用户名: 密码: 验证码:
基于复合混沌的数字图像加密算法研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着网络技术的发展和信息交换的日益频繁,信息安全问题日益突出。信息技术的发展对信息安全提出了越来越高的要求,迫切需要发展新的理论和先进的技术。而数字图像作为多媒体信息中最重要一种表达形式,具有形象、直观和生动的优点,它已经成为当今乃至今后信息表达方式的主流,在带给人们生活便利的同时,也存在着诸多的安全隐患,因其数据量大、冗余度高,已给传统加密方法提出了挑战,混沌理论在图像信息的加密上应运而生,体现了强大的生命力。
     本文详细的介绍了密码学的现状,对各种数字图像加密技术进行分析,并对比各类图像加密方法的性能优缺点。研究了两种基本的混沌图像加密方法,并引出复合混沌理论的概念、原理和性质,复合混沌系统在图像加密领域中的应用,再介绍图像置乱技术的原理与应用。最后结合复合混沌技术和图像置乱技术设计了一种新的基于复合混沌的数字图像加密算法。
     本文方案中采用的复合混沌运算掩盖了混沌子序列的分布特征,改变了原混沌系统的动力学行为,从而使其保密性能得到提高,其保密性要优于普通的低维混沌序列。而且置换加密放在置乱加密之前,增强了置乱加密的抗攻击能力,靠收集图像特征的置乱加密破解方法是不可行的。实验结果表明:本文设计的方案具有初始值敏感性,密文直方图分布均匀,密文相邻像素点之间的相关性性能得到很大提高,在受到剪切攻击之后能够很多好的恢复出明文信息,总体来说,本文方案具有良好的抗统计分析能力和强的抗剪切攻击的特性。
With the development of network technology and the increasingly information exchange, information security issues have become increasingly prominent. Because of the rapid development of information technology, increasing information security and new information security theory and advanced technologies are required urgently. With the advantages of intuitive and vivid, digital image which is the most important expression of multi-media information,has been referred to as the current expression as well as the future mainstream of information. While it brings convenience to people's lives, and in the same time there are many security risks. Traditional encryption methods have been put forward to the challenge because of its large amount of data, and high redundancy. Chaos Theory in the image information of encryption came into being, reflecting the strong vitality.
     This paper introduces the status of cryptography in detail,analyses a variety of digital image encryption technology,compares to vrious encryption methods and the performance of the advantages and disadvantage.Then,presents two basic chaotic image encryption methods,thus to the composite chaotic concepts, principles and characteristics,and the application in the field of image encryption with composite chaotic system.Also introduces the principle and application of the image scrambling technology.Finally,this paper propose a new digital image encryption algorithm based on composite chaotic by integrate the composite chaotic and image scrambling technology.
     In this paper, the program uses in the composite chaotic operation cover up the characteristics of the original sequence of chaotic, changes the dynamic behavior of chaotic systems in order to improve the performance of its secrecy, the confidentiality is superior to an ordinary low-dimensional chaotic sequence. And encryption on the replacement before scrambling encryption, has enhanced the anti-attack capability of scrambling encryption. That breaking solves method depending on collecting the image characteristic is no feasible. The experimental results show that: In this paper, the design of the program with the initial value of the sensitivity, the histogram distribution ciphertext, correlation between adjacent pixel performance greatly improved. It could restore the explicit information greatly after the shearing-attack. Overall program in this article has a good capacity of anti-statistical analysis and strong anti-shear characteristics of the attack.
引文
[1]Hsuan T.Chang,Ching T.Chen.Asymmetric-image verification for security optical systems based on joint transform correlator architecture.Optics Communications,2004,239(1-3):43-54.
    [2]Yu-Chen Hu.High-capacity image hiding scheme based on vector quantization.Pattern Recognition,2006,39(9):1715-1724.
    [3]Mauro Bami,Franco Bartolini,Vito Cappellini and Alessandro Piva.Copyright protection of digital images by embedded unperceivable marks.Image and Vision Computing,1998,16(12-13):897-906.
    [4]Junghoi Kim,Jaekwang Choi,Junwon An,Nam Kim and Kwonyeon Lee.Digital holographic security system based on random phase encoded reference beams and fingerprint identification.Optics Communications,2005,247(4-6):265-274.
    [5]Chang-Mok Shin and Soo-Joong Kim.Image encryption using modified exculusive-OR rules and phase-wrapping technique.Optics Communications,2005,254(1-3):67-75.
    [6]H.S.Kwok and Wallace K.S.Tang.A fast image encryption system based on chaotic maps with finite precision representation.Chaos,Solitons & Fractals,2007,32(4):1518-1529.
    [7]Shu jun L,Xuan Z.Cryptanalysis of a chaotic image encryption method.In Proc.IEEE Int.Symposium on Circuits and Systems,2002,2:708-711.
    [8]H.H.Nien,C.K.Huang,S.K.Changchien,et al.Digital color image encoding and decoding using a novel chaotic random generator.Chaos Solitons and Fractals,2007:1070-1080.
    [9]Shannon C.E.Communication theory of secret systems.Bell System Technical Journal,1949,28(4):656-715.
    [10]卢开澄.计算机密码学-计算机网络中的数据保密与安全.清华大学出版社,1998.
    [11]http://hi.baidu.com/xieebajinzhi/blog/item/39065ac673e0231b9d163d9e.html.2007-03-02/2007-3-30.
    [12]Douglas R.S(美)著.冯登国译.密码学原理与实践(第二版).电子工业出版社,2003
    [13]Uehara T,Safavi-Naini R,and Ogunbona.P,Securing wavelet compression with random permutations.In Proc.IEEE Pacific-Rim Conference on Multimedia(IEEE-PCM'2000),2000,332-335.
    [14]Shiguo L and Zhiquan W.Comparison of several wavelet coefficients confusion methods applied in multimedia encryption.In Proc.Int.Conference on Computer Networks and Mobile Computing(ICCNMC2003),2003:372-376.
    [15]Raphael G,Pierre G,and Touradj E.Authentication and access control in the JPEG2000compressed domain.In Applications of Digital Image Processing ⅩⅩⅣ,2001,4472:95-104
    [16]Kiya H,Imaizumi,D and Watanabe O.Partial-scrambling of images encoded using JPEG2000 without generating marker codes.In Proc.IEEE Int.Conference on Image Processing(ICIP2003),2003,3:205-208.
    [17]张焕国等译.椭圆曲线密码学导论.电子工业出版社,2005.8.
    [18]张琼.基于混沌理论的图像加密研究.学位论文,汕头大学,2007.
    [19]杨波编著.现代密码学.清华大学出版社,2003.8.
    [20]Douglas R.S(美)著.冯登国译.密码学原理与实践(第二版).电子工业出版社,2003.
    [21]饶妮妮.一种数字化混沌扩频序列发生器的设计.电子与信息学报,2002,24(5):702-706.
    [22]Muralik,Lakshmanan M.Synchronization through compound chaotic signal in Chua's circuit and Murali-Lakshlmanan-Chua circuit.Int.J.Bifur.Chaos.1997.7(2):415-421.
    [23]Pecora L M,Carroll T L.Synchronization in chaotic systems.Phys.Rev.Lett,1990,64:821-824.
    [24]Tien Yien L and James Y,Period three implies chaos.American Mathematical Monthly,1975,82(10):985-992.
    [25]Robert.M.Simple mathematical models with very complicated dynamics.Nature,1976,261(10):459-474.
    [26]Shannon.C.E.Communication theory of secrecy system.Bell Sys.Tech.J,1949,28(4):656-715.
    [27]刘英,孙丽莎.基于三维猫映射的图像加密算法.计算机工程与应用,2005,36:127-130,157.
    [28]茅耀斌.基于混沌的图像加密与数字水印技术研究.博士论文,2003.8.
    [29]张瀚,王秀峰,李朝晖,刘大海.一种基于混沌系统及Henon映射的快速图像加密算法.计算机研究与发展,2005,42(12):2137-2142.
    [30]张建,于晓洋,任洪娥.基于Cat映射和Lu混沌映射的图像加密方案.电子器件,2007.2,30(1):155-157.
    [31]王成儒,王凤英,胡正平.混沌神经网络在数字图像加密中的应用.计算机工程,2004.11,30(22):125-126.
    [32]李敏,费耀平.基于队列变换的数字图像置乱算法.计算机工程,2005.1,31(1):148-152.
    [33]王迤冉,王洋,詹新生.基于混沌的图像加密算法性能分析.河南大学学报,2006.6,36(2):88-90.
    [34]唐秋玲,姚海涛,覃团发.采用时空混沌耦合映象格子产生混沌扩频序列.广西大学学报(自然科学版),2002.3,27(1):87-90.
    [35]王毅.基于混沌序列的图像加密研究.计算机工程与应用.2002.20:100-102.
    [36]陈永红,黄席樾.基于混沌序列的图像加密解密算法.计算机工程,2004.11,30(21):104-106.
    [37]研学论坛:http://bbs.matwav.com/index.html.
    [38]沈庭芝.数字图像处理及模式识别.北京理工大学出版社,1998.
    [39]张晓飞,袁祥辉.基于DSP的实时红外热成像系统的数据交换及实时显示.电子技术应用,2002,2:70-72.
    [40]Borko F and Darko K,Multimedia Security Handbook.Published by CRC Press LLC,2004,12.
    [41]Tiegang Gao,Zengqiang Chen.Image encryption based on a new total shuffling algorithm.Chaos,Solitons and Fractals,2008,38:213-220.
    [42]S.Behnia,A.Akhshani,H.Mahmodi,A.Akhavan.A novel algorithm for image encryption based on mixture of chaotic maps.Chaos,Solitons and Fractals 2008,35:408-419.
    [43]杨维明编著.时空混沌和耦合映象格子.上海科技教育出版社,1994.9.
    [44]赫柏林著.从抛物线谈起--混沌动力学引论.上海科技教育出版社,1993.9.
    [45]刘曾荣编.混沌的微扰判据.上海科技教育出版社,1994.10.
    [46]陈奉苏编著.混沌学及其应用.中国电力出版社,1998.7.
    [47]陈关荣,吕金虎著.Lorenz系统族的动力学分析控制与同步.科学出版社,2005.4,第二版.
    [48]Degang Yang,Xiaofeng Liao,Yong Wang,Huaqian Yang,Pengcheng Wei.A novel chaotic block cryptosystem based on iterating map with output-feedback.Chaos,Solitons and Fractals(2008),doi:10.1016/j.chaos.2008.02.017.
    [49]A.N.Pisarchik,M.Zanin.Image encryption with chaotically coupled chaotic maps.Physical D(2008),doi:10.1016/j.physd.2008.03.049.
    [50]N.K.Pareek,Vinod Patidar,K.K.Sud.Image encryption using chaotic logistic map.Image and Vision Computing,2006,24:926-934.
    [51]Jafarizadeh MA,Behnia S,Khorram S,Nagshara H.Hierarchy of chaotic maps with an invariant measure.J Stat Phys 2001,104(5-6):1013-1028.
    [52]Jafarizadeh MA,Behnia S.Hierarchy of chaotic maps with an invariant and their coupling.Physica D 2001,159(1-2):1-21.
    [53]Devancy RL.An introduction to chaotic dynamical systems.Addison Wesley,1982.
    [54]Qiu-Hua lin,Fu-Liang Yin,Tie-Min Mei,Hualou Liang.A blind source separation-based method for multiple imagesencryption.Image and Vision Computing,2008(26):788-798.
    [55]Xiaojun Tong,Minggen Cui.Image encryption with compound chaotic sequence cipher shifting dynamically.Image and Vision Computing,2008(26):843-850.
    [56]Li HD,Feng DG.Stream cipher algoriths based on composite nonlinear discrete chaotic dynamical systems.Journal of Software,2003,14(5):991-998.
    [57]李红达,冯登国.复合离散混沌动力系统的序列密码算法.电子学报,2003,31(8):1209-1212.
    [58]李红达,冯登国.复合离散混沌动力系统与Hash函数.计算机学报,2003,26(4):460-464.
    [59]车生兵,黄达,谭骏珊.基于复合混沌系统的数字图像加密研究.计算机工程,2006.11,32(21):148-151.
    [60]冉启文,谭立英著.小波分析与分数傅立叶变换及应用.国防工业出版社,2003.7.
    [61]杨建国著.小波分析及其工程应用.机械工业出版社,2005.7.
    [62]彭玉华著.小波变换与工程应用.科学出版社,1999.8.
    [63]Peng Fei Shui-Sheng Qiu Long Min.An Image Encryption A-lgorithm Based on Mixed Chaotic Dynamic Systems and External Keys.2005 International Conference 27-30 May 2005.5,2(27-30):-1139.
    [64]Akhshani.A,Mahmodi.H,Akhavan.A.A Novel Block Cipher Based on Hierarchy of One-Dimensional Composition Chaotic Maps.Image Processing.2006 IEEE International Conference on Publication,8-11 Oct.2006.10.6-8:1993-1996.
    [65]Wang Ying,Zheng DeLing,Ju Lei,Wei Yaoguang.The Spatial-Domain Encryption of Digital Images Based on High-Dimension Chaotic System.Proceedings of the 2004 IEEE Conference on Cybernetics and Intelligent Systems Singapore,2004.10.1-3:1172-1176.
    [66]Kai Wang,Pei,Liuhua Zou,Aiguo Song and Zhenya He.On the security of 3D Cat map based symmetric image encryption scheme.Physics Letters A,2005.8,343(6-22):432-439.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700