登录    注册    忘记密码    使用帮助

详细信息

An image encryption algorithm based on irregular wave representation  ( SCI-EXPANDED收录 EI收录)   被引量:18

文献类型:期刊文献

英文题名:An image encryption algorithm based on irregular wave representation

作者:Huang, Xiaoling[1];Ye, Guodong[1,2]

机构:[1]Guangdong Ocean Univ, Fac Math & Comp Sci, Zhanjiang 524088, Peoples R China;[2]Zhejiang Univ, Coll Informat Sci & Elect Engn, Hangzhou 310027, Zhejiang, Peoples R China

年份:2018

卷号:77

期号:2

起止页码:2611

外文期刊名:MULTIMEDIA TOOLS AND APPLICATIONS

收录:SCI-EXPANDED(收录号:WOS:000422790400048)、、EI(收录号:20170703339012)、Scopus(收录号:2-s2.0-85011878851)、WOS

基金:The work described in this paper was fully supported by the National Natural Science Foundations of China (No. 61602124, No. 11526057, No. 11301091), the Natural Science Foundations of Guangdong Province of China (No. 2016A030310333, No. 2015A030313614, No. 2015A030313620), the Science & Technology Planning Projects of Zhanjiang City of China (No. 2015B01098, No. 2015B01051), the Program for Scientific Research Start-up Funds of Guangdong Ocean University of China, and the Special Funding Program for Excellent Young Scholars of Guangdong Ocean University.

语种:英文

外文关键词:Irregular wave; Image encryption; 2D Logistic map; Security

外文摘要:For a gray image, every row (column) can be seen as an irregular wave. Activated by the architecture of permutation-diffusion based image encryption scheme, a chaotic image encryption algorithm is proposed to change the representation of irregular waves in the plain-image. To reduce the high correlation, permutation for both rows and columns is taken in the first stage. Due to the transposition of pixels in row/column, wave shapes will be changed according to the pseudo-random sequences generated from chaotic map. Specifically, pixels in each wave (row or column) are divided into two groups by energy (a bigger one and a smaller one). Then different groups are employed to manipulate the production of chaotic sequence. As a result, the chosen-plaintext and known-plaintext attacks will be difficult due to the plain-image dependent keystream. In the second stage, wave-by-wave diffusion in column is carried out such that any tiny change in the plain-image spreads out uniformly to the whole cipher-image. The keystream used in diffusion is designed again dependent on the permuted image obtained from the first stage. In this way, the security of the proposed algorithm can be further strengthened compared with some existing algorithms. Related security analyses also show that our method can satisfy common requirements of secure communication for daily images.

参考文献:

正在载入数据...

版权所有©广东海洋大学 重庆维普资讯有限公司 渝B2-20050021-8 
渝公网安备 50019002500408号 违法和不良信息举报中心