期刊文献+

基于约瑟夫和Henon映射的比特位图像加密算法 被引量:17

Bit-level image encryption algorithm based on Josephus and Henon chaotic map
在线阅读 下载PDF
导出
摘要 针对传统的图像加密算法,加密策略与待加密图像无关且对像素的置换和混淆往往被拆分为两个耦合性较低的孤立环节所带来的安全问题,提出基于约瑟夫遍历和广义Henon映射的图像比特位加密算法,将待加密图像安全哈希算法1(SHA-1)摘要和用户选定的加密参数联合作为密钥,驱动广义Henon映射对改进的用于位点置换的约瑟夫遍历映射的起始位置、报数间隔和报数方向进行随机扰动,从而使不同的加密图像和加密参数实质对应于不同的位点置换过程,并添加了位点混淆过程以提高位点置换的安全性。实验表明,所提算法可有效地抵抗选择性明文攻击,具有较大的密钥空间和较好的加密性能。 In conventional image encryption algorithms,pixel permutation and diffusion are always two loosely coupled isolated stages and the encryption strategy is usually irrelevant to plaintext image,which brings security risks. To address these problems,this paper proposed a bit-level image encryption algorithm based on Josephus traversing and generalized Henon chaotic map,where Henon map variables combined with the secure hash algorithm 1( SHA-1) digest of plaintext image as the key to drive Henon map producing modified Josephus traversing map's start point,number space and number direction variables.It used the generated Josephus traversing map variables to permutated plaintext image's pixel bits where mapped different plaintext image and key to different bit permutation stage. To improve security,the proposed method added pixel bits diffusion stage. Experiments show the proposed algorithm can effectively resist the selective plaintext attack,it has a large key generating space and a good encryption performance.
出处 《计算机应用研究》 CSCD 北大核心 2015年第4期1131-1137,共7页 Application Research of Computers
基金 国家自然科学基金资助项目(61100239) 国家教育部高等学校博士学科点专项科研基金资助项目(20110202120002) 陕西省科技新星计划资助项目(2011kjxx17) 陕西省自然科学基金资助项目(2011JQ8009) 中央高校基本科研业务费支持项目(GK201402036)
关键词 约瑟夫遍历映射 HENON映射 比特位图像加密 安全哈希算法1 置换 混淆 Josephus traversing map Henon map bit-level image encryption SHA-1 permutation diffusion
  • 相关文献

参考文献4

二级参考文献37

  • 1邱燕,陈斌峰,王艳阳.基于二维超混沌系统的数字图像加密算法[J].陕西国防工业职业技术学院学报,2007,0(4):17-21. 被引量:1
  • 2MATTHEWS R A J. On the derivation of chaotic image encryption algorithm [ J ]. Cryptologia, 1989,13 ( 1 ) : 29- 42.
  • 3FRIDRICH J. Image encryption based on chaotic maps [ C ]//Proc of IEEE international Conference on Systems, Man and Cybemetics. 1997 : 1105-1110.
  • 4FAN Jiu-lun, ZHANG Xue-feng. Image encryption algorithm based on chaotic system[C]//Proe of the 7th International Conference on Computer-Aided Industrial Design and Conceptual Design. 2006: 113- 117.
  • 5CHEN G, MAO Y, CHUI C K. A symmetric image encryption scheme based on 3D chaotic cat maps[J]. Chaos, Solitons and Fractals, 2004,21 (3) :749-761.
  • 6TAHA B A, FOURNIER-PRUNARET A K, BOUALLEGUE D R. A fast color image encryption scheme based on multidimensional chaotic maps[ C]//Proc of the 2nd International Global Information Infrastructure Symposium. 2009 : 1 - 4.
  • 7GMBSS K, CHANDRASEKARAN V. A novel image encryption scheme using Lorenz attractor[ C ]//Proc of the 4th IEEE Conference on Industrial Electronics and Applications. 2009:3653-3657.
  • 8Bourbakis N and Alexopoulos C 1992 Pattern Recogn. 25 567.
  • 9Chang H K and Liu J L 1997 Signal Process. Image Commun. 10 279.
  • 10Scharinger J 1998 J. Electron Eng. 7 318.

共引文献46

同被引文献124

引证文献17

二级引证文献84

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部