基于二维Logistic映射和二次剩余的图像加密算法  被引量:12

A Novel Image Encryption Scheme with 2D-Logistic Map and Quadratic Residue

在线阅读下载全文

作  者:朱和贵[1] 陆小军[1] 张祥德[1] 唐青松[1] 

机构地区:[1]东北大学理学院,辽宁沈阳110819

出  处:《东北大学学报(自然科学版)》2014年第1期20-23,共4页Journal of Northeastern University(Natural Science)

基  金:国家自然科学基金资助项目(61202085);辽宁省自然科学基金资助项目(201202074)

摘  要:针对公共网络中数字图像的安全传播问题,提出了一种基于二维Logistic混沌映射和二次剩余的图像加密算法.该加密算法利用二维Logistic映射的优良随机性,对明文图像进行2次置乱,极大地改变了图像像素位置.然后把置乱图像展开成二进制序列,按照8位一组进行分块,再利用二次剩余密码体制对每个分块进行加密,有效地改变了明文图像的信息.最后,对该算法进行直方图分析、信息熵分析、密钥敏感性分析以及明文图像和密文图像的相关系数分析等仿真实验.实验表明该算法能抵抗统计攻击、信息熵攻击,是一种较安全的图像通信方式.Considering the importance of image transmission in the public net, a new image encryption algorithm was proposed based on the 2D-Logistic chaos and quadratic residue. Firstly, the original image was shuffled twice with the 2D-Logistic chaos map, and the positions of the original image were changed sufficiently. Then, the shuffled image was turned into a binary sequence, and every 8 bits were called a block. For each block, quadratic residue was applied to encrypt the block, then, the encrypted binary sequence was turned into the encrypted image. Therefore, the statistical information of plain image was changed drastically by the proposed scheme. The proposed image scheme was tested by various types of experiment and security analyses such as histogram analysis, information entropy, key sensitivity and correlation coefficient analysis. All these analyses demonstrated that the proposed scheme can resist statistical attack, information entropy attack, and it is very proper for secure image communication.

关 键 词:图像加密 图像置乱 图像扩散 二维LOGISTIC映射 二次剩余 

分 类 号:TP309[自动化与计算机技术—计算机系统结构]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象