首页 | 本学科首页   官方微博 | 高级检索  
     

云环境下基于自然对数序列的似混沌序列图像加密方案
引用本文:张建伟,吴作栋,蔡增玉,王文倩.云环境下基于自然对数序列的似混沌序列图像加密方案[J].计算机应用与软件,2022,39(1):313-318,344.
作者姓名:张建伟  吴作栋  蔡增玉  王文倩
作者单位:郑州轻工业大学软件学院 河南 郑州 450000;郑州轻工业大学计算机与通信学院 河南 郑州 450000
基金项目:国家自然科学基金项目(61672471);河南省科技创新人才计划项目(184200510010);河南省高校科技创新团队支持计划项目(18IRTSTHN012)。
摘    要:针对云计算中图像数据的安全问题,提出一种基于自然对数序列的似混沌序列图像加密方案.提出自然对数序列的概念,验证其似混沌特性;使用二维猫映射对图像进行像素置乱,并在此基础上利用SM3杂凑算法和自然对数序列进行像素值扰乱,得到加密图像;在离散对数的假设下,证明方案具有IND-CCA安全.仿真实验表明,该方案在安全性上与混沌...

关 键 词:自然对数序列  二维猫映射  SM3  杂凑算法  似混沌序列  IND-CPA

CHAOTIC-LIKE SEQUENCE IMAGE ENCRYPTION SCHEME BASED ON NATURAL LOGARITHMIC SEQUENCE IN CLOUD ENVIRONMENT
Zhang Jianwei,Wu Zuodong,Cai Zengyu,Wang Wenqian.CHAOTIC-LIKE SEQUENCE IMAGE ENCRYPTION SCHEME BASED ON NATURAL LOGARITHMIC SEQUENCE IN CLOUD ENVIRONMENT[J].Computer Applications and Software,2022,39(1):313-318,344.
Authors:Zhang Jianwei  Wu Zuodong  Cai Zengyu  Wang Wenqian
Affiliation:(Software Engineering College,Zhengzhou University of Light Industry,Zhengzhou 450000,Henan,China;College of Computer and Communication Engineering,Zhengzhou University of Light Industry,Zhengzhou 450000,Henan,China)
Abstract:Aiming at the security of image data in cloud computing,a chaotic-like sequence image encryption scheme based on natural logarithmic sequences is proposed.Firstly,the concept of natural logarithm sequence was proposed,and its chaotic-like characteristic was verified.Secondly,the two-dimensional cat mapping was used to scramble the pixel position of the image.On this basis,SM3 hash algorithm and the chaotic-like sequence formed by the natural logarithmic sequence were used to disrupt the pixel value to obtain the encrypted image.Finally,under the assumption of the discrete logarithm problem,it is proved that the scheme has IND-CCA security.The simulation results show that the security of the scheme is similar to that of chaotic sequences,and the encrypted image has a larger key space and the ability to resist exhaustive attacks.In terms of efficiency,it has the characteristics of fast encryption and decryption speed and strong real-time,which is suitable for the privacy protection of image data in the cloud environment.
Keywords:Natural logarithmic sequence  Two-dimensional cat mapping  SM3 hash algorithm  Chaotic-like sequence  IND-CPA
本文献已被 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号