期刊文献+

基于信道编码和Henon映射的图像加密方法 被引量:2

Image encryption combined channel coding with Henon mapping
下载PDF
导出
摘要 为同时解决图像传输的安全性和鲁棒性问题,提出一种结合LDPC编码和Henon映射的图像加密方法。将图像分解成8个二进制位平面表示,对高两位位平面进行LDPC码编码,编码后的位平面与低6位位平面重构成1024阶灰度图像;计算图像灰度值的偏差对Henon映射初值进行修正,使用Henon映射进行像素位置置乱和灰度值扩散;从10比特像素值中分离高2比特作为内部密钥,低8比特作为加密结果。实验结果表明,该方法对密钥敏感性强,密钥空间大,具有良好的加密效果,其加密结果能有效抵抗差分分析攻击,且具有较强的抗剪切和抗噪声攻击能力。 To solve the problems of security and robustness of image transmission, an image encryption algorithm combined LDPC encoding with Henon mapping is proposed. Firstly, the algorithm divides the image into 8 bit-plane, uses LDPC code to encode the high 2 bit-plane and rebuilds 1024 gray image with others 6 bit-plane. Secondly, calculates its deviation acted as parity value of initial value of Henon mapping, uses Henon mapping to scramble the position of image pixels and diffuse the value of pixels. Finally, the high 2 bits is separated from 10 bits of pixel value as internal key, the others 8 bits is acted as the eneryption result. Experimental results show that the algorithm has stronger sensitive to the keys and plaintext, possesses favorable avalanche effect, and can resist plaintext attack and differential attack effectively. Moreover, encryption result has stronger ability of resisting cutting and noise attack.
出处 《西安邮电学院学报》 2012年第3期15-19,共5页 Journal of Xi'an Institute of Posts and Telecommunications
基金 陕西省自然科学基金资助项目(2009JM8004) 陕西省教育厅科技计划资助项目(09JK730 2010JK816)
关键词 信道编码 低密度奇偶校验码 图像加密 HENON映射 鲁棒性 channel coding, LDPC coding, image encryption, Henon mapping, robustness
  • 相关文献

参考文献12

二级参考文献100

共引文献92

同被引文献26

  • 1胡玉平,王志坚,张玲华,尹华.基于小波变换和混沌映射的自适应水印算法[J].吉林大学学报(工学版),2012,42(S1):401-404. 被引量:5
  • 2吴祥兴 陈忠 等.混沌学导论[M].上海:上海科学技术文献出版社,2001.57-83. 被引量:21
  • 3Khushdeep Kaur, Er Seema. Hybrid algorithm with DSA, RSA and MD5 encryption algorithm for wireless devices [ J ]. International Journal of Engineering Research and Applications, 2012, 2 ( 5 ) : 914 -917. 被引量:1
  • 4SAPONARA S, SOLANAS A, AVOINE G, et al. Priva- cy and security in wireless sensor networks : protocols, al- gorithms, and efficient archi!ectures [ J ]. Journal of Com- puter Networks and Communications, 2013 ( 2013 ) : 1-3. 被引量:1
  • 5RAJKUMAR, SUNITHA K R, CHANDRAKANTH H G. A survey on security attacks in wireless sensor network [ J ]. International Journal of Engineering Research and Applications, 2012, 2(4):1684-1691. 被引量:1
  • 6DANIEL D W, ROBERT A J M. Supercomputer inves- tigation of a chaotic encryption algorithm [ J]. Cryptolo- gia, 1991, 15(2):140-152. 被引量:1
  • 7ULUAGAC A S, BEYAH R A, LI Yingshu, et al. VE- BEK: virtual energy-based encryption and keying for wireless sensor networks [ J ]. IEEE Transactions on Mo- bile Computing, 2010, 9(7) :994-1007. 被引量:1
  • 8VIDAL G, BAPTISTA M S, MANCINI H. Fundamen- tals of a classical chaos-based cryptosystem with some quantum cryptography features [ J ]. International Journal of Bifurcation and Chaos, 2012, 22 (10) : 1250243. 1- 1250243.14. 被引量:1
  • 9YU Yanwei, LING Hefei, Zou Fuhao, et al. Robust localized image watermarking based on invariant re- gions[-J~. Digital Signal Processing, 2012, 22 (1) : 170-180. 被引量:1
  • 10LOWED G. Distinctive image features from scale in- variant keypointsl-J]. International Journal of Comput- er Vision,2004,60(2) :91-110. 被引量:1

引证文献2

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部