首页 | 本学科首页   官方微博 | 高级检索  
     检索      

基于两种独立混沌函数的图像加密算法
引用本文:张文娟,王大羽,余梅生.基于两种独立混沌函数的图像加密算法[J].重庆邮电大学学报(自然科学版),2017,29(2):232-239.
作者姓名:张文娟  王大羽  余梅生
作者单位:1. 周口师范学院 计算机科学与技术学院,河南 周口,466001;2. 燕山大学 信息科学与工程学院,河北 秦皇岛,066004
基金项目:国家自然科学基金(61203304);河南省高等学校重点科研项目(16A520106);河南省科技厅科技攻关项目(162102310590)
摘    要:为了使图像加密算法中的并行计算能有效地提高加密算法的置乱和扩散功能,利用2种独立混沌函数对系统初始化,使用了置乱和扩散原则来处理任何熵结构的图像数据,提出的算法适合2个方面的并行计算.同时计算2种独立的混沌函数,而不需要等待另外一个函数;通过整数算法可以将算法中一些等式转换成另外一种形式.加密图像表明,这些操作能有效扩散加密图像中像素对应的明文图像中单像素值的无穷小变化.与其他算法相比,复杂度中的密钥空间、安全性和加密速度分析验证了提出的算法所需操作更少.统计分析、密钥敏感度和密钥空间分析、明文图像敏感度分析和速度测试表明,提出的算法拥有更高的安全性和有效性.

关 键 词:图像加密  置乱和扩散  混沌函数  密钥空间  安全性
收稿时间:2016/5/30 0:00:00
修稿时间:2016/10/20 0:00:00

Research of image encryption algorithm based on two independent chaotic functions
ZHANG Wenjuan,WANG Dayu and YU Meisheng.Research of image encryption algorithm based on two independent chaotic functions[J].Journal of Chongqing University of Posts and Telecommunications,2017,29(2):232-239.
Authors:ZHANG Wenjuan  WANG Dayu and YU Meisheng
Institution:School of Computer Science and Technology, Zhoukou Normal University, Zhoukou 466001, P.R. China,School of Computer Science and Technology, Zhoukou Normal University, Zhoukou 466001, P.R. China and School of Information Science and Engineering, Yanshan University, Qinhuangdao 066004, P.R. China
Abstract:In order to improve scrambling and diffusion function by using parallel computing in encryption algorithm, two independent chaotic functions are used to initialize the system, the use of scrambling and diffusion principle is used to deal with any entropy images. This algorithm is suitable for two aspects of parallel computing. Firstly, two kinds of chaotic independent functions are calculated simultaneously, without waiting for another function; Secondly, the integer algorithm can convert some equations into another form. The encrypted images show these operations are effective for diffusing an infinitesimal change in single pixel intensity of plain image on many pixels in cipher image. Compared with other algorithms, that the needing operations of proposed method is less verified by the complex space of secret key, security analysis and analysis of encoding speed. Statistical analysis, key sensitivity analysis, analysis of secret key space and sensitivity analysis of plain image and speed tests prove that this algorithm has higher safety and effectiveness.
Keywords:image encryption  scrambling and diffusion  chaotic function  key space  security analysis
本文献已被 万方数据 等数据库收录!
点击此处可从《重庆邮电大学学报(自然科学版)》浏览原始摘要信息
点击此处可从《重庆邮电大学学报(自然科学版)》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号