首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
Multimedia Tools and Applications - In modern technological era image encryption has become an attractive and interesting field for researchers. They work for improving the security of image data...  相似文献   

2.
In this paper, a new image encryption scheme is proposed with high sensitivity to the plain image. In proposed scheme, two chaotic functions and logical operator xor are used. Image encryption process includes substitution of pixels and permutation. Using the new method of substitution, algorithm sensitivity somewhat has elevated to changes in the plain image that by changing a single pixel of the plain image, amount of NPCR reaches 100 %. Results of tests show that the cipher image does not give any information of statistical such as entropy, histogram and correlation of adjacent pixels to attackers. Also the proposed scheme has the wide key space and is so safe to the noise ratio and compression.  相似文献   

3.
Recently, several cryptosystems based on chaos have been proposed. Nevertheless, most of them hinder the system performance, security, and suffer from the small key space problem. This paper introduces an efficient symmetric encryption scheme for secure digital images based on a cyclic elliptic curve and chaotic system that can overcome these disadvantages. The cipher encrypts 256-bit of plainimage to 256-bit of cipherimage within eight 32-bit registers. The scheme generates pseudorandom bit sequences for round keys based on a piecewise nonlinear chaotic map. Then, the generated sequences are mixed with the key sequences derived from the cyclic elliptic curve points. Results of statistical and differential analysis demonstrate that the proposed algorithm has adequate security for the confidentiality of digital images. Furthermore, it has key sensitivity together with a large key space and the encryption is fast compared to other competitive algorithms.  相似文献   

4.
王聪丽  陈志斌  葛勇 《计算机应用》2015,35(8):2205-2209
为保证红外成像系统中红外图像的信息安全,克服采用传统图像加密时方法安全性不高、实时性差的缺陷,在分析红外图像比特为平面特征的基础上,提出了利用Lorenz混沌系统对红外图像进行加密的方案。在方案中,采用Lorenz混沌系统,针对红外图像比特位平面影响因子分布特征,只加密红外图像的最高四个比特位平面,一次性实现图像横、纵坐标和比特位平面加密,将图像加密层次由像素级扩展到比特级。和传统图像加密算法相比,该方案基于红外图像独特的位平面分布特征,加密速度快,性能好,能有效抵抗穷举攻击,具有良好的抗干扰性能和较高的置乱度。该方案可应用于安全级别要求高的红外监控系统中,提高系统安全性,有效防止黑客入侵。  相似文献   

5.
In this paper, we suggest a block image encryption algorithm which can give us an efficient scheme to hide and encrypt image data. Only the diffusion function, instead of classical permutation plus diffusion operations, is adopted. The plain-image is firstly divided into two equal parts randomly by vertical, horizontal, or diagonal directions. Then encryption of one part depends on the other part, in which the keystream is generated by the plain-image, i.e., one of the two parts. An error concept is added in the initial conditions in every round. It means that the keystreams are different in the process of encryption steps. The error may be positive or negative decided by a rule of sign function. Experiment results show that the proposed method can provide a high security of cryptosystem, and can reduce the computation redundancy compared with that of the traditional architectures such as Arnold map based method, and totally shuffling based method.  相似文献   

6.
Multimedia Tools and Applications - In the current decade, chaos based image encryption has distinctly captured a remarkable position in multimedia data security. In this paper, a hybrid chaos...  相似文献   

7.
In numerous encryption frameworks, the first information is changed into encoded form by applying nonlinear substitutions and affecting diffusion. The goal of the nonlinear change is to accomplish high level of randomness in the image content. The choice of the source of randomness is critical because the success in cryptanalysis is demarked by the characteristics identified in the encrypted data. The chaotic frameworks show random conduct that is suitable for encryption applications where nonlinear transformations are needed in the middle of plaintext and the scrambled information. The application of nonlinear functional chaos-based system with embedded chaotic systems and binary chaotic sequences can prompt randomness and diffusion in the information. In addition to the high state of randomness, the requirement for various round keys is needed in a run of the mill substitution–permutation process. The proposed strategy kills the requirement for different round keys, which is suitable for high-speed communication frameworks. The measurable analyses performed on the proposed nonlinear algorithm which show improvement in encryption quality and safety against numerous brute-force and statistical attacks. Also, the proposed framework demonstrates high safety against differential and linear cryptanalysis.  相似文献   

8.
Due to the interesting nonlinear dynamic properties of chaotic maps, recently chaos-based encryption algorithms have gained much attention in cryptographic communities. However, many encryption schemes do not fulfil the minimum key space requirement, which is an essential concern in many secure data applications. In this paper, an efficient chaos-based image encryption scheme with higher key space is presented. Even with a single round of encryption, a significantly larger key space can be achieved. The proposed scheme removes correlation among image pixels via random chaotic sequences, simply by XOR and addition operations. In order to resist against numerous attacks, we apply the affine transformation to get the final ciphertext image. The security of the proposed scheme is proved through histogram, contrast, PSNR, entropy, correlation, key space, key sensitivity and differential attack analysis. Many significant properties of chaotic maps, sensitivity to initial condition and control parameters, structure and attack complexity, make the anticipated scheme very reliable, practical and robust in various secure communication applications.  相似文献   

9.
一种基于Logistic混沌系统的图像加密新算法   总被引:6,自引:0,他引:6  
文章提出了一种新的基于混沌映射的加密算法,将图像的像素值换算为二进制,然后利用混沌序列对其某几位变换来实现加密。该方法不需要对轨道分布的先验知识,不只适用于Logistic混沌系统,而且很好地利用了混沌的特性。实验结果表明,该算法密钥敏感、密钥空间大,可有效保障加密图像的安全。同时研究了加密图像直方图的安全性。  相似文献   

10.
This paper presents a novel image encryption/decryption algorithm based on chaotic neural network (CNN). The employed CNN is comprised of two 3-neuron layers called chaotic neuron layer (CNL) and permutation neuron layer (PNL). The values of three RGB (Red, Green and Blue) color components of image constitute inputs of the CNN and three encoded streams are the network outputs. CNL is a chaotic layer where, three well-known chaotic systems i.e. Chua, Lorenz and Lü systems participate in generating weights and biases matrices of this layer corresponding to each pixel RGB features. Besides, a chaotic tent map is employed as the activation function of this layer, and makes the relationship between the plain image and cipher image nonlinear. The output of CNL, i.e. the diffused information, is the input of PNL, where three-dimensional permutation is applied to the diffused information. The overall process is repeated several times to make the encryption process more robust and complex. A 160-bit-long authentication code has been used to generate the initial conditions and the parameters of the CNL and PNL. Some security analysis are given to demonstrate that the key space of the new algorithm is large enough to make brute-force attacks infeasible and simulations have been carried out with detailed numerical analysis, demonstrating the high security of the new image encryption scheme.  相似文献   

11.
Li  Hao  Deng  Lianbing  Gu  Zhaoquan 《Multimedia Tools and Applications》2020,79(27-28):19387-19410
Multimedia Tools and Applications - In recent years, various chaotic maps have been used for image encryption. However, most of these image encryption algorithms entail a lot of floating-point...  相似文献   

12.
This paper proposes several image encryption schemes for popular image formats as Joint Photographic Experts Group (JPEG), Graphics Interchange Format (GIF), Portable Network Graphics (PNG), and Tagged Image File Format (TIFF). A cross chaotic map proposed based on Devaney's theory and dynamic block dividing of the 3D baker using the cross chaotic map are used for diffusion and permutation in encryption. Moreover, in order to verify user's identity, authentication is carried out using information hiding based on the cross chaotic function. In our methods, image files syntax and structure are not destructed, and the original image can be recovered lossless. For GIF, it keeps the property of animation successfully. The security test results indicate the proposed methods have high security, and the speed of our algorithm is faster than classical solutions. JPEG, GIF, TIFF and PNG image formats are popular contemporarily. Therefore this paper shows that the prospect of chaotic image encryption is promising.  相似文献   

13.
Chai  Xiuli  Gan  Zhihua  Yuan  Ke  Chen  Yiran  Liu  Xianxing 《Neural computing & applications》2019,31(1):219-237
Neural Computing and Applications - In the paper, a novel image encryption algorithm based on DNA sequence operations and chaotic systems is proposed. The encryption architecture of permutation and...  相似文献   

14.
Zhu  Shuqin  Zhu  Congxu  Fu  Yu  Zhang  Weimeng  Wu  Xiaoting 《Multimedia Tools and Applications》2020,79(43-44):31957-31980

This paper presents a novel image compression-encryption scheme, which has the compression-confusion-diffusion Structure. Firstly, based on Chebyshev chaotic map, a Gauss measurement matrix is constructed and optimized, which is applied to compressive sensing. Then, an image compression-encryption algorithm is proposed by using a six-dimensional discrete chaotic map. In the proposed scheme, the original image is transformed into a sparse coefficient matrix by discrete wavelet transform, and the sparse coefficients are measured by using the optimized Gauss measurement matrix to get the measured values. Then, the measured values are quantized into integer values and the compressed image is obtained. Furtherly, the compressed image is encrypted by using a six-dimensional chaotic map. In the process of encryption, the plaintext image is divided into two parts, when encrypting the second part, the first part is used as part of the key. While encrypting the first part, the ciphertext of the second part is used as part of the key. Thus, the algorithm has strong confusion and diffusion effect and makes ciphertext sensitive to plaintext. Experimental results such as effects of compression-encryption, key space analysis, key sensitivity analysis, differential analysis, histograms analysis, information entropy analysis, and correlation coefficients analysis show that the proposed scheme is secure and has high application potential.

  相似文献   

15.
Multimedia Tools and Applications - This paper presents a novel encryption scheme based on genetic operations and Mixed Linear-Nonlinear Coupled Logistic Map Lattice (MLNCML) spatiotemporal chaotic...  相似文献   

16.
Multimedia Tools and Applications - In the last decade, with a rapid increase in multimedia productions, image encryption has become a significant part of information security. The inherent image...  相似文献   

17.
针对图像等多媒体信息的特点,提出一种结合了两种混沌映射,即基于区间数目参数化的混沌映射与标准映射的数字图像加密算法.通过基于区间数目参数化的混沌映射产生混沌实数序列,将其转化为加密需要的伪随机二值序列,然后用该伪随机序列和标准映射变换进行数字图像加密.最后从理论和数字仿真实验两方面对算法的安全性进行分析,仿真实验结果表明,该算法是一个具有较好的安全性能和抗攻击能力的混沌加密算法.  相似文献   

18.
This paper proposes a chaos-based image encryption scheme with a permutation–diffusion structure. In the proposed scheme, the large permutation with the same size as the plain-image is used to shuffle the positions of image pixels totally. An effective method is also presented to construct the large permutation quickly and easily by combining several small permutations, where small permutations are directly generated using a chaotic map. In the diffusion stage, the pixel is enciphered by exclusive or with the previous ciphered pixel and a random number produced by the Logistic map with different initial conditions. Test results and analysis by using several security measures have shown that the proposed scheme is efficient and reliable, and can be applied to real-time image encryption.  相似文献   

19.
This paper proposes a new encryption scheme for color images based on Deoxyribonucleic acid (DNA) sequence operations and multiple improved one-dimensional (1D) chaotic systems with excellent performance. Firstly, the key streams are generated from three improved 1D chaotic systems by using the secret keys and the plain-image. Transform randomly the key streams and the plain-image into the DNA matrices by the DNA encoding rules, respectively. Secondly, perform the DNA complementary and XOR operations on the DNA matrices to get the scrambled DNA matrices. Thirdly, decompose equally the scrambled DNA matrices into blocks and shuffle these blocks randomly. Finally, implement the DNA XOR and addition operations on the DNA matrices obtained from the previous step and the key streams, and then convert the encrypted DNA matrices into the cipher-image by the DNA decoding rules. Experimental results and security analysis show that the proposed encryption scheme has a good encryption effect and high security. Moreover, it has a strong robustness for the common image processing operations and geometric attack.  相似文献   

20.
Neural Computing and Applications - In recent years, many researchers have used chaos maps to encrypt digital images due to their unpredictability, ergodicity, and sensitivity to initial values....  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号