登录    注册    忘记密码    使用帮助

详细信息

A Chaotic Image Encryption Algorithm Based on Information Entropy  ( SCI-EXPANDED收录 EI收录)   被引量:80

文献类型:期刊文献

英文题名:A Chaotic Image Encryption Algorithm Based on Information Entropy

作者:Ye, Guodong[1];Pan, Chen[2];Huang, Xiaoling[2];Zhao, Zhenyu[2];He, Jianqing[2]

机构:[1]Zhejiang Univ, Coll Informat Sci & Elect Engn, Hangzhou 310027, Zhejiang, Peoples R China;[2]Guangdong Ocean Univ, Fac Math & Comp Sci, Zhanjiang 524088, Peoples R China

年份:2018

卷号:28

期号:1

外文期刊名:INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS

收录:SCI-EXPANDED(收录号:WOS:000426585500012)、、EI(收录号:20181004861475)、Scopus(收录号:2-s2.0-85042746722)、WOS

基金:The work described in this paper was supported by the National Natural Science Foundations of China (Nos. 61602124 and 61702116), the Natural Science Foundations of Guangdong Province of China (Nos. 2016A030310333, 2015A030313614 and 2015A030313620), the Postdoctoral Science Foundation of China (No. 2017M611991), the Science and Technology Planning Project of Guangdong Province of China (No. 2017A010101025), the Program for Scientific Research Start-up Funds of Guangdong Ocean University of China (No. R17037), the Special Funding Program for Excellent Young Scholars of Guangdong Ocean University of China (No. HDYQ2017006), and the Project of Enhancing School with Innovation of Guangdong Ocean University of China (GDOU2016050228).

语种:英文

外文关键词:Image encryption; information entropy; chaotic map; security

外文摘要:This paper proposes an image encryption algorithm based on a chaotic map and information entropy. Unlike Fridrich's structure, the proposed method contains permutation, modulation, and diffusion (PMD) operations. This method avoids the shortcoming in traditional schemes of strictly shuffling the pixel positions before diffusion encryption. Information entropy is employed to influence the generation of the keystream. The initial keys used in the permutation and diffusion stages interact with each other. As a result, the algorithm acts as an indivisible entity to enhance security. Experimental results and security analyses demonstrate the good performance of the proposed algorithm as a secure and effective communication method for images.

参考文献:

正在载入数据...

版权所有©广东海洋大学 重庆维普资讯有限公司 渝B2-20050021-8 
渝公网安备 50019002500408号 违法和不良信息举报中心