检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:黄林荃 刘会 王志颖 王敬华[3] HUANG Lin-quan;LIU Hui;WANG Zhi-ying;WANG Jing-hua(Information School,Wuhan Vocational College of Software and Engineering,Wuhan 430205,China;School of Cyber Science and Engineering,Wuhan University,Wuhan 430072,China;School of Computer,Central China Normal University,Wuhan 430079,China)
机构地区:[1]武汉软件工程职业学院信息学院,武汉430205 [2]武汉大学国家网络安全学院,武汉430072 [3]华中师范大学计算机学院,武汉430079
出 处:《小型微型计算机系统》2020年第9期1959-1965,共7页Journal of Chinese Computer Systems
摘 要:本文提出了一种基于二维Logistic混沌映射与DNA计算的自适应图像加密方案.整个加密过程包括扩散和置乱两个阶段.在扩散阶段,本文首先利用二维Logistic混沌系统产生伪随机序列并生成掩码图像,然后充分运用DNA编码规则对明文图像和掩码图像进行随机编码,通过DNA异或运算得到扩散编码图像.在置乱阶段,为抵御差分攻击、选择明文攻击等,需建立明文图像与密文图像紧密的关联.该算法采用一种自适应的置乱结构,以扩散编码图像的DNA碱基数量为种子代入至二维Logistic混沌系统生成伪随机序列,以此序列确定图像置乱的顺序.将置乱后的编码图像解码得到密文图像,实现图像加密.模拟实验从直方图分析、相关性分析、信息熵、差分攻击、密钥敏感度分析、密钥空间和运行效率等多个方面测试了该加密算法的安全性,实验结果显示该加密方案能够抵御常见的攻击手段,具有较高的安全性.The paper proposes a self-adaptive image encryption algorithm based on two-dimensional Logistic chaotic map and DNA computing.The encryption process consists of diffusion and permutation.In diffusion stage,the paper firstly applies two-dimensional Logistic chaotic system to generate a pseudo-random sequence and get a mask image.And then the DNA coding rules are used to encode the plain-image and the mask image.DNA XOR operation is executed on the plain-image and the mask image to get a diffused coded-image.In permutation stage,In order to resist differential attack and chosen-plaintext attack,it is necessary to establish a close correlation between the plain-image and its cipher-image.We design an adaptive scrambling structure.The number of DNA bases in the diffused coded-image was used to generate a pseudo-random sequence in two-dimensional Logistic chaotic system,which determines the order of image scrambling.The scrambled coded-image is decoded to get the final cipher-image,and the image encryption is realized.This paper simulates and tests the security of the proposed scheme from the aspects of histogram analysis,correlation analysis,information entropy,differential attack,key sensitivity analysis,key space and running efficiency.Experimental results show that the proposed scheme can resist common attacks and has high security.
关 键 词:二维Logistic混沌映射 DNA计算 自适应图像加密 差分攻击 选择明文攻击
分 类 号:TP309[自动化与计算机技术—计算机系统结构]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:18.220.204.192