首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
基于双混沌映射的快速图像加密新算法   总被引:3,自引:1,他引:2       下载免费PDF全文
提出了一种结合Logistic映射和混合光学双稳模型的对混沌图像加密算法。由Logistic映射和混合光学双稳模型产生的混沌序列分别用来产生图像加密密钥,利用反馈技术增强抵抗各种密码攻击的鲁棒性。仿真结果表明,该密码系统的时间开销很小、密钥空间足以抵抗强力攻击、密文对明文或初始密钥的任何微小变化均有强烈敏感性、密文分布均匀、相邻像素满足零相关性。故该密码系统具有高安全性。  相似文献   

2.
当前单一混沌图像加密算法的图像置乱程度低,导致加密结果易受到已知明文攻击,存在安全性低的问题。本文提出基于复合混沌的鲁棒型医学图像加密算法。设置图像密文反馈机制作为算法实现的理论支持,并读取鲁棒型医学原始图像。根据混沌模型的建立条件,构建复合混沌模型。选择Logistics混沌映射,生成复合混沌序列并进行多次迭代后,置乱加密鲁棒型医学初始图像像素值并进行替换与扩散,生成对应的密钥,从而实现鲁棒型医学图像的加密。通过与传统加密算法的对比,本文方法的置乱位数增加了886位,即置乱程度提升了8.7%,且明密文序列相关性较低、抗明文攻击能力较强,实验结果表明该鲁棒型医学图像加密算法的安全性较高。  相似文献   

3.
Zheng  Jun  Hu  Hanping 《Multimedia Tools and Applications》2021,80(14):20883-20905

In recent years, various chaos-based image encryption algorithms have been proposed to meet the growing demand for real-time secure image transmission. However, chaotic system that is the core component of chaos-based cryptosystem usually degrades under finite computing precision, causing many security issues. In this paper, a novel cryptosystem with analog-digital hybrid chaotic model is proposed. Firstly, the analog Chen chaotic system and the digital Logistic map are adopted to depict the capability of the hybrid model, in which analog system is used to perturb digital system. Dynamic analyses demonstrate that the hybrid method has better complexity, larger chaotic parameter range and good ability to counteract dynamical degradation. The chaos-based key streams generated by the perturbed Logistic map are more suitable for image encryption. Secondly, a parameter selection mechanism is introduced to increase security. The state variables of Chen chaotic system and cipher image are involved in parameter selection process to dynamically change the parameter of the perturbed Logistic map. The involvement of cipher image makes the key streams relevant to plain image and can resist known/chosen-plaintext attacks. Performance, security and comparison analyses indicate that this cryptosystem has high security, low time complexity, and ability to resist common attacks.

  相似文献   

4.
Guo  Shaofeng  Liu  Ye  Gong  Lihua  Yu  Wenqian  Gong  Yunliang 《Multimedia Tools and Applications》2018,77(16):21109-21130

A novel bit-level image cryptosystem is proposed by introducing a new coupled map lattices (CML). The modified non-adjacent spatiotemporal chaotic system with good dynamic performance is constructed by coupling the piecewise-linear chaotic map (PWLCM) in a non-adjacent manner. In the proposed bit-level image cryptosystem, the binary plain image is scrambled globally by a 2D hyper-chaos system. And the confused image is then diffused via the pseudo-random sequences produced quickly and efficiently from the fabricative CML. After converting the diffused binary matrix into its homologous decimal matrix, the cipher image is achieved. Computer simulations and performance comparisons with recent image encryption algorithms demonstrate the superior performance and high security of our proposed cryptosystem.

  相似文献   

5.
The Internet of Medical Things (IoMT) is an online device that senses and transmits medical data from users to physicians within a time interval. In, recent years, IoMT has rapidly grown in the medical field to provide healthcare services without physical appearance. With the use of sensors, IoMT applications are used in healthcare management. In such applications, one of the most important factors is data security, given that its transmission over the network may cause obtrusion. For data security in IoMT systems, blockchain is used due to its numerous blocks for secure data storage. In this study, Blockchain-assisted secure data management framework (BSDMF) and Proof of Activity (PoA) protocol using malicious code detection algorithm is used in the proposed data security for the healthcare system. The main aim is to enhance the data security over the networks. The PoA protocol enhances high security of data from the literature review. By replacing the malicious node from the block, the PoA can provide high security for medical data in the blockchain. Comparison with existing systems shows that the proposed simulation with BSD-Malicious code detection algorithm achieves higher accuracy ratio, precision ratio, security, and efficiency and less response time for Blockchain-enabled healthcare systems.  相似文献   

6.

A novel image encryption framework is proposed in this article. A new chaotic map and a pseudorandom bit generator are proposed. Apart from this, a novel image encryption system is designed based on the proposed map and the proposed pseudorandom bit generator. These three are the major contributions of this work that makes a complete cryptosystem. The proposed new chaotic map is proposed which will be known as the ‘RCM map’ and its chaotic property is studied based on Devaney’s theory. The proposed pseudorandom bit generator is tested using the NIST test suite. The proposed method is simple to implement and does not involve any highly complex operations. Moreover, the proposed method is completely lossless, and therefore cent percent of data can be recovered from the encrypted image. The decryption process is also simple to implement i.e. just reverse of the encryption procedure. A scrambling algorithm is also proposed to further enhance the security of the overall system. The simulation, detailed analysis, and comparative studies of the proposed overall image encryption framework will help to understand the strengths and weaknesses of it. The experimental results are very promising and show the prospects of chaos theory and its usage in the field of data security.

  相似文献   

7.
Thakur  S.  Singh  A. K.  Ghrera  S. P.  Mohan  A. 《Multimedia Tools and Applications》2020,79(7-8):4263-4276

In this paper, a chaotic based secure medical image watermarking approach is proposed. The method is using non sub-sampled contourlet transform (NSCT), redundant discrete wavelet transform (RDWT) and singular value decomposition (SVD) to provide significant improvement in imperceptibility and robustness. Further, security of the approach is ensured by applying 2-D logistic map based chaotic encryption on watermarked medical image. In our approach, the cover image is initially divided into sub-images and NSCT is applied on the sub-image having maximum entropy. Subsequently, RDWT is applied to NSCT image and the singular vector of the RDWT coefficient is calculated. Similar procedure is followed for both watermark images. The singular value of both watermarks is embedded into the singular matrix of the cover. Experimental evaluation shows when the approach is subjected to attacks, using combination of NSCT, RDWT, SVD and chaotic encryption it makes the approach robust, imperceptible, secure and suitable for medical applications.

  相似文献   

8.
为了解决传统Henon映射在密码系统中实现时混沌空间小和安全性低的缺陷,设计了一种改进型Henon映射。通过分岔图、混沌轨道、Lyapunov指数和近似熵分析表明改进型的Henon映射具有更大的混沌空间、更好的遍历性和更高的混沌复杂度,使其更加适用于设计安全的密码系统。基于改进型的Henon映射,提出了一种快速图像加密算法,该算法由多级块置乱和双向块扩散过程构成。在多级块置乱过程,明文图像被分成几个大小不等的图像块,然后对图像块进行置乱操作。在双向块扩散过程,置乱后的图像重新被分成若干个大小相同的图像块,最后对图像块进行块扩散操作得到密文图像。仿真结果和安全性分析表明该算法是安全高效的。  相似文献   

9.
This paper introduces a speech encryption approach, which is based on permutation of speech segments using chaotic Baker map and substitution using masks in both time and transform domains. Two parameters are extracted from the main key used in the generation of mask. Either the Discrete Cosine Transform (DCT) or the Discrete Sine Transform (DST) can be used in the proposed cryptosystem to remove the residual intelligibility resulting from permutation and masking in time domain. Substitution with Masks is used in this cryptosystem to fill the silent periods within speech conversation and destroy format and pitch information. Permutation with chaotic Baker map is used in to maximize the benefits of the permutation process in encryption by using large-size blocks to allow more audio segments to be permutated. The proposed cryptosystem has a low complexity, small delay, and high degree of security. Simulation results prove that the proposed cryptosystem is robust to the presence of noise.  相似文献   

10.
ABSTRACT

In the medical field, advanced techniques like e-health, smart health, and telemedicine applications are in use. These techniques transmit a digital medical image via open-source networks. The digital medical image contains confidential and sensitive information of patients. The transmitted digital medical images are used for diagnosis in the remote center. Hence, providing security and maintaining the confidentiality of the medical image is a major apprehension. In this paper, DNA cryptography and dual hyperchaotic map techniques are proposed to provide high-level security for a digital medical image. The digital medical images are very large in size and require more computational time. To reduce computational time, the selective digital medical image encryption algorithm is proposed. In the proposed cryptosystem, the permutation and diffusion process are performed on selected pixels of digital medical images. To construct theDNA structure for digital medical images, all DNA encoding rules based on the pixel position of the digital medical image are used. The cipher image is attained by using all DNA decoding rules based on the pixel value of the digital medical image. The proposed cryptosystem is resistant to different types of attacks.  相似文献   

11.
混沌密码系统已展现了许多非传统密码系统所具有的优良特性,基于混沌的加密算法层出不穷,同时对混沌密码系统进行安全性分析对混沌密码的发展具有重要意义。对一种改进的基于DNA编码和混沌映射的图像加密方法进行了安全性分析,该算法的核心思想是明文图像的DNA编码矩阵与混沌映射产生的随机矩阵的DNA编码矩阵求和,然后再对这个和矩阵中的元素随机求补即得密文图像。运用选择明文攻击的方法,破解了该算法中的等效密钥,从而利用等效密钥再解密出目标明文。理论分析和实验结果验证了本文选择明文攻击策略的可行性。简要讨论了提高该密码算法安全性的一些改进措施。  相似文献   

12.
Wireless capsule endoscopy (WCE) has several benefits over traditional endoscopy such as its portability and ease of usage, particularly for remote internet of things (IoT)-assisted healthcare services. During the WCE procedure, a significant amount of redundant video data is generated, the transmission of which to healthcare centers and gastroenterologists securely for analysis is challenging as well as wastage of several resources including energy, memory, computation, and bandwidth. In addition to this, it is inherently difficult and time consuming for gastroenterologists to analyze this huge volume of gastrointestinal video data for desired contents. To surmount these issues, we propose a secure video summarization framework for outdoor patients going through WCE procedure. In the proposed system, keyframes are extracted using a light-weighted video summarization scheme, making it more suitable for WCE. Next, a cryptosystem is presented for security of extracted keyframes based on 2D Zaslavsky chaotic map. Experimental results validate the performance of the proposed cryptosystem in terms of robustness and high-level security compared to other recent image encryption schemes during dissemination of important keyframes to healthcare centers and gastroenterologists for personalized WCE.  相似文献   

13.
曾祥秋  叶瑞松 《计算机工程》2021,47(11):158-165,174
经典Logistic映射存在系统参数范围受限、混沌序列分布不均等问题。对Logistic映射进行改进并将其应用于图像加密中,设计一种置乱与扩散同时操作的图像加密算法。对经典Logistic映射增加模运算并对其所生成序列进行二进制比特重排,利用改进Logistic映射生成具有更好混沌特性的伪随机序列并用于加密系统的置乱和扩散阶段。将所生成的伪随机矩阵与明文图像矩阵进行异或操作以实现明文图像预加密。在此基础上,采取置乱与扩散同时操作的策略以置乱和扩散预加密后的图像从而得到密文图像。安全性分析及实验结果表明,该算法具有良好的加密性能和安全性,可以抵抗暴力攻击、差分攻击等常见攻击。  相似文献   

14.
针对彩色图像的有效加密问题,提出了一种基于Logistic 混沌映射和二次剩余密码体制的彩色图像加密方法。首先,使用了一组对称的128比特的密钥,并以此计算Logistic 混沌映射的初始条件和控制参数。然后,通过具有不同参数的两级Logistic 混沌序列对图像像素进行两级置乱。最后,通过二次剩余密码体制对置乱图像中像素值进行改变,实现图像像素的扩散。仿真结果表明,该方法在密钥敏感性、相邻像素相关性、明文敏感性和信息熵等方面具有优越的性能,且加密速度较快。  相似文献   

15.
为了提高图像加密算法的安全性和高效性,提出了一种分段Logistic混沌映射与Cat映射相结合的双混沌系统。首先由改进后的Logistic映射确定选用哪种映射进行迭代,从而确定混沌密钥,最后对算法的安全性进行分析。实验结果表明,该算法的密钥空间较大,并具有较高的初值敏感性和抗攻击能力,是一种新的有效的图像加密算法。  相似文献   

16.
Farah  M. A. Ben  Guesmi  R.  Kachouri  A.  Samet  M. 《Multimedia Tools and Applications》2020,79(27-28):19129-19150

In this paper, we present a new design of cryptosystem characterized by an optimized substitution box (S-box) and random permutation. Our proposed S-box is generated using a modified genetic algorithm. The crossover process is performed with sophisticated research using the best previous population. We use randomness and ergodicity of the logistic map to add complexity and robustness to our proposed method. Many tests proving the nonlinearity of our S-box have been carried out to demonstrate the efficiency of our algorithm. In the second part, we offer a new permutation algorithm based on a chaotic sequence generated from the logistic map. To show the performance of our proposition, we compare our results with previous algorithms. The results of its statistical analysis, like entropy value and correlation between adjacent pixels, show that the proposed image encryption scheme provides security for image encryption. The time speed of the proposed algorithm confirms the possibility of real-time implementation.

  相似文献   

17.
In this paper, a novel secure cryptosystem is proposed for direct encryption of color images, based on transformed logistic maps. The proposed cipher provides good confusion and diffusion properties that ensures extremely high security due to the mixing of colors pixels. The encryption scheme makes use of six odd secret keys and chaotic keys for each operation. The operations include initial permutation of all pixels with six odd keys, nonlinear diffusion using first chaotic key, xoring the second chaotic key with resultant values and zig-zag diffusion with third chaotic key. The proposed scheme supports key sizes ranging from 192 to 400 bits. The security and performance of the proposed image encryption technique have been analysed thoroughly using statistical analysis, key sensitivity analysis, differential analysis, key space analysis, entropy analysis and performance analysis. Results of the various types of analyses are showing that the proposed image encryption technique is more secure and fast and hence suitable for the real-time applications.  相似文献   

18.

We propose a secure image encryption method using the combination of spatial surface chaotic system(SSCS) and the improved AES algorithm structure. In this scheme, the key of cryptosystem is obtained from the SSCS, this system has better encryption characteristics and its model structure fits the image exactly, and it is designed for image cryptosystems contrasted with the existing a lot of low-dimensional chaotic maps and couple map lattices. The plain image is encrypted with the improved AES algorithm and by performing each round encryption, the key is generated by SSCS in each round, an improved permutation algorithm(IPA) and a reverse diffusion have been presented. The proposed scheme not only improves the efficiency because of the same key stream is shared, but also increases the diffusion effect which can resist differential attack. The presented scheme provides huge key space to deal with the brute-force attacks using the round keys obtained by SSCS, and also very sensitive to initial values of SSCS and plain image. The results of simulation analysis and performance evaluation show that the presented cryptosystem provides strong security performance and may be used as a candidate for real-time implementations.

  相似文献   

19.

Due to the recent advancement in the field of the Internet of Medical things (IoMT). To facilitate doctors and patients, in the process of diagnosis and treatment, the medical imaging equipment is connected to the IoMT. During communication over the network, these medical images are subjected to various threads. In this work, we have proposed a dual-layer data confidentiality scheme, firstly it encrypts the secret medical images followed by a data hiding scheme. The encryption scheme possesses diffusion and confusion, for confusion the encryption scheme utilizes logistic and tent maps for the generation of S-boxes. For data hiding, it utilizes Hessenberg and singular value decomposition (SVD). The proposed scheme is applied to highly correlated medical images. The proposed technique provides dual security to the confidential information and makes it difficult for the intruder to extract the confidential information. The encryption scheme is evaluated by using the standard performance indicators including statistical analysis, differential analysis, and NIST analysis, etc. The encrypted images have the highest practically achievable entropy of 7.999 which is closest to the ideal value of 8. The data hiding scheme is evaluated by using statistical analysis, Distance-based analysis, analysis based on pixel difference, and information theory. Both the analysis of encryption and data hiding are satisfactory and the results show the strength of the dual-layer security scheme.

  相似文献   

20.
为了改进彩色图像加密算法的安全性等性能,设计了一种基于耦合映像格子的彩色图像加密算法。首先通过一维鲁棒混沌映射对彩色图像的三个基色矩阵基于比特运算完成预处理的置乱操作并分块,对子矩阵进行轮加密,通过耦合映像格子生成S盒,每一轮加密过程先根据辅助密钥选择S盒进行非线性替换,替换后矩阵再两两组合进行双向加密,实现在分量内扩散加密的同时降低相同像素对应三基色分量的相关性。算法将Logistic映射结合明文信息得到混沌系统的初值,有效提高了加密算法对系统初值和明文的敏感性,理论分析及实验表明该算法具有更好的安全性和加密效果。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号