实时网络信息双重加密可逆隐藏算法仿真
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:Simulation of Double-Encrypted Reversible Concealment Algorithm for Real-time Network Information
  • 作者:张春柳 ; 熊琭 ; 陆凌晨
  • 英文作者:ZHANG Chun-liu;XIONG Lu;LU Ling-chen;Shanghai Key Laboratory of Computer Software Testing & Evaluating,Shanghai Development Center of Computer Software Technology;
  • 关键词:实时网络信息 ; 双重加密 ; 可逆隐藏 ; 混沌序列加密算法
  • 英文关键词:Real-time network information;;Double encryption;;Reversible hiding;;Chaotic sequence encryption algorithm
  • 中文刊名:JSJZ
  • 英文刊名:Computer Simulation
  • 机构:上海计算机软件技术开发中心上海市计算机软件评测重点实验室;
  • 出版日期:2018-09-15
  • 出版单位:计算机仿真
  • 年:2018
  • 期:v.35
  • 语种:中文;
  • 页:JSJZ201809038
  • 页数:5
  • CN:09
  • ISSN:11-3724/TP
  • 分类号:201-204+268
摘要
针对当前多数可逆信息隐藏算法难以抵御选择明(密)文攻击,含密信息的视觉效果差、嵌入容量小且耗时长等问题,提出基于混沌序列的实时网络信息双重加密可逆隐藏算法。运用两种置乱方式对网络信息进行双重加密,第一次加密采用混沌序列加密算法对网络信息位置进行全局置乱。第二次加密依据另一组混沌序列对目标像素值中0bit、1bit再次置乱,以保证能够防御选择明(密)文攻击。在信息双重加密域中,采用待嵌入信息构造伪像素用于替换目标像素,实现信息的快速嵌入。根据密钥计算从密文信息中直接提取已嵌入的信息。接收方对信息解密后,提取出目标像素的每个比特数据恢复出原始网络信息,实现双重加密下的可逆信息隐藏。实验结果表明,所提算法克服了当前算法难以抵御选择明(密)文攻击的缺陷,具有信息嵌入快速高效、容量大等优势。
        In this article,we present a double-encrypted reversible hiding algorithm for real-time network information based on chaotic sequence. At first,two scrambling methods were used to perform double encryption of network information. The first encryption used the encryption algorithm based on chaotic sequence to globally scramble network information position. The second encryption used another group of chaotic sequence to scramble 0 bit and 1 bit in target pixel values again,so as to ensure that the chosen plain( cipher) text attack could be defended. In the double encryption domain of information,the information to be embedded was used to construct pseudo pixel for replacing target pixel. Thus,the rapid embedding of information could be realized. According to key calculation,the embedded information was directly extracted from cipher text information. After decrypting information,the receiver extracted every bit data of target pixel to recover original network information. Finally,the reversible information hiding in double encryption was achieved. Simulation results show that the proposed algorithm overcomes the defect that the current algorithm is difficult to resist the chosen plain( cipher) text attack,which has the advantages of the fast and efficient information embedding and the large capacity.
引文
[1]曹建秋,肖华荣,蓝章礼.基于变参混沌系统的图像双重置换加密[J].计算机工程与应用,2011,47(32):101-104.
    [2]项洪印,苑津莎,侯思祖.基于平滑分块基像素定位的可逆信息隐藏方法[J].计算机工程,2016,42(9):116-120.
    [3]张巧妹,顾军华,侯向丹.基于阈值划分的加密域信息隐藏算法[J].计算机工程与设计,2017,38(6):1424-1428.
    [4]周晨茜,吴昊天,刘渊.用于实现图像对比度增强的可逆数据隐藏算法[J].计算机工程与应用,2017,53(7):181-185.
    [5]任帅,石方夏,张弢.基于三维模型轮廓解析的信息隐藏算法[J].计算机应用,2016,36(3):642-646.
    [6]项洪印,侯思祖.基于差值位置图调整的信息隐藏优化算法[J].计算机工程,2016,42(3):249-253.
    [7]牛向洲,张敏情,柯彦.基于插值预测误差的密文域可逆信息隐藏[J].电子技术应用,2017,43(12):120-124.
    [8]柯彦,张敏情,刘佳.可分离的加密域十六进制可逆信息隐藏[J].计算机应用,2016,36(11):3082-3087.
    [9]张铠.基于差值直方图的简单高效可逆信息隐藏方法[J].计算机工程与科学,2016,38(3):528-533.
    [10]卢建华,龙超平.光无线传输下隐秘图像可逆信息隐藏方法仿真[J].计算机仿真,2017,34(5):201-204.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700