期刊文献+

基于Chen系统的DSP混沌图像加密 被引量:3

DSP Chaotic image encryption based on Chen system
下载PDF
导出
摘要 介绍了在DSP基础上,实现数字图像的混沌加密及硬件实现方法。根据离散化和数字化处理技术,对三维Chen混沌系统作离散化处理,用C语言和DSP技术产生三维Chen混沌迭代序列,分别对数字图像进行混沌加密和解密。基于芯片型号为TMS32 0VC5509A的DSP开发平台,以灰度图像为例,设计了Chen混沌序列对数字图像进行加密与解密算法,给出了DSP硬件实现结果表明,改善了安全性、提高了速度、满足了实时性要求。 A novel method for realizing chaotic digital image encryption and its hardware implementation based on DSP is presented. By the discrete and digital process technology, the three-dimensional Chen chaotic system is made discrete and Chen chaotic iteration sequence is generated by using Hardware Description Language C and DSP technology.Red,green,and blue tricolor signals of the image are encrypted and decrypted,respectively.On the basis of the DSP exploitation platform with TMS320VC5509A chip.a gray image with an BMP format is taken as an example. The digital image encryption and deeryption algorithm using Chen chaotic sequence is designed,and DSP hardware implementation result is given.
作者 何丹 李敬园
出处 《电子设计工程》 2013年第1期190-193,共4页 Electronic Design Engineering
关键词 CHEN系统 DSP 混沌加密 硬件实现 Chen system DSP Chaotic encryption hardware implementation
  • 相关文献

参考文献10

二级参考文献14

  • 1Lorenz E N 刘式达等(译).混沌的本质[M].北京:气象出版社,1997.. 被引量:3
  • 2[3]BAPTISTA M S.Cryptography with Chaos[J].Physics Letters A,1998,240:50-54. 被引量:1
  • 3[4]LOUIS M PECORA,THOMAS L Carroll.Synchronization in chaotic systems[J].Phys Rev Lett,1990,4:821-824 被引量:1
  • 4[5]FRIDRICH J.Image encryption based on Chaotic maps[A].IEEE International Conference on Systems,Man,and Cybernetics,1997:1105-1110. 被引量:1
  • 5[6]GUAN Z H,HUANG F J,GUAN W J.Chaos-based image encryption algorithm[J].Physics Letters A,2005(346):153-157. 被引量:1
  • 6[7]ZHANG L H,LIAO X F,WANG X B.An image encryption ap-proach based on Chaotic maps[J].Chaos,Solitons and Fractals2005(24):759-765. 被引量:1
  • 7[8]LIAN S G,SUN J H,WANG Z Q.Security analysis of a Chaos-based image encryption algorithm[J].Physica A,2005(351):645-661. 被引量:1
  • 8[9]GEISEL T,FAIREN V.Statistical properties of Chaos in logistic maps[J].PHYS Lett,1984,A105(6):263-266. 被引量:1
  • 9丘水生,华南理工大学学报,1996年,24卷,6期,134页 被引量:1
  • 10Sobhy M I, Shehata A-E R. Methods of Attacking Chaotic Encryption and Countermeasures. In:IEEE International Conference on Acoustics, Speech, and Signal Processing, 2001, 2: 1001-1004 被引量:1

共引文献34

同被引文献19

引证文献3

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部