首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
Multimedia Tools and Applications - The growth of the Internet and rapid development of digital devices and network technology led to increase the risks and threats of attackers, therefore the...  相似文献   

2.
A symmetric key image cryptosystem based on the piecewise linear map is presented in this paper. In this cryptosystem, the encryption process and the decryption process are exactly same. They both include the same operations of plaintext-related scrambling once, diffusion twice and matrix rotating of 180 degrees four times. The length of secret key in the system is 64d where d is a positive integer. The proposed system can fight against the chosen/known plaintext attacks due to the using of plaintext-related scrambling. The simulate results and comparison analysis show that the proposed system has many merits such as high encryption/decryption speed, large key space, strong key sensitivity, strong plaintext sensitivity, strong cipher-text sensitivity, good statistical properties of cipher images, and large cipher-text information entropy. So the proposed system can be applied to actual communications.  相似文献   

3.
本文设计了一种结合Cat和Logistic映射的混合型混沌加密算法。首先文章给出了该图像加解密的算法流程,在置乱变换和扩散变换主要算法程序的基础上,对实验结果从密钥空间、图像的直方图、图像的相关性、图像的信息熵等方面进行了分析,证明该算法对图像信息加解密具有良好的效果。  相似文献   

4.
A bit-oriented quantum public-key encryption scheme is presented. We use Boolean functions as private-key and randomly changed pairs of quantum state and classical string as public-keys. Following the concept of quantum perfect encryption, we prepare the public-key with Hadamard transformation and Pauli transformation. The quantum part of public-keys is various with different classical strings. In contrast to the typical classical public-key scheme, one private-key in our scheme corresponds to an exponential number of public-keys. We investigate attack to the private-key and prove that the public-key is a totally mixed state. So the adversary cannot acquire any information about private-key from measurement of the public-key. Then, the attack to encryption is analyzed. Since the trace distance between two different ciphertexts is zero, the adversary cannot distinguish between the two ciphertext states and also obtains nothing about plaintext and private-key. Thus, we have the conclusion that the proposed scheme is information-theoretically secure under an attack of the private-key and encryption.  相似文献   

5.
Multimedia Tools and Applications - Due to its inherent properties such as sensitivity to initial condition, ergodicity and systematic parametrization chaos systems have been extensively used in...  相似文献   

6.
一种基于混沌序列的多级图像加密方法   总被引:3,自引:0,他引:3  
目前,利用混沌映射产生混沌序列的理论(已经成熟,但是混沌序列发生器总是在有限精度下实现,混沌迭代序列必将退化为周期序列。本论文在结合混沌技术和传统密码理论的基础上提出了一种基于混合混沌序列的图像加密方法,可以克服有效精度效应对混沌系统的影响,从而改善混沌序列特性。通过理论分析和仿真结果表明,这种混合混沌序列具有随机性好,实现容易,周期长等优点。此外,在较低实现精度下,能够得到周期大的序列,为在低成本下得到比较实用的序列密码提供了一种新的思路。  相似文献   

7.
Multimedia Tools and Applications - A new color image encryption algorithm is proposed by using chaotic maps. Cipher image is constructed in three phases. In the first phase permutation of digital...  相似文献   

8.
In this study, a novel quantum steganography algorithm based on LSBq for multi-wavelength quantum images is proposed. In this study, both the text and the binary image messages are embedded into the cover image. The results of simulations and analysis show that our algorithm satisfies the requirements of steganography algorithms. Also, we used modulo method and Hilbert scrambling method for the security of the hidden message. It is seen that an unauthorized person obtains meaningless information when attempting to extract a embedded information through known methods. The results show that the algorithm is robust against attack when several attacks are applied on the stego-image. Finally, we compare our proposed algorithm with the related works. The results of simulation show that the our proposed algorithm has many advantages according to the related algorithms.  相似文献   

9.
10.
本文提出了一种基于混沌密钥的VEA加密算法设计,即通过Logistic混沌系统方程,产生加密的二进制密钥流序列,与图像DCT转换后的DCT系数进行加密,得到加密图像。通过使用混沌密钥进行加密的视频数据,具有安全性高、抵抗攻击能力强等特点。  相似文献   

11.
New approaches to encryption and steganography for digital videos   总被引:1,自引:0,他引:1  
In this work we propose a novel type of digital video encryption that has several advantages over other currently available digital video encryption schemes. We also present an extended classification of digital video encryption algorithms in order to clarify these advantages. We analyze both security and performance aspects of the proposed method, and show that the method is efficient and secure from a cryptographic point of view. Even though the method is currently feasible only for a certain class of video sequences and video codecs, the method is promising and future investigations might reveal its broader applicability. Finally, we extend our approach into a novel type of digital video steganography where it is possible to disguise a given video with another video.  相似文献   

12.
13.
基于混沌的数字图像加密综述   总被引:4,自引:1,他引:4  
为了进一步讨论和完善混沌在数字图像加密领域应用已经取得的成果和存在的问题,简述了该领域的发展历程,总结了混沌作用于图像置乱的两大主流设计思想,对图像置乱的理论基础和主流方案进行了讨论,分析了传统置乱加密算法的弱点和不足。给出了常用的混沌置乱方法,介绍了混沌作用于加密系统的一般思路和应用混沌进行加密时应注意的几个问题,提出了灰度替换和像素置乱算法的评估标准等新见解,并讨论了该领域的发展方向。  相似文献   

14.
Multimedia Tools and Applications - Quantum image steganography is the art and science of hiding secret information into quantum carrier images. This paper proposes a novel quantum image...  相似文献   

15.
Multimedia Tools and Applications - The Internet of Things (IoT) devices is being deployed in almost all aspects of human life starting from smart home, health monitoring, smart metering, to smart...  相似文献   

16.
Multimedia Tools and Applications - Steganography is the technique of hiding any secret information like text, image or video behind a cover file. Audio steganography is one of the widespread data...  相似文献   

17.

In the last few decades, information security has gained huge importance owing to the massive growth in digital communication; hence, driving steganography to the forefront for secure communication. Steganography is a practice of concealing information or message in covert communication which involves hiding the information in any multimedia file such as text, image, or video. Many contributions have been made in the domain of image steganography; however, due to the low embedding capacity and robustness of images; videos are gaining more attention of academic researchers. This paper aims to provide a qualitative as well as quantitative analysis of various video steganography techniques by highlighting their properties, challenges, pros, and cons. Moreover, different quality metrics for the evaluation of distinct steganography techniques have also been discussed. The paper also provides an overview of steganalysis attacks which are commonly employed to test the security of the steganography techniques. The experimental analysis of some of the prominent techniques using different quality metrics has also been done. This paper also presented a critical analysis driven from the literature and the experimental results. The primary objective of this paper is to help the beginners to understand the basic concepts of this research domain to initiate their research in this field. Further, the paper highlighted the real-life applications of video steganography and also suggested some future directions which require the attention of the research community.

  相似文献   

18.
In this paper, a new method based on Block Truncation Coding (BTC) and the halftoning technique is proposed for secret sharing of lossy compressed images. BTC is a simple and efficient image compression technique. However, it yields images of undesirable quality, and significant blocking effects are seen as the block size that is used increases. A modified method known as Enhanced Block Truncation Coding (EBTC) is proposed to solve these problems. For secret sharing, we propose a (2, 2) secret sharing scheme which provides authentication using DE scheme. This scheme was developed for data hiding with grayscale images, but our proposed EBTC uses bitmap images for which the DE scheme is not appropriate. We show the solution for such a problem. Moreover, we reduce the computation complexity for secret sharing using the DE algorithm because past schemes which used polynomial or interpolation algorithms require too much time for secret sharing. In addition, we show how to authenticate a cover image. Experimental results show that our proposed scheme provides secret sharing with proper authentication and acceptable computational complexity.  相似文献   

19.
Multi-level (ML) quantum logic can potentially reduce the number of inputs/outputs or quantum cells in a quantum circuit which is a limitation in current quantum technology. In this paper we propose theorems about ML-quantum and reversible logic circuits. New efficient implementations for some basic controlled ML-quantum logic gates, such as three-qudit controlled NOT, Cycle, and Self Shift gates are proposed. We also propose lemmas about r-level quantum arrays and the number of required gates for an arbitrary n-qudit ML gate. An equivalent definition of quantum cost (QC) of binary quantum gates for ML-quantum gates is introduced and QC of controlled quantum gates is calculated.  相似文献   

20.
提出了一种基于Logistic和Henon混沌映射的图像加密方法.首先利用Logistic混沌动力学系统产生的混沌序列,通过动态量化算法增强其随机性和复杂性,对原始图像进行混沌置乱,得到置乱图像.然后对Henon混沌映射产生的序列进行量化变换,产生"异或"矩阵,与置乱后的图像进行"异或",实现对图像的加密.仿真实验表明,该方法具有良好的加密效果和较强的安全性.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号