arbitrary dimensions of the square image blocks;then the mixed matrix and the source image are used to implement the mixing process in order to obtain the encrypted image.And the encrypted image always depends on the number of the image sources.Finally,the improved ICA algorithm is used to decrypt the image,which is the batch processing of JADE algorithm.Simulation experiments and comparative analysis show that compared with other similar algorithms,the proposed algorithm is superior in contrast,information entropy and histogram,and it can resist attacks like entropy attacks,statistical attacks,etc.So the proposed algorithm has certain application value.
作者 魏志军 林国璋 WEI Zhi-jun;LIN Guo-zhang(School of Computer Technology,Beijing Institute of Technology,Zhuhai,ZhuHai 519088,China;School of Computer Science and Technology,Beijing Institute of Technology,Beijing 100081,China)
出处 《中国电子科学研究院学报》 北大核心 2019年第4期393-398,411,共7页 Journal of China Academy of Electronics and Information Technology
基金 广东高校省级重点平台和重大科研项目"学生电子毕业证书管理工程"(2016GXJK198) 广东高校省级重点平台和重大科研项目"基于区块链技术的学生电子简历管理系统"(2017GXJK218) 教育部社科类校企协同育人项目"创新创业课程建设"(201701067065)
关键词 图像加密 独立分量分析 混沌Arnold映射 混合矩阵 直方图 Image encryption Independent component analysis Chaotic Arnold mapping Mixed matrix Histogram
  • 相关文献

参考文献6

二级参考文献51

  • 1黄峰,冯勇.利用图像分割思想的二维混沌映射及图像加密算法[J].光学精密工程,2007,15(7):1096-1103. 被引量:15
  • 2孙晓兵,保铮.分数阶Fourier变换及其应用[J].电子学报,1996,24(12):60-65. 被引量:29
  • 3陶然,邓兵,王越.分数傅里叶变换及其应用[M].北京:清华大学出版社,2009.
  • 4LIU Hong-jun, WANG Xing-yuan.Color image encryption based on one-time keys and robust chaotic maps[J].Computers & Mathematics with Applications,2010,59(10):3320-3327.
  • 5LIU Hong-jun, WANG Xing-yuan.Triple-image encryption scheme based on one-time key stream generated by chaos and plain images[J].Journal of Systems and Software,2013,86(3):826-834.
  • 6PAREEK N K, PATIDAR V, SUD K K.Image encryption using chaotic logistic map[J].Image and Vision Computing,2006,24(9):926-934.
  • 7ZHANG Lin-hua.Cryptanalysis of the public key encryption based on multiple chaotic systems[J].Chaos, Solitons & Fractals,2008,37(3):669-674.
  • 8SALLEH M, IBRAHIM S, ISNIN I F.Image encryption algorithm based on chaotic mapping[J].Jurnal Teknologi,2012,39(1):1-12.
  • 9朱从旭,孙克辉.密钥与明文相关联的混沌图像加密算法[J].中国通信,2012,9(1):73-79.
  • 10WANG Yong, WONG K W, LIAO Xiao-feng, et al.A new chaos-based fast image encryption algorithm[J].Applied Soft Computing,2011,11(1):514-522.

共引文献60

同被引文献35

引证文献3

二级引证文献9

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部