一种自适应的图像加密算法
作者:
基金项目:

Supported by the National Natural Science Foundation of China under Grant No.60302012 (国家自然科学基金); the Special Science and Technology Foundation of Ningbo of China under the Grant No.2005B 100016 (宁波市科技攻关项目)

  • 摘要
  • | |
  • 访问统计
  • |
  • 参考文献 [13]
  • |
  • 相似文献 [20]
  • |
  • 引证文献
  • | |
  • 文章评论
    摘要:

    给出一种新的自适应图像置乱加密算法,加密后的图像可以有效防止已知明文的攻击.并且,算法具有良好的完整性保护功能,可用于图像验证.实验结果表明,算法在运算速度、抗攻击能力等方面具有良好的效果.

    Abstract:

    In this paper, a new self-adaptive image encryption algorithm is presented, which takes on a thorough integrity protect function and can be used in data validation. First, ergodic matrices are used to realize the position permutation algorithms. In particular, several novel methods of scrambling are proposed. By analysis of the weakness of pure position algorithms, a novel improved self-adaptive algorithm is proposed, which is strong under known-plaintext attack on image encryption. Finally the speed and safety of the new algorithm are analyzed and some simulation results are given.

    参考文献
    [1]Qiao LT,Nahrstedt L.Camparison ofMPEG encryption algorithms Computer & Graphics,1998,22(4):.437-448.
    [2]Zhao XY,Chen G.Ergodic matrix in image encryption.SPIE,2002,4875:4875-4878.
    [3]Zhao XY,Chen G.Holographic Information Storage and Image Restoration In:Proc.of the 8th Join Int'l Computer Conf.JICC2002.Ningbo,2002.199-203.
    [4]Chen G.Region-of-Interest based flower images retrieval.In:Proc.of the IEEE ICASSP03.2003.589-592.
    [5]Matlas Y,Shamir A.A video scrambling technique based on space filling curves.In:Proc.of the CPYPTO87.1987,76(5):550-559.
    [6]Bourbakis N,Alexopoulos C.Picture data encryption using SCAN patter.Pattern Recognition,1992,25(6):567-581.
    [7]Yen JC,Guo JI.A chaotic neural network for signal encryption/decryption and its VLSTI architecture.In:Proc.of the 10th VLSI Design/CAD Symp.Nantou,1999.319-322.
    [8]Refregier P,Javidi B.Optical-Image encryption based on input plane and forier plane random encoding Optics Letters,1995,20(7):767-769.
    [9]Yang HG,Kim ES.Practical image encryption scheme by real-valued data.Optical Engineering,1996,35(9):2473-2478.
    [10]Kuo CJ,Chen MS.A new signal encryption technique and its attack study.In:Proc.of IEEE Intl Conf.on Security Technology.Taipei,1991.149-153.
    [11]Sridharan S,Dawson E,Goldburg B.Fast fourier transform based speech encryption system.Communications,Speech,and Vision,1991,138(3):215-223.
    [12]Ding W,Qi DX.Digital Image Transformation and information hiding and disguising technology.Chinese Journal of Computers,1998,21 (9):838-843 (in Chinese with English abstract).
    [12]丁玮,齐东旭.数字图像变换及信息隐藏与伪装技术.计算机学报,1998,21(9):838-843.
    网友评论
    网友评论
    分享到微博
    发 布
引用本文

陈刚,赵晓宇,李均利.一种自适应的图像加密算法.软件学报,2005,16(11):1975-1982

复制
分享
文章指标
  • 点击次数:4425
  • 下载次数: 5815
  • HTML阅读次数: 0
  • 引用次数: 0
历史
  • 收稿日期:2004-06-30
  • 最后修改日期:2004-08-09
文章二维码
您是第19793956位访问者
版权所有:中国科学院软件研究所 京ICP备05046678号-3
地址:北京市海淀区中关村南四街4号,邮政编码:100190
电话:010-62562563 传真:010-62562533 Email:jos@iscas.ac.cn
技术支持:北京勤云科技发展有限公司

京公网安备 11040202500063号