检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:朱和贵[1] 陆小军[1] 张祥德[1] 唐青松[1]
出 处:《东北大学学报(自然科学版)》2014年第1期20-23,共4页Journal of Northeastern University(Natural Science)
基 金:国家自然科学基金资助项目(61202085);辽宁省自然科学基金资助项目(201202074)
摘 要:针对公共网络中数字图像的安全传播问题,提出了一种基于二维Logistic混沌映射和二次剩余的图像加密算法.该加密算法利用二维Logistic映射的优良随机性,对明文图像进行2次置乱,极大地改变了图像像素位置.然后把置乱图像展开成二进制序列,按照8位一组进行分块,再利用二次剩余密码体制对每个分块进行加密,有效地改变了明文图像的信息.最后,对该算法进行直方图分析、信息熵分析、密钥敏感性分析以及明文图像和密文图像的相关系数分析等仿真实验.实验表明该算法能抵抗统计攻击、信息熵攻击,是一种较安全的图像通信方式.Considering the importance of image transmission in the public net, a new image encryption algorithm was proposed based on the 2D-Logistic chaos and quadratic residue. Firstly, the original image was shuffled twice with the 2D-Logistic chaos map, and the positions of the original image were changed sufficiently. Then, the shuffled image was turned into a binary sequence, and every 8 bits were called a block. For each block, quadratic residue was applied to encrypt the block, then, the encrypted binary sequence was turned into the encrypted image. Therefore, the statistical information of plain image was changed drastically by the proposed scheme. The proposed image scheme was tested by various types of experiment and security analyses such as histogram analysis, information entropy, key sensitivity and correlation coefficient analysis. All these analyses demonstrated that the proposed scheme can resist statistical attack, information entropy attack, and it is very proper for secure image communication.
关 键 词:图像加密 图像置乱 图像扩散 二维LOGISTIC映射 二次剩余
分 类 号:TP309[自动化与计算机技术—计算机系统结构]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.26