期刊文献+

一种新的基于复合混沌模型的图像加密算法 被引量:3

An Image Encryption Algorithm Based on Mixed Chaotic Dynamic Systems
原文传递
导出
摘要 论文提出了一种新的基于包括Logistic映射模型和混合光学双稳模型的复合混沌系统的图像加密算法。随着对外部密钥的映射,将选择相应的混沌动力系统,产生出混沌序列,对原始图像加密掩盖。计算机仿真的结果表明,混沌序列对外部密钥很敏感。该算法具有良好的运算效率,加密图像具有良好的统计特性。 An image encryption algorithm based on mixed chaotic dynamic systems is proposed. With the map of the external keys, the initial conditions of the mixed chaotic dynamic systems are acquired. Subsequently the chaotic signals are generated, then the plain image is encrypted by masking the chaotic signals. The result of the simulation and analysis shows that the chaotic signals are greatly sensitive to the key, Moreover, a better security performance on the basis of statistical analysis is obtained.
出处 《信息安全与通信保密》 2007年第5期146-148,共3页 Information Security and Communications Privacy
关键词 复合混沌系统 图像加密 外部密钥 mixed chaotic dynamic systems image encryption external keys
  • 相关文献

参考文献7

  • 1[1]Parker A T,Short K M.Reconstructing the keystream from a chaotic encryption scheme[J].IEEE Trans.Circuits Syst.Ⅰ,May.2001,48:624-630. 被引量:1
  • 2[2]Yang T,Yang L B,Yang C M.Breaking chaotic secure communication using a spectrogram[J].Phys Lett A,1998,247(5):105-111. 被引量:1
  • 3[3]Jakimoski G,Kocarev L J.Chaos and cryptography:block encryption ciphers based on chaotic maps[J].IEEE Trans.Circuits Syst.Ⅰ,Feb.200 1,48(2). 被引量:1
  • 4[4]Fei Peng,Qiu Shuisheng,Min Long.An image encryption algorithm based on mixed chaotic dynamic systems and external keys[J].IEEE Trans.Circuits Syst.Ⅰ,May.2005,2:1139. 被引量:1
  • 5[5]Scott Hayes,Celso Crebogi,Edward Ott.Communication with chaos[J].Phys Rev Lett,1993,70(20):3031-3034. 被引量:1
  • 6[6]王丽娜,郭迟,李鹏.信息隐藏技术试验教程[M].武汉:武汉大学出版社,2004:48-50. 被引量:2
  • 7徐飞,施晓红等编著..MATLAB应用图像处理[M].西安:西安电子科技大学出版社,2002:256.

共引文献1

同被引文献24

  • 1程卫东,刘红梅.数字产品版权保护认证机制[J].中山大学学报(自然科学版),2004,43(A02):91-93. 被引量:2
  • 2赵莉,张雪锋,范九伦.一种改进的混沌序列产生方法[J].计算机工程与应用,2006,42(23):31-33. 被引量:20
  • 3袁皓,杨晓懿.信息安全模型安全控制研究[J].信息安全与通信保密,2007,29(2):78-80. 被引量:6
  • 4Zhou H, Ling X T. Generating Chaotic Secure Sequences with Desired Statistical Properties and High Secuirty[J]. Bifurcation and Chaos, 1997,7(01):205-213. 被引量:1
  • 5Ping Li, Zhong Li, of Chaos-based Siegfried Fettinger Pseudo Random-Bit et al. Application Generators in Internet-based Online Payments[J]. Studies in Computational Intelligence (SCI), 2007(37): 667-685. 被引量:1
  • 6Adnan Gutub,Mahmoud Ankeer,Muhammad AbuGhalioun.Pixel Indicator High Capacity Technique for RGB Image Based Steganography[C] //IEEE.WOSPA 2008-5th IEEE International Workshop on Signal Processing and its Applications.United States:IEEE Publications,2008:18-20. 被引量:1
  • 7Aidan Mooney, John G Keating, Daniel M Heffeman. Per- formance analysis of chaotic and white watermarks in the presence of common watermark attacks [ J ]. Chaos, Soli- tons & Fractals, 2009, 42( 1 ) :560-570. 被引量:1
  • 8Lie W N, Chang L C. Robust and high-quantity time-domain audio watermarking based on low-frequency amplitude modifi- cation[J]. IEEE Trans. on Multimedia, 2006,8 ( 1 ) :46-59. 被引量:1
  • 9Reddy A A, Chatterji B N. A new wavelet based logo-wa- termarking scheme[ J]. Pattern Recognition Letters, 2005, 26(7) : 1019-1027. 被引量:1
  • 10Li Cheng-hao, Wang Shuenn-shyang. Digital watermarking using fraetal image coding [ J ]. IEICE Transactions on Fundamentals of Electronics, Communications and Comput- er Sciences, 2000,83 ( 6 ) : 1286-1288. 被引量:1

引证文献3

二级引证文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部