期刊文献+

利用DNA编码和Lorenz混沌系统的图像加密系统 被引量:1

An image encryption scheme using DNA coding and Lorenz chaotic map
下载PDF
导出
摘要 提出了一种基于DNA随机编码与Lorenz混沌映射的图像加密算法.首先将明文图像输入到SHA-256生成摘要信息,利用该摘要信息作为安全密钥输入到Lorenz混沌映射中,产生加密所需的伪随机序列;然后,利用Lorenz混沌序列对图像的像素值进行置换,并随机生成DNA掩码;最后利用DNA运算规则对图像进行DNA随机编码,实现图像加密.理论分析和实验结果证明,经该加密系统加密后的图像相邻像素相关性接近0,信息熵为7.998 715,密钥空间大小为2256,能够抵御统计攻击、暴力攻击、差分攻击等常见的攻击手段,具有很高的安全性. An image encryption algorithm is proposed based on the DNA random coding combined with Lorenz chaotic map. First, SHA-256 hash of the plain image generates the abstract which is utilized to yield secure keys. Iterating Lorenz chaotic map with the initial parameters based on the secure keys, the pseudonumbers sequences are obtain. Second, the Lorenz chaos sequences are exploited to permute the pixels and yield random DNA masks. Finally, the encrypted-image is randomly encoded with DNA rules. Theoretical analysis and computer simulation indicate that the proposed encryption scheme has low correlation closed to0, information entropy 7.998 715 and 2256 bit key space and assistance to statistical attack, brute-force attack and differential attack. It has high level of security.
作者 华建祥 瞿霞 HUA Jian-Xiang;Qu Xia(Automation Engineering Department,Fujian Forestry Vocational and Technical College,NanPing,Fujian 353000,China)
出处 《宁德师范学院学报(自然科学版)》 2019年第1期16-23,38,共9页 Journal of Ningde Normal University(Natural Science)
关键词 图像加密 DNA编码 SHA-256 Lorenz混沌映射 差分攻击 image encryption DNA coding SHA-256 Lorenz chaotic map differential attack
  • 相关文献

参考文献3

二级参考文献20

  • 1葛辉.一种256位hash函数算法[J].大众科技,2005,7(5):107-108. 被引量:5
  • 2黄月江,祝世雄.信息安全与保密[M].北京:国防工业出版社,2008:141-170. 被引量:8
  • 3FIPS 180-1.Secure hash standard[S].NIST,US Department of Commerce.Washington D C:Springer-Verlag,1996. 被引量:1
  • 4Hsu W H,Tung M C,W u L Y.An integrated end to-end QoS anycast routing on DiffServ net works[J].Computer Commun cations.2007, 30(6): 1406-1418. 被引量:1
  • 5GLBERT H, HANDSCHUH H.Security analys is of SHA-256 and sisters [C] // Selected Areas in Cryptagraphy'03, Lecture Notes inComputer Science,2003,(3006): 175-193. 被引量:1
  • 6Chabaud F,Joux A,Differential collisions in SHA -0[C] // Advances in Crypyology-CRYPYO'98,Lecture Notes in corn puter Science, 1998,(1462):56-71. 被引量:1
  • 7YOSH DA H,BRYUKOV A. Analysis of a SHA-256 variant [C]// Selected Areas in Cryptography (SAC20OS),Kingston On tario,2005: 245-260. 被引量:1
  • 8Guan Z H, Huang F, Guan W. Chaos-based image encryption algorithm [ J]. Physics Letters A ,2005,346(67 ) : 153 - 157. 被引量:1
  • 9Kwok H S, Tang W K S. A fast image encryption system based on cha- otic maps with finite precision representation [ J ]. Solutions & Fractals, 2007(25 ) :1518 - 1529. 被引量:1
  • 10Kocarev L. Chaos-based cryptography: a brief overview, Circuits and Systems Magazine[ J]. IEEE 1,2006 (9) :6 - 21. 被引量:1

共引文献13

同被引文献4

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部