基于混沌系统的数字信息加密算法研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着计算机技术、网络技术和多媒体技术的快速发展和广泛应用,为人们获取和交流信息提供了极大的方便。然而,全透明的网络多媒体信息极易被非法分子盗版和篡改。因此,如何保护多媒体信息的安全成为国际上研究的热点问题。
     本文主要研究了基于DSP的混沌信号生成、基于超混沌信号的图像加密和视频加密方法,具体工作包括:
     1)了解混沌的概念、特征,研究了几种典型的混沌系统的动力学行为,传统的加密方法,并指出传统加密方法存在的一些问题。
     2)由于混沌系统在信息安全领域具有广阔的应用前景,数字混沌电路实现一直是混沌应用领域研究的热点。本文提出了一种利用DSPTMS320F2812实现三维混沌系统数字电路的方法,通过模型修改,该方法可以实现不同混沌系统的数字电路。实验结果与计算机仿真相图完全一致,证实了该方法的有效性和灵活性。
     3)提出了一种新的基于超混沌系统的图像加密算法,其中置乱矩阵和扩散矩阵分别由Chen混沌系统和Chen超混沌系统生成。在图像加密过程中,首先,应用置乱矩阵来扰乱原图像像素间的位置;然后,应用扩散矩阵与置乱后图像的像素值进行异或操作,以改变图像像素值,达到图像加密的目的。最后对实验结果进行分析,仿真实验证实该加密算法具有巨大的密钥空间和良好的安全性能。
     4)为解决视频信息的安全问题,本文提出一种基于超混沌系统的视频加密算法,该算法将流加密和块加密相结合,流加密用来产生随机序列,块加密用来置乱数据。流加密由二维离散的超混沌系统产生,块加密由超混沌系统产生。并对算法进行安全性分析,验证算法的安全性。
Multimedia information has become a main way for information communication along with the rapid development and the wide use of computer, network and multimedia technology. However, the transparence of digital multimedia information over network also facilitates unauthorized copying and intentional tampering. Therefore, multimedia information security problems became a pop international research question.
     This paper studies based on DSP chaotic signal generation, image encryption and video encryption,The main contributions of this dissertation are:
     1) Studying the basic characteristics of chaos and several typical of chaotic system dynamics behavior, the traditional encryption methods, and points out that the traditional encryption methods existing problem.
     2) Firstly introduces chaos theory and the basic characteristics of chaos. Owing to the broad application prospect in information security field, the study of digital chaotic circuits becomes a research focus in field of chaotic engineering application. This paper presents a method of 3-D digital chaotic circuit implementation based on DSPTMS320F2812. Through modifying model, the different 3-D chaotic systems are implemented easily by using this method. The experimental results are in good agreement with computer simulation, which demonstrates the effectiveness and flexibility of proposed method.
     3) This paper presents a new image encryption algorithm, in this algorithm, shuffling matrix and diffusing matrix are generated based on Chen’s hyper-chaotic system. Firstly, the Chen’s hyper-chaotic system is used to shuffle the position of the image pixels, then use Chen’s hyper-chaotic system to confuse the relationship between the original image and the cipher image. The experimental results demonstrate that the encryption algorithm of image has the advantages of large key space and high security. Owing to more complex dynamical behaviors, the proposed encryption algorithm is more secure than some chaos based encryption algorithm.
     4) Video information to address security issues, this paper presents a hyperchaotic system based on video encryption algorithm and block cipher stream encryption combined stream cipher used to generate random sequence, block encryption to scramble data. Stream encrypted by the two-dimensional discrete chaotic system to produce ultra, block encryption generated by the super-chaotic system. And security analysis algorithm to verify security of the algorithm.
引文
[1]易开祥,孙鑫,石教.一种基于混沌序列的图像加密算法[J].计算机辅助设计与图形学学报,2000,12(9):672-676.
    [2]刘向东,焉德军,朱志良.基于排序变换的混沌图像置乱算法[J].中国图像图形学,2005, 10(5):656-660.
    [3]袁春,钟玉琢,贺玉文.基于混沌的视频流选择加密算法[J].计算机学报, 2004, 27(2): 257-263.
    [4]廉士国,孙金生,王执铨.视频加密算法及其发展现状.信息与控制,2004,Vol.33(5): 560-566.
    [5]肖要强,王玲.基于超混沌的活动图像的加密新方法[J].计算机工程与应用,2004,35:53-54.
    [6] R.Matthews.On the derivation of a chaotic encryption algorithm.cryptologia,1989,13(1):29-42.
    [7]杨义先,钮心忻.应用密码学[M],北京,北京邮电大学出版社,2005.
    [8]蔡乐生.应用密码学[M],中国电力出版社,2005.
    [9]杨吉云,廖晓峰,肖迪,邓绍江.对一种基于logistic映射的分组加密机制的分析和改进[J].通信学报,2008,29(12):86-90.
    [10]W.K.Wong, L.P.Lee.A modified chaotic cryptographic method[J].Computer Physics Communication,2001,138:234-236.
    [11]邓浩,华一满,倪皖荪.混沌伪随机序列和数字语音保密通信[J].通信学报,1999,(04)
    [12]李国富,宋瑞霞,赵慧.椭圆曲线在数字图像隐藏中的应用[J].北方工业大学学报, 2000,(03).
    [13]邹建成,铁小匀.数字图像的二维Arnold变换及其周期性[J].北方工业大学学报, 2000,(01).
    [14]丁玮,闫伟齐,齐东旭.基于Arnold变换的数字图像置乱技术[J].计算机辅助设计与图形学学报, 2001,(04).
    [15]陈果,廖晓峰.一种新的基于混沌映射的分组加密方法[J].计算机工程与应用,2005,(24).
    [16]韦鹏程,张伟,杨华千.一种多级混沌图像加密算法研究[J].计算机科学,2005,(07).
    [17]Matlas Y,Shamir A.A video scrambling technique based on space filling curves.In:Proc.of the CPYPTO’87.1987,76(5):550-559.
    [18]Qiao L,Nahrstedk.A new algorithm for mpeg video encryption.CISST’97.1997.21-29.
    [19]徐茂智.信息安全与密码学[M],北京,清华大学出版社,2007.
    [20]Chua L O,Yang Y,Zhong G Q.Adaptive synchronization of Chuas socilators.International Journal of Bifurcations and Chaos.1996,6(1):709-913.
    [21] Chen L, Tao L, Huang Q N, Peng J H. Constructing two-dimensional discrete hyperchaotic systems[J]. Journal of Northeast Normal University (Natural Science Edition), 2002, 34(3), pp:47-52.
    [22] Lorenz. Deterministic nonperiodic flow. J. Atoms. Sci. 1963(20): 130-141.
    [23] Tianshou Zhou, Guanrong Chen. A simple smooth chaotic system with a 3-layer attractor. Int. J.Bifurcation Chaos, 2004, Vol.14(5): 1795-1799.
    [24] T.G. Gao, Q. L. Gu, Z.Q. Chen. Analysis of the hyper-chaos generated from Chen’s system. Chaos, Solition and Fractal. 2009, 39: 1849-1855.
    [25]王智娜.JPEG2000图像加密算法研究:[硕士学位论文].西安:西安电子科技大学,2005.
    [26] J.Fridrich. Secure image ciphering based on chaos: Final Technical Report RL-TR-97-155. Rome Laboratory, New York USA, 1997.
    [27] J. Fridrich. Image encryption based on chaotic map. Systems, Man, and Cybernetics, 1997. 'Computational Cybernetics and Simulation', 1997 IEEE International Conference on, 1997(2): 1105-1110.
    [28] J. Fridrich. Symmetric ciphers based on two-dimmensional chaotic maps. International Journal of Bifurcation and Chaos, 1998, 8(6):1259-1284.
    [29] Y. B. Mao, G. Chen, S. G. Lian. A novel fast image encryption scheme based on 3D chaotic baker maps. Int. J. of Bifurcation Chaos, 2004, Vol.14(10): 3613-3624.
    [30] Y. B. Mao, G. Chen. Chaos-based image encryption. Handbook of Computational Geometry for Pattern Recognition, Computer Vision, Neural computing and Robotics. New York: E. Bayro (Ed.), Springer-Verlag, 2003. 231-265.
    [31] G. Chen, Y. B. Mao, C. K. Chui. A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solutions and Fractals, 2004, Vol.21(3): 749-761.
    [32]孙鑫,易开祥,孙优贤.基于混沌系统的图像加密算法.计算机辅助设计与图形学学报,2002,14(2): 136-139.
    [33]唐秋玲,覃团发,陈光旨.混沌图象加密.广西大学学报(自然科学版),1999,24(1):61-64
    [34] C. C. Chang, M. S. Hwang, T. S. Chen. A new encryption algorithm for image cryptosystems. The Journal of Systems and Software, 2001, Vol.58(2): 83-91.
    [35] S. J. Li, X. Zheng, X. Mou, et al. Chaotic encryption scheme for real-time digital video. In: Real-Time Imaging VI, Proceedings of SPIE. San Jose, CA: 2002, Vol.4666: 149-160.
    [36] F. Dachselt, W. Schwarz. Chaos and Cryptography. IEEE Trans. Circuits and Syst.I, 2001, 48(12): 1498-1509.
    [37] K. M. Short. Steps toward unmasking secure communications. International Journal of Bifurcation and Chaos, 1994, 4(4): 959-977.
    [38] K. M. Short. Unmasking a modulated chaotic communications Scheme. International Journal of Bifurcation and Chaos, 1996, 6(2): 367-375.
    [39] G. Alvarez, F. Montoya, M. Romera, et al. Cryptanalysis of a chaotic secure communication system. Physics Letters A, 2003, Vol.306(4): 200-205.
    [40] G. Alvarez, F. Montoya, M. Romera, et al. Cryptanalysis of a chaotic encryption system. Physics Letters A, 2000, Vol.276(1-4): 191-196.
    [41] E. Alvarez, A. Fernandez, P. Garcia, et al. New approach to chaotic encryption. Physics Letters A, 1999, Vol.263(4-6): 373-375.
    [42] S. J. Li, X. Zheng. Cryptanalysis of a chaotic image encryption method. In: Proceedings of the 2002 IEEE International Symposium on Circuits and Systems. Scottsdale, Arizona: 2002, Vol.2: 708-711.
    [43] J. C. Yen, J. I. Guo. A new chaotic key-based design for image encryption and decryption. In: Proceedings of the International Symposium on Circuits and Systems. Geneva, Switzerland: 2000, Vol.4: 49-52.
    [44] Yang Tao, Yang Linbao, Yang Chunmei. Breaking chaotic switching using generalized synchronization: Examples. IEEE Trans On Circiuts Systems-I, 1998, Vol.45(10): 1062-1067.
    [45] Yang Tao, Yang Linbao, Yang Chunmei. Application of neural networks to unmasking chaotic secure communication. Physica D, 1998, Vol.124(1-3): 248-257.
    [46] Lorenz E N. Deterministic nonperiodic flow[J]. Journal of the Atmospheric Sciences, 1963, 20(2):130-141.
    [47] Qananwah Q M. Chaos Synchronisation of the third-order phase-locked loop[J]. International Journal of Electronics, 2008, 95 (8-10):799-803.
    [48]Wang YW&Guan ZH. Generalized Synchronization Of Continuous Chaotic System. Chaos, Solitons and Fractals, 2006, 27 (1) :97-101.
    [49]尹逊和,蔡晓,赵栋.工程混沌及混沌应用的研究现状与展望[J].系统工程与电子技术,2001,23(12):71-76.
    [50]王繁珍,齐国元,陈增强,张宇辉,袁著祉.一个新的三维混沌系统的分析、电路实现及同步[J].物理学报,2006,55(8):4005-4008.
    [51]翟笃庆,刘崇新.基于DSP的Liu混沌系统的实现[J].南京信息工程大学学报,2009,1(3):213-217.
    [52]禹思敏.用三角波序列产生三维多涡卷混沌吸引子的电路实验[J].物理学报, 2005,54(4):1500-1509.
    [53]李世华,蔡海兴.Chen氏混沌电路实现与同步控制实验研究[J].物理学报,2004.53(6):1687-1693.
    [53]苏奎峰,吕强.TMS320F2812的原理与开发[M].北京电子工业出版社,2005.
    [54] Chen Z Q, Yang Y, Yuan Z Z. A novel hyper chaos system only with one equilibrium[J]. Physics Letters A, 2007, 360(6), pp: 696-701.
    [55]G. Chen, Y. B. Mao, C. K. Chui. Choas Solitons Fractals. 2004, 21(3):749-761.
    [56]Y.B.Mao,G.R.Chen.Chaos-based image encryption.Handbook of Computational Geometry for Pattern Recognition,Computer Vision,Neurocomputing and Robotics.New York:Springer-Verlag,2003,22-37.
    [57]俞华峰.MPEG视频加密技术研究及实现:[硕士学位论文].山东:山东大学,2005.
    [58]廉士国,孙金生,王执铨.视频加密算法及其发展现状.信息与控制,2004,Vol.33(5): 560-566.
    [59]丁文霞,卢焕章,王浩等.基于混沌的快速格雷码分段置乱视频加密算法[J].通信学报,2007,28 (9):34 - 39.
    [60]袁春,钟玉琢,贺玉文.基于混沌的视频流选择加密算法[J].计算机学报,2004,27(2):257 - 263.
    [61] C. Shi, B. Bhargava. A fast MPEG video encryption algorithm. In Proceedings of the 6th ACM International Multimedia Conference. Bristol, UK: 1998. 81-88.
    [62] Sikora,T.Trends and perspectives in image and video coding. Proceedings of the IEEE Volume93,Issue1,Jan.2005,Page(s):6-17.
    [63] Shiguo Lian, Zhiquan Wang, Jinsheng Sun. A fast video encryption scheme suitable for network applications [A]. IEEE International Conference on Communication, Circuits and Systems [C]. Cheng du, China :IEEE ,2004. 566 - 570.
    [64]于志宏,王波,刘喆.基于Logistic和Baker映射的视频加密方法[J].吉林大学学报,2008,26(3):253-258.
    [65]FU CHONG, ZHANG ZHEN-CHUAN,CHEN YNG.An inproved chaos-based image encrypyion scheme[C].Lecture Notes in Computer Science 4487.Berlin:Springer-Verlag,2007:575-582.
    [66] FU CHONG, ZHANG ZHEN2CHUAN, CAO YING2YU. An improved image encryp tion algorithm based on chaotic map s[C] / / IC2NC 2000: Proceedings of the Third International Conference on Nat2ural Computation. Washington: IEEE Computer Society, 2007, 3:189– 193.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700