首页 | 本学科首页   官方微博 | 高级检索  
     

基于改进Logistic映射的混沌图像加密算法
引用本文:曾祥秋,叶瑞松. 基于改进Logistic映射的混沌图像加密算法[J]. 计算机工程, 2021, 47(11): 158-165,174. DOI: 10.19678/j.issn.1000-3428.0059928
作者姓名:曾祥秋  叶瑞松
作者单位:汕头大学 数学系,广东 汕头 515063
基金项目:国家自然科学基金(11771265);广东省普通高等学校重点研究项目(2019KZDXM034);广东省基础与应用基础研究基金(2020B1515310018)。
摘    要:经典Logistic映射存在系统参数范围受限、混沌序列分布不均等问题。对Logistic映射进行改进并将其应用于图像加密中,设计一种置乱与扩散同时操作的图像加密算法。对经典Logistic映射增加模运算并对其所生成序列进行二进制比特重排,利用改进Logistic映射生成具有更好混沌特性的伪随机序列并用于加密系统的置乱和扩散阶段。将所生成的伪随机矩阵与明文图像矩阵进行异或操作以实现明文图像预加密。在此基础上,采取置乱与扩散同时操作的策略以置乱和扩散预加密后的图像从而得到密文图像。安全性分析及实验结果表明,该算法具有良好的加密性能和安全性,可以抵抗暴力攻击、差分攻击等常见攻击。

关 键 词:图像加密  Logistic映射  混沌特性  置乱  扩散
收稿时间:2020-11-06
修稿时间:2021-02-06

Chaotic Image Encryption Algorithm Based on Improved Logistic Map
ZENG Xiangqiu,YE Ruisong. Chaotic Image Encryption Algorithm Based on Improved Logistic Map[J]. Computer Engineering, 2021, 47(11): 158-165,174. DOI: 10.19678/j.issn.1000-3428.0059928
Authors:ZENG Xiangqiu  YE Ruisong
Affiliation:Department of Mathematics, Shantou University, Shantou, Guangdong 515063, China
Abstract:The classical Logistic map suffers from the limited range of system parameters and the uneven distribution of chaotic sequences.In this paper,the Logistic map is improved and applied to image encryption,and on this basis an image encryption algorithm is proposed based on simultaneous scrambling and diffusion operations.Modular operations are added to the classical Logistic map to perform binary bit rearrangement on the generated sequence.Then the improved Logistic map is used to generate pseudo-random sequences with better chaotic features for scrambling and diffusion stages of the cryptosystem.On this basis,the pseudo-random matrix and plain image matrix are bitxored to realize pre-encryption of the plain image.Finally,the scrambling and diffusion operations are performed simultaneously on the pre-encrypted image to get the final encrypted image.Security analysis and experimental results show that the proposed algorithm exhibits excellent encryption performance and high security.It can resists common attacks,such as brute-force attacks and differential attacks.
Keywords:image encryption  Logistic map  chaotic characteristics  scrambling  diffusion  
本文献已被 万方数据 等数据库收录!
点击此处可从《计算机工程》浏览原始摘要信息
点击此处可从《计算机工程》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号