基于混沌映射的图像加密算法研究
DOI:
作者:
作者单位:

1.华东交通大学信息工程学院;2.华东交通大学网络信息中心;3.华东交通大学电气与自动化工程学院

作者简介:

通讯作者:

中图分类号:

基金项目:

国家自然科学基金(11862006) ;江西省自然科学基金(2018ACB21032);江西省教育厅项目(GJJ170381); 江西省教育厅科学技术研究项目(GJJ209928)


Research on image encryption algorithm based on Chaotic Map
Author:
Affiliation:

Fund Project:

The National Natural Science Foundation of China (11862006);Natural Science Foundation of Jiangxi Province(2018ACB21032);Jiangxi Provincial Education Department Project(GJJ170381);Science and technology research project of Education Department of Jiangxi Province(GJJ209928)

  • 摘要
  • |
  • 图/表
  • |
  • 访问统计
  • |
  • 参考文献
  • |
  • 相似文献
  • |
  • 引证文献
  • |
  • 资源附件
  • |
  • 文章评论
    摘要:

    由于传统的文本加密算法对图像加密的适用性不强,经典的Logistic映射存在系统参数范围受限、混沌序列分布不均等问题。通过一种基于循环移位结合改进型Logistic和Tent映射的图像加密算法。设置改进型Logistic和Tent映射的初始值和控制参数,并应用比特重拍技术提升过渡态中的混沌效果,达到提升图像加密算法的效果。明文图像进行处理时,先对其进行Arnold变换和异或的预加密处理,并对图像进行分块处理,然后利用Tent映射产生的序列进行排序索引与循环移位。在加密过程中明文图像经历了像素替换和像素扩散,使得明文像素的值和位置都发生了变化。实验结果表明,该算法具有良好的加密性能和安全性。

    Abstract:

    Since the traditional text encryption algorithm is not applicable to image encryption, the classical Logistic mapping has the problems of limited range of system parameters and unequal distribution of chaotic sequences. In this paper, an image encryption algorithm based on cyclic shift combined with improved Logistic and Tent mapping is proposed. The initial values and control parameters of improved Logistic and Tent mapping were set, and the bitt retake technology was applied to improve the chaos effect in the transition state, so as to improve the effect of image encryption algorithm. When the plaintext image is processed, Arnold transform and xOR pre-encryption are carried out first, and the image is partitioned, and then the sequence generated by Tent map is used for sorting index and circular shift. In the process of encryption, the plaintext image has undergone pixel replacement and pixel diffusion, so that the value and position of the plaintext pixel have changed. Experimental results show that this algorithm has good encryption performance and security.

    参考文献
    相似文献
    引证文献
引用本文
分享
文章指标
  • 点击次数:
  • 下载次数:
  • HTML阅读次数:
  • 引用次数:
历史
  • 收稿日期:2021-11-03
  • 最后修改日期:2021-12-12
  • 录用日期:2022-01-13
  • 在线发布日期: 2022-11-04
  • 出版日期: