首页 | 本学科首页   官方微博 | 高级检索  
     

基于迷宫置换和Logistic混沌映射的图像加密算法
引用本文:杨璐,邵利平,郭毅,师军.基于迷宫置换和Logistic混沌映射的图像加密算法[J].计算机应用,2014,34(7):1902-1908.
作者姓名:杨璐  邵利平  郭毅  师军
作者单位:陕西师范大学 计算机科学学院,西安 710119
基金项目:国家自然科学基金资助项目;教育部高等学校博士学科点专项科研基金资助项目;陕西省科技新星计划资助项目;陕西省自然科学基金资助项目;中央高校基本科研业务费资助项目
摘    要:传统基于置换和混淆的图像加密算法,置换效率低且难以抵抗已知/选择明文攻击,针对此问题,提出基于迷宫置换和Logistic映射的图像加密算法。为提高置换效率,采用深度优先搜索(DFS)迷宫生成算法来高效产生置换;为抵抗已知/选择明文攻击,将待加密图像的消息摘要算法5(MD5)摘要与用户密钥绑定,用以产生迷宫起点坐标、Logistic参数和初值,然后由Logistic映射产生随机数,来决定迷宫置换的节点试探方向和参与混淆,从而使加密环节与明文图像紧密相连。实验表明,所提算法具有较好的加密质量、较高的安全性,且能抵抗已知/选择明文攻击。

关 键 词:图像加密  迷宫置换  Logistic映射  混淆  已知/选择明文攻击
收稿时间:2013-12-12
修稿时间:2014-01-26

Image encryption algorithm based on maze permutation and Logistic chaotic map
YAGN Lu SHAO Liping GUO Yi SHI Jun.Image encryption algorithm based on maze permutation and Logistic chaotic map[J].journal of Computer Applications,2014,34(7):1902-1908.
Authors:YAGN Lu SHAO Liping GUO Yi SHI Jun
Affiliation:School of Computer Science, Shaanxi Normal University,Xi'an Shaanxi 710119,China
Abstract:In conventional permutation and confusion based image encryption algorithm, there usually exists some problems such as inefficient permutation and difficult to resist known or chosen plaintext attack. To solve these problems, an image encryption algorithm based on maze permutation and Logistic mapping was proposed, where Depth First Search (DFS) maze permutation was used to product permutation efficiently. In order to resist known or chosen plaintext attack, the plaintext image Message Digest Algorithm 5 (MD5) digest was bound with the user key to generate maze starting coordinates, Logistic chaotic map parameters and initial values which drive Logistic maps to generate random numbers. These random numbers were used to determine maze node probing directions and participate in image confusion to make all encryption stages tight coupled with the plaintext image. Experiments show the proposed algorithm has better performance in encryption quality and it can resist known or chosen plaintext attack with high security.
Keywords:
本文献已被 CNKI 等数据库收录!
点击此处可从《计算机应用》浏览原始摘要信息
点击此处可从《计算机应用》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号