首页 | 官方网站   微博 | 高级检索  
     

联合空域和小波域的图像加密
引用本文:曹光辉,李春强.联合空域和小波域的图像加密[J].计算机应用,2017,37(2):499-504.
作者姓名:曹光辉  李春强
作者单位:1. 辽宁工业大学 电子与信息工程学院, 辽宁 锦州 121001;2. 北京理工大学 计算机学院, 北京 100081
基金项目:国家自然科学基金资助项目(61502216),辽宁省联合基金资助项目(201602365)。
摘    要:针对基于混沌理论的混合域图像加密算法存在加密强度较弱的问题,提出一种新的联合空域和小波域的图像加密算法。首先对原始图像进行一级二维离散小波分解,提取低频小波系数;接着使用二维Sine Logistic映射生成混沌序列,利用该混沌序列使用混沌魔方变换置乱低频子带,然后完成图像逆小波变换。对置乱后的图像,首先使用互绕Logistic映射生成混沌序列用于空域加密密钥,然后联合基于伽罗瓦域上元素乘法和异或的变换技术对像素进行加密;同时,引入混沌扰动和加密反馈技术以实现生成一次性运行密钥。理论分析和实验结果表明,新算法具有密钥空间大、抗重构攻击、抗差分攻击、加密效率可行、安全性强等特点。

关 键 词:混沌系统    混沌扰动    离散小波分解    差分攻击    伽罗瓦域元素乘法
收稿时间:2016-07-19
修稿时间:2016-09-17

Image encryption based on combination of spactial and wavelet domain
CAO Guanghui,LI Chunqiang.Image encryption based on combination of spactial and wavelet domain[J].journal of Computer Applications,2017,37(2):499-504.
Authors:CAO Guanghui  LI Chunqiang
Affiliation:1. School of Electronics & Information Engineering, Liaoning University of Technology, Jinzhou Liaoning 121001, China;2. School of Computer Science & Technology, Beijing Institute of Technology, Beijing 100081, China
Abstract:Aiming at the problem that hybrid domain image encryption algorithm based on chaos theory has weak encryption strength, a new image encryption algorithm based on the combination of spatial and wavelet domain was proposed. First, one-level two-dimensional discrete wavelet decomposition was performed on the original image to extract the low-frequency wavelet coefficients. Second, using the chaotic sequence generated by 2D Sine Logistic chaotic dynamic system, the low frequency sub-band was scrambled by using chaotic magic transformation, then inverse wavelet transformation was executed on decomposed image.For the scrambled image, a chaotic sequence used for encryption key in spatial domain based on intertwining Logistic map was generated, then the pixels were encrypted by using the combination technology of elemental multiplication in a Galois field with XOR. At the same time, the technology of chaotic disturbance and encryption feedback was introduced to implement one-running key. Theoretical analysis and experimental results show that the proposed algorithm has the advantages of large key space, anti-reconstruction attack, anti-differential attack, feasible encryption efficiency, strong security, and so on.
Keywords:
点击此处可从《计算机应用》浏览原始摘要信息
点击此处可从《计算机应用》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号