期刊文献+

基于Chebyshev映射的快速图像加密算法 被引量:1

Fast Image Encryption Algorithm Based on Chebyshev Mapping
下载PDF
导出
摘要 为满足图像数据的实时传送和处理,设计并实现了一种快速图像加密算法.通过将置乱和扩散两个不相关的过程变为两个连续进行的扩散过程完成图像加密,提高了加密速度.利用Chebyshev映射完成第一次扩散,利用中国剩余定理完成第二次扩散.仿真实验表明,该算法在保证安全性的前提下,提高了加密和解密速度,适合图像的实时处理. In order to satisfy the real-time transmission and processing of image data,a fast image encryption algorithm is designed and realized. The encryption speed is improved by changing two unrelated processes scrambling and diffusing,into two consecutive diffusion processes. Chebyshev mapping is used to complete diffusion for the first time,and the Chinese remainder theorem is used to complete the second one. Simulation experiment results show that the proposed algorithm can improve the speed of encryption and decryption on the premise of security guarantee and it is suitable for the real-time image processing.
作者 杨凤霞
出处 《沧州师范学院学报》 2016年第1期49-52,共4页 Journal of Cangzhou Normal University
关键词 CHEBYSHEV映射 中国剩余定理 扩散 实时处理 Chebyshev mapping Chinese remainder theorem diffusion process real-time processing
  • 相关文献

参考文献8

  • 1MAO Y B, CHEN G R. Handbook of geometric computing: Chaos-based image encryption[M]. Berlin: Springer Press,2005. 被引量:1
  • 2FRIDRICH J. Symmetric ciphers based on two-dimensional chaotic maps [ J]. International Journal of Bifurcation and Chaos, 1998, (8) : 1259-1284. 被引量:1
  • 3MANDAL M K, BANIK G D, CHATrOPADHYA'Y D, et al. An Image Eneryption Process based on Chaotic Logistic Map[J]. IETE Technical Review, 2012, (29) :395-404. 被引量:1
  • 4杨凤霞.基于Logistic映射和z-映射的图像分组加密算法[J].激光与红外,2014,44(1):103-107. 被引量:4
  • 5LIAO X, LI X, PEN J, et al. A digital secure image communication scheme based on the chaotic Chebyshev map[J] . International Journal Of Communication Systems, 2004,17(5) :437-445. 被引量:1
  • 6AKttAVAN A, SAMSUDIN A , AKHSHANI A. A symmetric image encryption scheme based on combination of nonlinear chaotic maps [ J]. Journal of the Franklin Institute, 2011,348 : 1797-1813. 被引量:1
  • 7SOGO K. Inverse problem in chaotic map theory[J]. Chaos, Solitons & Fractals,2009, (41):1817-1822. 被引量:1
  • 8陈恭亮.信息安全数学基础[M].北京:清华大学出版社,2006:4-150. 被引量:2

二级参考文献7

共引文献4

同被引文献10

引证文献1

二级引证文献27

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部