首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
Liu  Ping  Zhang  Tongxun  Li  Xiang 《Multimedia Tools and Applications》2019,78(11):14823-14835
Multimedia Tools and Applications - In this paper, a color image encryption algorithm based on DNA encoding combined with logistic map and spatial map is proposed. Firstly, the algorithm carries...  相似文献   

2.
随着计算机网络的普及和应用,信息安全问题已经成为迫切解决的问题。传统的加密和信息隐藏已不能满足现代通信的需要。该文提出了一种新的基于混沌映射和密钥分享的叠像术,使得信息在网络上的传输更具有安全性。  相似文献   

3.
Multimedia Tools and Applications - In this paper, a novel steganographic scheme is proposed based on chaotic map in the DCT domain. The proposed method apply the DCT on the cover image, scan the...  相似文献   

4.
Multimedia Tools and Applications - In this paper, we propose a novel low dimensional chaotic map, namely, compounded piecewise linear map (CPLM) in order to balance between security and...  相似文献   

5.
Multimedia Tools and Applications - The protection of multimedia content has become a key area of research, since very often a user’s privacy and confidentiality can be at risk. Although a...  相似文献   

6.
This paper, presents a novel chaos-based image steganography algorithm. Because of efficient property of chaos based security systems besides steganography applicability in providing secure communication, chaos based steganography algorithms served as a hot topic in recent researches. The proposed scheme possess novelties and advantageous such as: 1) Introducing a novel 3-dimensional chaotic map (LCA map) with strong chaotic characteristics and maximum Lyapunov exponent 20.58, which is used for generating three chaotic sequences, each of them represents the number of row, column, and colour component, respectively. 2) Utilizing random selection procedure for selecting subsequences with length of 2L, which L is the length of secret message 3) Specifying L pairs of triples host positions for embedding LSBs and MSBs of secret message by using three high level chaotic maps. 4) Entering some parameters dependent on elementary initial values, host image, and secret message features as a key point for adding additional layer of security alongside providing high sensitivity. 5) Providing high capacity for embedding secret message, which is equal to 50 % of whole image capacity (M?×?N?×?12). The proposed method could be applied in different criterion such as, confidential communication and data storing, protection of data alteration, and etc. Our experimental results guarantees that our scheme is not only robust against differential attacks, but also has promising results such as highly sensitive keys, Quality index, PSNR, MSE, and hiding capacity as shown in statistical security analysis.  相似文献   

7.
提出了一种新的基于Lorenz混沌系统的彩色图像加密算法。对Lorenz系统输出的实值混沌序列进行改进,使之近似均匀分布,得到更适合图像加密的伪随机序列。利用改进后的序列生成置乱和变换矩阵,按规则分块对彩色图像三基色分量进行置乱和按位异或等加密运算。仿真实验和安全性分析的结果表明,该算法密钥空间大,具有较好的加密效果和加密效率,且具有较好的抗干扰性。  相似文献   

8.
Multimedia Tools and Applications - In modern technological era image encryption has become an attractive and interesting field for researchers. They work for improving the security of image data...  相似文献   

9.
In this paper, two new one-dimensional chaotic functions are designed using Devaney chaotic definition. And a dynamically shifting compound chaotic function is constructed based on the two new one-dimensional chaotic functions. The properties of compound chaotic functions are also proved. A new feedback image encryption algorithm is designed using the new compound chaos and an image pixel permutation, 3D baker scheme is described in detail. In the scheme, a new dynamic block dividing the 3D baker is put for...  相似文献   

10.
高婷婷  廖晓峰  桑军 《计算机应用》2004,24(8):122-123,126
提出一种基于混沌映射和迭代混合相结合的数字水印技术。为了保证水印信号的低通性,对生成的混沌序列进行Peano扫描,得到最终要嵌入的水印图像。水印的嵌入采用了图像迭代混合的方法。实验结果表明,本方法保证了水印的不可感知性以及鲁棒性,且简单易行,因此具有较高的实用价值。  相似文献   

11.
Multimedia Tools and Applications - In the last decade, with a rapid increase in multimedia productions, image encryption has become a significant part of information security. The inherent image...  相似文献   

12.
Multimedia Tools and Applications - Securing the exchange of digital images in the form of huge multimedia data over the internet with limited bandwidth emerges as a significant and sensitive...  相似文献   

13.
14.
Multimedia Tools and Applications - The security of digital data has been attending more than past, spatially image data security. In this study, a hybrid image encryption method has been proposed...  相似文献   

15.
Pattern Analysis and Applications - Image encryption is sensitive to various attacks due to the high volume of the data and similarity of the pixels in different images. Therefore, the encryption...  相似文献   

16.
Multimedia Tools and Applications - In this paper, we propose a new simple one-dimensional chaotic map. The chaotic characteristics have been declared by using bifurcation analysis and Lyapunov...  相似文献   

17.
基于约瑟夫和Henon映射的比特位图像加密算法   总被引:1,自引:0,他引:1  
针对传统的图像加密算法,加密策略与待加密图像无关且对像素的置换和混淆往往被拆分为两个耦合性较低的孤立环节所带来的安全问题,提出基于约瑟夫遍历和广义Henon映射的图像比特位加密算法,将待加密图像安全哈希算法1(SHA-1)摘要和用户选定的加密参数联合作为密钥,驱动广义Henon映射对改进的用于位点置换的约瑟夫遍历映射的起始位置、报数间隔和报数方向进行随机扰动,从而使不同的加密图像和加密参数实质对应于不同的位点置换过程,并添加了位点混淆过程以提高位点置换的安全性.实验表明,所提算法可有效地抵抗选择性明文攻击,具有较大的密钥空间和较好的加密性能.  相似文献   

18.
Image authentication has come through a history of several years. However, up to the present time, most mainstream image authentication schemes are still unable to detect burst bit errors. Moreover, the capability of recovering tampered pixels in detail (complex) areas has not been very satisfactory either. In this paper, we offer to combine the Hamming code technique, Torus automorphism and bit rotation technique to do tamper proofing. According to our experimental results, our new hybrid method can effectively eliminate burst bit errors, and our recovered pixels in detail areas can actually gain very high clarity. The results show that our scheme is quite a practical method, which is quite able to detect and recover tampered areas.  相似文献   

19.
Neural Computing and Applications - In recent years, many researchers have used chaos maps to encrypt digital images due to their unpredictability, ergodicity, and sensitivity to initial values....  相似文献   

20.
一种基于Logistic混沌系统的图像加密新算法   总被引:6,自引:0,他引:6  
文章提出了一种新的基于混沌映射的加密算法,将图像的像素值换算为二进制,然后利用混沌序列对其某几位变换来实现加密。该方法不需要对轨道分布的先验知识,不只适用于Logistic混沌系统,而且很好地利用了混沌的特性。实验结果表明,该算法密钥敏感、密钥空间大,可有效保障加密图像的安全。同时研究了加密图像直方图的安全性。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号