共查询到20条相似文献,搜索用时 0 毫秒
1.
2.
Riyahi Milad Kuchaki Rafsanjani Marjan Motevalli Rouzbeh 《Neural computing & applications》2021,33(21):14311-14326
Neural Computing and Applications - In recent years, many researchers have used chaos maps to encrypt digital images due to their unpredictability, ergodicity, and sensitivity to initial values.... 相似文献
3.
Multimedia Tools and Applications - In this paper, a plaintext related image hybrid encryption scheme is proposed based on Lagrange interpolation, generalized Henon map and nonlinear operations of... 相似文献
4.
为保证红外成像系统中红外图像的信息安全,克服采用传统图像加密时方法安全性不高、实时性差的缺陷,在分析红外图像比特为平面特征的基础上,提出了利用Lorenz混沌系统对红外图像进行加密的方案。在方案中,采用Lorenz混沌系统,针对红外图像比特位平面影响因子分布特征,只加密红外图像的最高四个比特位平面,一次性实现图像横、纵坐标和比特位平面加密,将图像加密层次由像素级扩展到比特级。和传统图像加密算法相比,该方案基于红外图像独特的位平面分布特征,加密速度快,性能好,能有效抵抗穷举攻击,具有良好的抗干扰性能和较高的置乱度。该方案可应用于安全级别要求高的红外监控系统中,提高系统安全性,有效防止黑客入侵。 相似文献
5.
Leo Yu Zhang Chengqing Li Kwok-Wo Wong Shi Shu Guanrong Chen 《Journal of Systems and Software》2012,85(9):2077-2085
Recently, a chaos-based image encryption algorithm with an alternate structure (IEAS) was proposed. This paper applies the differential cryptanalysis on the IEAS and finds that some of its properties favor the differential attack which can recover an equivalent secret key with only a few number of chosen plain-images. Detailed procedures for cryptanalyzing IEAS with a lower round number are presented. Both theoretical analysis and experimental results are provided to show the vulnerability of IEAS against differential attack. In addition, some other security defects of IEAS, including insensitivity with respect to changes of plain-images and insufficient size of the key space, are also pointed out and verified. 相似文献
6.
李波 《计算机工程与设计》2010,31(24)
针对图像等多媒体信息的特点,提出一种结合了两种混沌映射,即基于区间数目参数化的混沌映射与标准映射的数字图像加密算法.通过基于区间数目参数化的混沌映射产生混沌实数序列,将其转化为加密需要的伪随机二值序列,然后用该伪随机序列和标准映射变换进行数字图像加密.最后从理论和数字仿真实验两方面对算法的安全性进行分析,仿真实验结果表明,该算法是一个具有较好的安全性能和抗攻击能力的混沌加密算法. 相似文献
7.
8.
Multimedia Tools and Applications - In the last decade, with a rapid increase in multimedia productions, image encryption has become a significant part of information security. The inherent image... 相似文献
9.
Inspite of progressive growth of cryptography, encrypting sensitive information of an image is still a computationally complex task. After reviewing existing literature, it is now known that security problems are yet not solved and there is an open scope of further research. In most recent times, it has been noticed that neural network has proven cost effective optimization mechanism in offering security towards images. However, such implementation are computationally expensive process and do not solve various diversified attacks on image. Hence, the prime purpose of proposed system is to introduce an analytical research methodology for presenting a sophisticated framework where deep neural network has been used for optimizing the performance of simple encryption approaches. The robustness of optimization principle is further added with chaotic map concept for enhanced security performance. The study outcome shows that proposed implementation offers much better security performance without any negative effect on image quality. 相似文献
10.
Sayed Wafaa S. Tolba Mohammed F. Radwan Ahmed G. Abd-El-Hafiz Salwa K. Soliman Ahmed M. 《Multimedia Tools and Applications》2021,80(4):5373-5402
Multimedia Tools and Applications - This paper presents a multi-mode generalized modified transition chaotic map and a switched chaotic encryption scheme based on it. Eight different modes of... 相似文献
11.
Xuanping Zhang Xing Fan Jiayin Wang Zhongmeng Zhao 《Multimedia Tools and Applications》2016,75(4):1745-1763
Chaos-based image cryptosystems usually adopt the traditional confusion-diffusion architecture which is considered insecure against known/chosen plaintext attacks. To overcome this drawback, this paper proposes a novel chaos-based image encryption scheme, in which the two-dimensional rectangular transform is employed to directly scramble the image of any rectangular size, and the dependent substitution is introduced to substitute for each pixel according to the image pixels. This scheme comprises two stages of encryption processes. Each stage provides the confusion and diffusion simultaneously in one traverse of image pixels. As a result, the proposed scheme has high speed and achieves a satisfactory security performance. Experimental results and various types of security analysis indicate that this scheme is efficient and secure enough to be used for practical image encryption and transmission. 相似文献
12.
提出了一种新的基于Lorenz混沌系统的彩色图像加密算法。对Lorenz系统输出的实值混沌序列进行改进,使之近似均匀分布,得到更适合图像加密的伪随机序列。利用改进后的序列生成置乱和变换矩阵,按规则分块对彩色图像三基色分量进行置乱和按位异或等加密运算。仿真实验和安全性分析的结果表明,该算法密钥空间大,具有较好的加密效果和加密效率,且具有较好的抗干扰性。 相似文献
13.
14.
15.
Pak Chanil An Kwangil Jang Paeksan Kim Jonggun Kim Sok 《Multimedia Tools and Applications》2019,78(9):12027-12042
Multimedia Tools and Applications - This paper introduces new simple and effective improved one-dimension(1D) Logistic map and Sine map made by the output sequences of two same existing 1D chaotic... 相似文献
16.
El Hanouti Imad El Fadili Hakim Zenkouar Khalid 《Multimedia Tools and Applications》2021,80(4):4975-4997
Multimedia Tools and Applications - Recently, a novel image encryption based on Arnold scrambling and Lucas series has been proposed in the literature. The scheme design is based on... 相似文献
17.
Multimedia Tools and Applications - In modern technological era image encryption has become an attractive and interesting field for researchers. They work for improving the security of image data... 相似文献
18.
基于分段非线性混沌映射设计了一种流密码加密方案。用Logistic映射的输出作为分段非线性映射的分段参数,以Henon映射输出的混沌序列经运算后得到迭代次数,分段非线性混沌映射的输出与明文相加取模后生成密文。仿真实验和安全性分析表明,该方案的密钥空间大,对明文和密钥敏感,能有效抵抗穷举攻击、差分攻击和统计攻击,且实时性较好。 相似文献
19.
This paper proposes several image encryption schemes for popular image formats as Joint Photographic Experts Group (JPEG), Graphics Interchange Format (GIF), Portable Network Graphics (PNG), and Tagged Image File Format (TIFF). A cross chaotic map proposed based on Devaney's theory and dynamic block dividing of the 3D baker using the cross chaotic map are used for diffusion and permutation in encryption. Moreover, in order to verify user's identity, authentication is carried out using information hiding based on the cross chaotic function. In our methods, image files syntax and structure are not destructed, and the original image can be recovered lossless. For GIF, it keeps the property of animation successfully. The security test results indicate the proposed methods have high security, and the speed of our algorithm is faster than classical solutions. JPEG, GIF, TIFF and PNG image formats are popular contemporarily. Therefore this paper shows that the prospect of chaotic image encryption is promising. 相似文献
20.
数字图像具有数据量大、冗余度高、像素间关联性强等特点,打破数据间关联性及提高敏感性是保护图像信息的关键。针对如何快速有效打破图像像素间强关联性、提高图像数据敏感性等问题,提出基于logistic混沌映射的分块循环DNA图像加密算法。算法采用二次置乱、一次扩散结构,首先通过zigzag变换置乱明文图像,打破明文像素间的强关联性;其次将伪随机序列生成器产生的密钥作为混沌参数进行混沌映射,生成动态DNA编/解码、运算规则,对置乱的明文图像进行DNA编码形成初始密文;然后利用DNA运算规则,对初始密文进行分块循环DNA运算,完成密文扩散,并对DNA碱基进行统计和归一化作为二次混沌密钥;最后采用二次混沌映射生成动态步长规则,对密文进行变步长约瑟夫置乱,利用DNA解码规则形成最终密文图像。实验结果表明,密文图像像素分布均匀、像素间关联性弱、密钥敏感性强、密钥空间足够大,能够有效抵御信息分析、暴力、噪声、剪切等常见攻击,具有较高的安全性。 相似文献