首页 | 本学科首页   官方微博 | 高级检索  
     

混沌密钥调制DFRFT旋转因子的视频加密研究
引用本文:金建国,王乐.混沌密钥调制DFRFT旋转因子的视频加密研究[J].中国图象图形学报,2013,18(12).
作者姓名:金建国  王乐
作者单位:河北联合大学,河北联合大学信息工程学院
摘    要:现有FRFT由于旋转因子的单一性很少应用于视频实时加密,而当前单纯混沌加密算法的安全性又存在着诸多缺陷。为此,提出一种新的视频实时加密算法——混沌密钥调制DFRFT旋转因子。该算法将混沌加密与分数阶傅里叶变换进行了有机结合。首先将DFRFT的旋转因子用混沌密钥进行调制,然后用调制后的旋转因子对视频数据进行分数阶傅里叶变换,最终完成了对视频数据的加密系统。本加密系统在技术上实现了视频数据在客户端的实时采集、实时加密;密文在网络上的实时传输、密文在接收端的接收、实时解密和播放。实验结果表明,加、解效果很好,满足了实时性与安全性的要求。对实验结果的理论、安全性分析表明,该算法简单易行、安全性高。该算法的安全性优于单纯的混沌加密算法或单纯傅里叶视频加密算法,且满足了实时性要求。为解决实时性与安全性冲突问题提供了一条新的途径。

关 键 词:视频数据  混沌密钥  分数阶傅里叶变换  旋转因子  实时传输

Video Encryption Based on Chaotic Modulation DFRFT Rotation Factor
jinjianguo and wangle.Video Encryption Based on Chaotic Modulation DFRFT Rotation Factor[J].Journal of Image and Graphics,2013,18(12).
Authors:jinjianguo and wangle
Affiliation:College of Information Engineeringt, Hebei United University
Abstract:Because of the singleness of rotation factor, FRFT is rarely used in real-time video encryption. While at present, the simple chaotic encryption algorithms exists many defects in security. Consequently, a novel real-time video encryption algorithm-chaotic key modulating DFRFT rotation factor was proposed. This algorithm combines chaotic encryption with DFRFT. First, modulate DFRFT rotation factor by chaotic key. Second, utilize the modulated rotation factor to carry on fractional Fourier transform, so as to complete the encryption operation for video data. The encryption system realized real-time acquisition, real-time encryption and transmission of the sender, and real-time reception, real-time decryption and playing of receiving terminal. The experimental results show that the system had a good effect in the encryption and decryption, can meet the real-time and security requirements. The theoretical analysis on experiment results indicated that this algorithm is simple and practicable, high-security. The security of the algorithm is better than simple chaotic encryption algorithm or the simple FRFT encryption algorithm. We can draw a conclusion from results that this algorithm provides a novel mechanism for resolving the dispute between real-time and security.
Keywords:
点击此处可从《中国图象图形学报》浏览原始摘要信息
点击此处可从《中国图象图形学报》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号