共查询到20条相似文献,搜索用时 15 毫秒
1.
A novel image encryption algorithm using the random fractional DCT (RFrDCT) and the chaos-based Game of Life (GoL) is presented here. Firstly the plaintext image is transformed by the reality-preserving RFrDCT into the RFrDCT domain, and a preliminary encryption output is obtained. And then a combination of the confusion and diffusion (C&D) processes is performed in the transform domain, where the confusion process is carried out by GoL, and the diffusion process is carried out by an XOR operation. Therefore a more random-like encryption result can be obtained after further encryption by the C&D. Both the GoL and XOR operation are based on chaos whose control parameters serve as cipher keys in order to enlarge cipher space and enhance key sensitivity. Theoretical analysis and simulation experiments for the proposed algorithm are described, the desirable encryption performance is obtained, and it is secure against various common attacks. 相似文献
2.
构造了一个只有一个平衡点的四维超混沌系统,此系统表现出丰富的多稳态特性,亦具有多翼吸引子。数值分析了系统的动力学特性,仿真了系统的模拟电路和数字电路,探讨了系统的动态复杂度,测试了系统超混沌序列的随机性。分析结果表明,在多组参数值下,系统均存在不同类型的吸引子共存,譬如:两个周期吸引共存,周期与拟周期吸引子共存,双翼混沌与超混沌吸引子共存,两个双翼混沌吸引子共存,双翼与四翼混沌吸引子共存,两个双翼超混沌吸引子共存,两个双翼拟周期吸引子共存,两个双翼超混沌、四翼混沌、四翼超混沌等四个吸引子共存。系统的数字电路和模拟电路的仿真结果均与数值分析结果一致,表明了系统的可实现性。另外,在混沌和超混沌状态下系统复杂度高,且超混沌序列通过了SP800-22 Revla的15项随机测试。 相似文献
3.
A novel image encryption technique based on a reality-preserving fractional discrete cosine transform (FrDCT) and a chaos-based generating sequence is proposed. The FrDCT is a generalization of the discrete cosine transform (DCT). This reality-preserving FrDCT inherits the virtues of both the DCT and fractional transform, providing improved security and flexibility by employing the generating sequence as an extra key in addition to the fractional orders. The most fascinating advantage of the FrDCT is its reality-preserving property, which ensures real ciphertext for real plaintext, which is conducive to display, storage, and transmission. Performance and security analysis demonstrates that this algorithm is valid, secure, sensitive to keys, and robust to noise and occlusion attacks. 相似文献
4.
5.
一种基于人眼感知特性的彩色图像压缩算法 总被引:3,自引:3,他引:0
目的研究结合人眼感知特性的彩色图像压缩技术。方法结合人眼对比度敏感视觉特性及其数学模型,基于彩色图像频谱特征,提出一种适合于彩色图像的压缩算法方案,并对图像进行3种压缩比的压缩仿真实验。结果提出的压缩算法方案在完全不影响人眼观察的情况下压缩比可达15∶1,压缩比达到64.1538∶1时,解压缩图像仍能在一定的误差范围内达到较好的视觉效果,且PSNR仍能达到30 dB以上。结论提出的压缩算法方案在保证图像压缩质量的前提下能够实现较高的压缩比,完全可以满足实际生活中彩色图像存储和传输的需要。 相似文献
6.
为验证图像压缩算法122.0-B-0对遥感图像的有效性,在对该算法进行了较为详细的研究后,对该算法进行了软件实现,然后将该算法与JPEG2000、SPIHT算法在压缩效率及压缩速度上进行了比较.实验结果表明:该算法在较低码率下压缩性能与JPEG2000、SPIHT算法相当,在较高码率下压缩性能略微下降,但在相同码率下它的编码速度比JPEG2000快2倍左右,比SPIHT算法约快1.5倍左右,且编解码速度与码率成正比.该算法采用的编码方式相对简单,无反馈操作,可适应于不同内存大小的压缩系统,并采用分段编码有效地防止误码扩散,因此在空间飞行器上具有巨大的应用价值. 相似文献
7.
Jinan Zhu Xiangfeng Meng Yurong Wang Yongkai Yin Xiaowen Sun 《Journal of Modern Optics》2018,65(3):306-313
An optical image encryption method with multiple light paths is proposed based on compressive ghost imaging. In the encryption process, M random phase-only masks (POMs) are generated by means of logistic map algorithm, and these masks are then uploaded to the spatial light modulator (SLM). The collimated laser light is divided into several beams by beam splitters as it passes through the SLM, and the light beams illuminate the secret images, which are converted into sparse images by discrete wavelet transform beforehand. Thus, the secret images are simultaneously encrypted into intensity vectors by ghost imaging. The distances between the SLM and secret images vary and can be used as the main keys with original POM and the logistic map algorithm coefficient in the decryption process. In the proposed method, the storage space can be significantly decreased and the security of the system can be improved. The feasibility, security and robustness of the method are further analysed through computer simulations. 相似文献
8.
Ahmed S. Salama Mohamed Amr Mokhtar Mazhar B. Tayel Esraa Eldesouky Ahmed Ali 《计算机、材料和连续体(英文)》2021,68(1):431-446
Assuring medical images protection and robustness is a compulsory necessity nowadays. In this paper, a novel technique is proposed that fuses the wavelet-induced multi-resolution decomposition of the Discrete Wavelet Transform (DWT) with the energy compaction of the Discrete Wavelet Transform (DCT). The multi-level Encryption-based Hybrid Fusion Technique (EbhFT) aims to achieve great advances in terms of imperceptibility and security of medical images. A DWT disintegrated sub-band of a cover image is reformed simultaneously using the DCT transform. Afterwards, a 64-bit hex key is employed to encrypt the host image as well as participate in the second key creation process to encode the watermark. Lastly, a PN-sequence key is formed along with a supplementary key in the third layer of the EbHFT. Thus, the watermarked image is generated by enclosing both keys into DWT and DCT coefficients. The fusions ability of the proposed EbHFT technique makes the best use of the distinct privileges of using both DWT and DCT methods. In order to validate the proposed technique, a standard dataset of medical images is used. Simulation results show higher performance of the visual quality (i.e., 57.65) for the watermarked forms of all types of medical images. In addition, EbHFT robustness outperforms an existing scheme tested for the same dataset in terms of Normalized Correlation (NC). Finally, extra protection for digital images from against illegal replicating and unapproved tampering using the proposed technique. 相似文献
9.
In this paper, we propose a new quick response (QR) code-based non-linear technique for image encryption using Shearlet transform (ST) and spiral phase transform. The input image is first converted into a QR code and then scrambled using the Arnold transform. The scrambled image is then decomposed into five coefficients using the ST and the first Shearlet coefficient, C1 is interchanged with a security key before performing the inverse ST. The output after inverse ST is then modulated with a random phase mask and further spiral phase transformed to get the final encrypted image. The first coefficient, C1 is used as a private key for decryption. The sensitivity of the security keys is analysed in terms of correlation coefficient and peak signal-to noise ratio. The robustness of the scheme is also checked against various attacks such as noise, occlusion and special attacks. Numerical simulation results are shown in support of the proposed technique and an optoelectronic set-up for encryption is also proposed. 相似文献
10.
利用人眼对比度感知特性,计算了包装印刷图像的最小感知觉察误差阈值,通过阈值对图像的DCT变换系数进行量化,再采用Huffman编码方法实现编码,并通过实验验证。实验获得其峰值信噪比为49.647 1dB,压缩比达到11.497 7,编码效率达到0.743 8,即从客观评价上衡量数据压缩性能的指标均达到了较好的效果,证明了解码图像与原始图像间的差异较小,且从主观上人眼几乎不能分辨其差异,说明图像使用的压缩技术不会对图像的品质产生影响。该压缩算法既能达到一定的压缩效果,又能不影响包装印刷图像的观测效果,所以能够较好地满足包装印刷图像传输的要求。 相似文献
11.
12.
《成像科学杂志》2013,61(3):183-190
AbstractIn this paper, a modelled image encryption scheme is presented, of which generalised circulant matrix is employed together with dynamical chaotic system. The strong correlations among adjacent pixels in plain-image can be declined greatly by the proposed scheme. Meanwhile, the diffusion transform is considered simultaneously to avoid statistical analysis, known plaintext and chosen plaintext attack. The experimental results show that the proposed scheme can suggest an efficient way to hide the image information, and has the advantages of large key space, sensitive to initial conditions and zero correlation between adjacent pixels in cipher-image. Moreover, the grey values in the cipher-image are distributed symmetrically. The proposed image scheme can be applied to practical image information transmission and protection in the public. 相似文献
13.
提升方案结合改进SPIHT的快速图像压缩方法 总被引:5,自引:1,他引:5
针对传统小波变换过程复杂的缺点和 SPIHT 算法编码过程重复运算、存储量大的问题,提出了基于提升方案快速 SPIHT 的压缩方法。该方法采用提升方案弥补传统小波变换的不足,提高了图像的重构质量和小波变换速度,并引入“最小阈值”、“最小输出位”和“最大值表”的思想对SPIHT 算法加以改进,降低了编解码过程的运算复杂度和时间消耗。实验证明,该算法较传统方法编解码速度提高了2.5倍,重构图像的峰值信噪比亦有所提高,是一种有效的快速图像压缩方法。 相似文献
14.
Based on the fractional discrete cosine transform with multiple generating sequences (MGSFrDCT) and the dependent scrambling and diffusion (DSD), an image encryption algorithm is proposed, in which the multiple-generating sequences greatly enlarge the key space of the encryption system. The real-valued output of MGSFrDCT is beneficial to storage, display and transmission of the cipher-text. During the stage of confusion and diffusion, the locations and values of all MGSFrDCT transformed coefficients change due to DSD, and the initial values and fractional orders of encryption system depend not only on the cipher keys but also on the plain-image due to introduction of a disturbance factor, which allows the encryption system to resist the known-plaintext and chosen-plaintext attacks. Experimental results demonstrate that the proposed encryption algorithm is feasible, effective and secure and able to resist common classical attacks. 相似文献
15.
一种基于YC-rC-b颜色空间和视觉特性的彩色图像水印技术 总被引:5,自引:5,他引:0
根据图像离散余弦变换频谱图特征及结合人眼对亮度和颜色的对比度敏感视觉特性,提出了一种人眼感知图像最小误差即JND阈值的计算方法,通过计算出的JND阈值,提出了一种基于YCrCb颜色空间的彩色图像水印技术方案。方案依据JND阈值筛选彩色图像的3个分量亮度图变换域频谱系数来进行水印的嵌入和提取。从水印技术方案上看,JND阈值的引入使得水印的嵌入达到最大;嵌入算法使得水印嵌入的位置具有随机性,有力地保证了水印信息的安全性。仿真实验和攻击测试表明:含水印图经压缩攻击后的图像与原始图像基本一样,提取的水印信息与原始水印基本相同;攻击后的含水印图具有较好的透明性和较高的鲁棒性。提出的基于YCrCb颜色空间和人眼视觉特性的彩色图像水印技术方案,是一种可行的、较好的彩色图像技术。 相似文献
16.
17.
《成像科学杂志》2013,61(5):294-304
AbstractIn order to solve the problem of short cycle and low precision of one-dimensional (1D) chaotic function, the new compound two-dimensional chaotic function is presented by exploiting two 1D chaotic functions which are switched randomly. A new chaotic sequence generator is designed by the compound chaos and linear feedback shift register (LFSR). The random properties of compound chaotic functions and LFSR are also proved rigorously. The novel bilateral-diffusion image encryption algorithm and permutation algorithm are proposed based on the compound chaotic function and LFSR, which can produce more avalanche effect and larger key space. The entropy analysis, differential analysis, statistical analysis, cipher random analysis and cipher sensitivity analysis are introduced to test the security of new scheme. The results show that the novel image encryption method passes SP 800-22 standard tests and solves the problem of short cycle and low precision of 1D chaotic function. 相似文献
18.
研究了文件保护的加解密技术。针对文件采用过滤驱动模型进行加解密导致文件标识不统一与内存明文泄露风险增加等安全问题,设计了一种hook机制和过滤驱动方法相结合的加解密模型。该模型采用过滤驱动方法对文件进行加解密,同时引入hook机制对内存中文件操作行为进行捕获,使得加解密前后的文件具有相同标识,在保证用户原有文件操作习惯的同时,实现了文件内存明文恢复风险的降低。理论分析和试验结果表明,该模型在三种加密模式下,可以针对不同文件进行快速加解密,同时较过滤驱动加解密模型,其恢复风险下降3%以上。 相似文献
19.
简介PKS系统的控制功能,详细介绍了运用PKS系统对空压机实施控制的方案和内容,经实际运行,控制方案有效、可靠。 相似文献
20.