期刊文献+

利用逻辑映射和混沌线性分块变换的图像加密算法 被引量:2

Image encryption algorithm using logistic mapping and chaos linear fractional transformation
下载PDF
导出
摘要 为提高图像加密算法的置乱、扩散功能和密码学性能,基于线性分块变换和混沌系统,提出将两个混沌系统和S盒相结合,实现更好的混沌和扩散。首先是基于混沌映射的扩散阶段;为提升加密性能,利用性能优异的S盒进行代换操作,利用基于混沌逻辑映射进行扩散;为提高算法的统计性能,利用置换函数完成分块置换。仿真结果表明,与其它同类算法相比,该算法的敏感性、信息熵和相关性更优,可有效抵御多种攻击,密钥空间更大,所需总操作数更少。 To improve the scrambling, diffusion function and performance of image encryption algorithm, based on linear fractional transformation and chaotic system, two chaotic systems and S-box were combined to achieve better chaos and diffusion. The first step was based on the diffusion stage of chaotic mapping. To significantly enhance the performance of encryption, the substitution operation of S-box was adopted and chaotic logistic mapping was used for diffusion. To improve the statistical performance of the encryption algorithm, the replacement function was applied to complete the block replacement. Simulation results show that, compared with other similar algorithms, the proposed algorithm is better in sensitivity, information entropy and correlation. The proposed algorithm can be effective against a variety of attacks. In addition, the key space is larger, and the total number of operations required is less.
作者 赵海燕 赵荷 秦海玉 谭良 ZHAO Hai-yan ZHAO He QIN Hai-yu TAN Liang(Department of Computer Science and Technology, Chengdu Neusoft University, Chengdu 611844, China College of Computer Science, Sichuan Normal University, Chengdu 610101, China)
出处 《计算机工程与设计》 北大核心 2017年第8期2086-2091,共6页 Computer Engineering and Design
基金 四川省教育厅自然科学重点基金项目(11ZA100) 四川省教育厅科研基金项目(14ZB0348)
关键词 图像加密 置乱 扩散 S盒 混沌系统 线性分块变换 image encryption scrambling diffusion S-box chaotic system linear fractional transformation
  • 相关文献

参考文献10

二级参考文献65

  • 1黄峰,冯勇.利用图像分割思想的二维混沌映射及图像加密算法[J].光学精密工程,2007,15(7):1096-1103. 被引量:15
  • 2彭翔,汤红乔,田劲东.双随机相位编码光学加密系统的唯密文攻击[J].物理学报,2007,56(5):2629-2636. 被引量:42
  • 3Boneh D, DeMillo R, Lipton R. On the importance of checking cryptographic protocols for faults [C]// Lecture notes in computer science, Proceedings of EUROCRYPT'97. Berlin, Heidelberg: Springer- Verlag, 1997:37 51. 被引量:1
  • 4Biham E, Shamir A. Differential fault analysis of secret key cryptosystems [C]//Lecture notes in computer science, Proceedings of CRYPTO'97. Berlin, Heidelberg: Springer-Verlag, 1997: 512-525. 被引量:1
  • 5Dusart P, Letourneux G, Vivolo O. Differential fault analysis on AES [C] // Lecture notes in computer science, ACNS. Berlin, Heidelberg: Springe~Verlag, 2003: 293-306. 被引量:1
  • 6Giraud C. DFA on AES [C]//Lecture notes in computer science, AES. Berlin, Heidelberg: Springer-Verlag, 2003: 571. 被引量:1
  • 7Skorobogatov S, Anderson tL Optical fault induction attacks [C]//Cryptographic Hardware and Embedded Systems, CHES 2002, Lecture notes in computer science. Berlin, Heidelberg: Springer-Verlag, 2003:31 48. 被引量:1
  • 8VOLOS C,KYPRIANIDIS I M,STOUBOULOS I N.A chaotic path planning generator for autonomous mobile robots[J].Robotics and Autonomous Systems,2012,60(4):651-656. 被引量:1
  • 9KIA F,HENRY L.A cooperative mobile robot task assignment and coverage planning based on chaos synchronization[J].International Journal of Bifurcation and Chaos,2010,20(1):161-176. 被引量:1
  • 10VOLOS C,KYPRIANIDIS I M,STOUBOULOS I N.Motion control of robots using a chaotic truly random bits generator[J].Journal of Engineering Science and Technology Review,2012,5(2):6-11. 被引量:1

共引文献207

同被引文献23

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部