检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:田军锋[1,2] 彭静静 左宪禹 葛强[1,2,3] 范明虎 TIAN Jun-feng;PENG Jing-jing;ZUO Xian-yu;GE Qiang;FAN Ming-hu(College of Computer and Information Engineering,Henan University,Kaifeng,Henan 475004,China;Key Laboratory of Big Data Analysis and Processing of Henan Province,Henan University,Kaifeng,Henan 475004,China;Institute of Data and Knowledge Engineering,Henan University,Kaifeng,Henan 475004,China)
机构地区:[1]河南大学计算机与信息工程学院,河南开封475004 [2]河南省大数据分析与处理重点实验室,河南开封475004 [3]河南大学数据与知识工程研究所,河南开封475004
出 处:《计算机科学》2020年第10期327-331,共5页Computer Science
基 金:国家重点研发计划课题(2017YFD0301105);国家自然科学基金(U1604145,U1704122);河南省重点研发与推广专项(182102210242,182102110065,192102210096)。
摘 要:利用单一混沌系统实现的加密算法结构简单且容易被攻击,采用多个混沌系统加密是提高加密系统安全性的有效措施。文中提出一种基于循环移位和多混沌映射的图像加密算法,循环移位操作可以有效地改变图像的像素值。首先,利用分段线性混沌映射(Piecewise Linear Chaotic Map,PWLCM)和Logistic映射产生不同的混沌序列,并根据不同混沌序列生成索引矩阵和循环移位数。然后,根据索引矩阵对明文图像进行置换操作,根据循环移位数对置换图像依次做左循环移位操作。最后,通过Logistic混沌序列和PWLCM混沌序列对循环移位后的图像进行置乱和扩散操作,最终得到加密图像。对图像直方图、信息熵、差分攻击、相关性进行的测试和分析结果表明,所提加密算法具有高安全性和抵御各种攻击的能力,可以应用于图像加密系统中。The encryption algorithm implemented by a single chaotic system has a simple structure and is easy to be attacked,using multiple chaotic systems to encrypt is an effective measure to improve the security of the encryption system.A new image encryption algorithm based on cyclic shift and multiple chaotic maps was proposed,and cyclic shift operation can change the va-lues of the pixels efficiently.First,using piece-wise linear chaotic map(PWLCM)and Logistic map to generate different chaotic sequences,generating index matrix and cyclic shift number according to the different chaotic sequences.Then,the plaintext image is replaced on the basis of index matrix.The left cyclic shift operation is performed on the replacement image in turn according to the cyclic shift number.Finally,the image after cyclic shift is scrambled and diffused by Logistic chaotic sequence and PWLCM chaotic sequence.Ultimately,an encrypted image is obtained.Tests and analyses of image histogram,information entropy,diffe-rential attack and correlation were carried out.Theoretical analysis and simulation results show that this algorithm has high secu-rity,a desirable ability to resist different kinds of attacks and can be used to implement an image encryption system.
关 键 词:图像加密 混沌加密 多混沌映射 索引矩阵 循环移位
分 类 号:TP391[自动化与计算机技术—计算机应用技术]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:3.15.10.218