首页 | 本学科首页   官方微博 | 高级检索  
     

基于语音信号和混沌序列的非对称图像隐藏方案
引用本文:张小红,闵乐泉. 基于语音信号和混沌序列的非对称图像隐藏方案[J]. 北京科技大学学报, 2005, 27(6): 754-759
作者姓名:张小红  闵乐泉
作者单位:1. 北京科技大学信息工程学院,北京,100083;江西理工大学信息工程学院,赣州,341000
2. 北京科技大学信息工程学院,北京,100083;北京科技大学应用科学学院,北京,100083
基金项目:中国科学院资助项目 , 广东省博士启动基金
摘    要:基于广义混沌同步系统(GS)和广义离散Sinai映射,提出了具有非对称密钥的数字图像安全通讯方案.方案能通过一个常规的语音信号隐藏几乎所有计算机所能识别的图像文件,以实现信息的伪装与隐藏,且含有24个密钥数并能无损恢复隐藏图像,密钥空间可达到10360.该方案能使接收方利用非对称密钥对收到的密文进行数据源真伪性认证和解密,适用于网络数字通讯语音伪装中的图像传输.对密钥空间、密钥参数敏感性和加密图像的相关性等分析表明该方案具有较高的安全性.

关 键 词:广义混沌同步  Sinai映射  图像处理  语音伪装  图像加密  数据源认证  语音信号  混沌序列  非对称  图像传输  隐藏方案  system  chaos synchronization  generalized  based  scheme  image encryption  安全性  分析表  相关性  加密  参数敏感性  语音伪装  数字通讯  网络  解密
收稿时间:2005-04-08
修稿时间:2005-06-18

Non-symmetric digital image encryption scheme based on a generalized chaos synchronization system
ZHANG Xiaohong,MIN Lequan. Non-symmetric digital image encryption scheme based on a generalized chaos synchronization system[J]. Journal of University of Science and Technology Beijing, 2005, 27(6): 754-759
Authors:ZHANG Xiaohong  MIN Lequan
Affiliation:1. Information Engineering School, University of Science and Technology Beijing, Beijing 100083, China; 2. Information Engineering School, Jiangxi University of Science and Technology, Ganzhou 341000, China; 3. Applied Science School, University of Science and Technology Beijing, Beijing 100083, China
Abstract:Based on a generalized chaos synchronization (GCS) system and a generalized Sinai map, a non-symmetric digital cryptographic scheme was proposed. The scheme could hide, in conventional sound signals, various kinds of formatted images which a computer can recognize, realizing information disguise and hiding. This scheme with 24 keys could recover hidden images without any errors. The key space of the scheme was as large as 10~(360). The scheme had data origin authentication function. Even if a receiver could not communicate with the sender of encrypted data, the receiver can still confirm whether the data are altered by an intruder. The scheme could be applied in the internet image transmissions disguised via sound signals. The analysis of the key space, the sensitivity of key parameters and the correlation of encrypted signals implied that this scheme had good security.
Keywords:generalized chaotic synchcronization   Sinai map   sound disguise   image encryption   data sourc eauthentication
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号