首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
2.
The proliferation of information and communication technology has made exchange of information easier than ever. Security and copyright protection of multimedia contents in such a scenario has become a major challenge for the research community round the globe. Digital watermarking has been found as an effective tool for protection and security of multimedia content. A secure and robust watermarking scheme based on DC coefficient modification in pixel domain and a modified logistic map is presented in this paper. The cover image is divided into \(8 \times 8\) sub-blocks and instead of computing DC coefficient using discrete cosine transform (DCT), we compute DC coefficient of each block in spatial domain. Watermark bits are embedded by modifying DC coefficients of various blocks in spatial domain. The quantum of change to be brought in various pixels of a block for embedding watermark bit depends upon DC coefficient of respective blocks, nature of watermark bit (0 or 1) to be embedded and the adjustment factor. The security of embedded watermark has been taken care of by using chaotic encryption based on a generalized logistic map (GLM). We show that GLM has better properties like ergodicity, larger lyapunov exponent, uniform invariant density, mixing, higher range of bifurcation parameter etc., compared to basic logistic map. We exploit these properties of GLM for designing a secure robust, strong efficient cryptosystem to encrypt the watermark information before embedding it. Experimental investigations show that besides being highly secure the proposed technique is robust to both signal processing and geometric attacks. Further, the proposed scheme is computationally efficient as DC coefficient which holds the information is computed in pixel domain instead of using DCT on an image block.  相似文献   

3.
In this paper, an intelligent watermarking scheme optimized by adaptive differential evolution (ADE) is proposed based on chaotic map and quaternion wavelet transform (QWT). Watermark is first scrambled by a piecewise linear chaotic map to increase security and then inserted into the real QWT amplitude coefficients intelligently. ADE algorithm is explored to optimize the watermarking parameter (i.e., scaling factors) automatically. The experimental results demonstrate the high robustness against common signal processing operations, especially geometrical distortions of the proposed algorithm. Comparison results also indicate the superiority of the proposed algorithm over the existing watermarking algorithm.  相似文献   

4.
A new image alternate encryption algorithm based on chaotic map   总被引:1,自引:0,他引:1  
In this paper, a new image alternative encryption algorithm is proposed, in which the shuffling and diffusion are performed simultaneously. The plain image is divided into two left and right blocks of same size. The matrix which is generated by a logistic map is used to diffuse the left block of the plain image. Then, the diffused image is used as the right block of the cipher image. The 0, 1 sequence which comes from another logistic chaotic sequence and plaintext is used to shuffle the right block of the cipher image. After the operation XOR, the left block of cipher image is generated. Finally, two new-generated blocks are merged into the cipher image. In order to get better effect for image encryption, this process can be repeated many rounds. The simulation results show that this algorithm has properties of big key space, high sensitivity to key, resisting statistical analysis, differential attacks, plaintext attacks, and chosen-plaintext attacks. So, it has high security and can be suitable for image encryption.  相似文献   

5.
Zhou  Shuang  Qiu  Yuyu  Wang  Xingyuan  Zhang  Yingqian 《Nonlinear dynamics》2023,111(10):9571-9589

Chaotic systems are widely used in image encryption due to their sensitivity to initial values, ergodicity, and other properties; many image encryption algorithms based on chaotic systems have been studied in the past few years. To obtain a more secure encryption algorithm, this work firstly proposes a new two-dimensional discrete hyperchaotic map, which has a wider continuous chaotic interval, larger Lyapunov exponents and passed all NIST and part of TestU01 tests. Then, we apply the proposed map to generate S-boxes and combine them in pairs; finally, twelve S-boxes are obtained, and the elements of the plaintext image are grouped, each group of pixels is summed, and modular operations are used to specify specific S-boxes. Next, each set of elements is bitwise XOR with the corresponding S-box. Finally, the cipher image is obtained by scrambling using chaotic signal. Experiments show that compared with some other encryption algorithms, the proposed S-box-based encryption method has higher security, and it resists to common attacks.

  相似文献   

6.
An efficient image encryption algorithm using the generalized Arnold map is proposed. The algorithm is composed of two stages, i.e., permutation and diffusion. First, a total circular function, rather than the traditional periodic position permutation, is used in the permutation stage. It can substantially reduce the correlation between adjacent pixels. Then, in the stage of diffusion, double diffusion functions, i.e., positive and opposite module, are utilized with a novel generation of the keystream. As the keystream depends on the processed image, the proposed method can resist known- and chosen-plaintext attacks. Experimental results and theoretical analysis indicate the effectiveness of our method. An extension of the proposed algorithm to other chaotic systems is also discussed.  相似文献   

7.
Nonlinear Dynamics - In this work, we propose a novel 3D chaotic map obtained by coupling the piecewise and logistic maps. Showing excellent properties, like a high randomness, a high complexity...  相似文献   

8.
9.
We introduce a simple chaotic system that contains one multiplier and one quadratic term. The system is similar to the generalized Lorenz system but is not topologically equivalent. The properties of the proposed chaotic system are examined by theoretical and numerical analysis. An analog chaotic circuit is implemented that realizes the chaotic system for the verification of its attractor. Furthermore, we propose a robust function projective synchronization using time delay estimation. A numerical simulation of synchronization between the proposed system and the Lorenz system demonstrates that the proposed approach provides fast and robust synchronization even in the presence of unknown parameter variations and disturbances.  相似文献   

10.
This paper proposes a parallel digital image encryption algorithm based on a piecewise linear chaotic map (PWLCM) and a four-dimensional hyper-chaotic map (FDHCM). Firstly, two decimals are obtained based on the plain-image and external keys, using a novel parallel quantification method. They are used as the initial value and control parameter for the PWLCM. Then, an encryption matrix and four chaotic sequences are constructed using the PWLCM and FDHCM, which control the permutation and diffusion processes. The proposed algorithm is implemented and tested in parallel based on a graphics processing unit device. Numerical analysis and experimental results show that the proposed algorithm achieves a high encryption speed and a good security performance, which provides a potential solution for real-time image encryption applications.  相似文献   

11.
Since the size of the image file is not reduced after encryption, the flow rate of image file transmission cannot be reduced. Transmission time is wasted. To meet the requirements of security and real-time, wavelet transform and chaotic image encryption technology are combined. A cross-chaos map has been proposed based on Devaney’s theory. The image pixels are scrambled under the control of high-dimensional chaotic sequence, which is generated by the cross chaotic map. The image pixels are substituted by the ciphertext feedback algorithm. The algorithm can relate to encryption parameters with plaintext, and can make one plaintext byte affect more ciphertext bytes. In the process of image wavelet transform, image encryption and image compression are combined. The low frequency region of the wavelet transform is encrypted. Security analysis and experimental validation illuminated that the algorithm has high security, good encryption speed, and compression effect. The algorithm has good practical value.  相似文献   

12.
Recently, image encryption has emerged as an extremely urgent need to provide high protection for secure images against being used without any authorization. In the present paper, the 3-cell chaotic map known as cycling chaos was employed for image encryption based on biological operations. In order to increase security of the proposed method, the 120-bits secret key is used. DNA Sequences and cycling chaos were used to scramble the positions of the image pixels, and then the pixels grey values were modified using a mask DNA generated by cycling chaos. The obtained results demonstrated high security of the proposed method, and it was found acceptably resistant against different well-known attacks.  相似文献   

13.
14.
This paper reports a new five-dimensional (5D) hyperchaotic system with three positive Lyapunov exponents, which is generated by adding a linear controller to the second equation of a 4D system that is obtained by coupling of a 1D linear system and a 3D modified generalized Lorenz system. This hyperchaotic system has very simple algebraic structure but can exhibit complex dynamical behaviors. Of particular interest are the observations that the hyperchaotic system has a hyperchaotic attractor with three positive Lyapunov exponents under a unique equilibrium, three or infinite equilibria, and there are three types of coexisting attractors of this new 5D hyperchaotic system. Numerical analysis of phase trajectories, Lyapunov exponents, bifurcation, Poincaré projections and power spectrum verifies the existence of the hyperchaotic and chaotic attractors. Moreover, stability of hyperbolic or non-hyperbolic equilibria and two complete mathematical characterization for 5D Hopf bifurcation are rigorously studied. Finally, some electronic circuits are designed to implement the 5D hyperchaotic system.  相似文献   

15.
This paper describes an efficient method to predict the nonlinear steady-state response of a complex structure with multi-scattered friction contacts. The contact friction force is equivalent to additional stiffness and damping based on optimal approximation theory, and as a consequence, the computation is simplified greatly by the linearization for a nonlinear system. In order to obtain accurate pressure distribution on the contact interfaces, the dynamic contact normal pressure is obtained by the equivalent static analysis which is validated for most engineering cases. Considering the complex procedure to determine the transformation between two different contact states, the differential forms of friction force are given to solve the tangential force accurately under the complex movement of interfaces. The approaches developed in this paper are particularly suitable to solve the dynamic response of large-scale structures with local contact nonlinearities. The entire procedure to calculate the steady-state response of a finite element model with a large number of degrees of freedom is demonstrated taking the blades with underplatform dampers as an example. The method is proved to be accurate and efficient; in particular, it does not suffer convergence problem in the allowable range of precision error, which exhibits remarkable potential engineering application values.  相似文献   

16.
In this paper, the authors propose a novel block cryptographic scheme based on the coupled chaotic map lattice. A pseudorandom number generator is constructed with the coupled spatiotemporal chaotic map lattice, which depends on the plaintext. The plaintext block is then encrypted by the classical chaotic masking technique. The pseudorandom sequences produced by the generator have excellent statistical properties; therefore, they are suitable for encrypting messages. Moreover, it can be easily implemented in parallel by hardware. Both theoretical analysis and numerical simulation prove the block cryptographic scheme secure and practical.  相似文献   

17.
Lambić  Dragan 《Nonlinear dynamics》2020,100(1):699-711
Nonlinear Dynamics - In this paper, a new one-dimensional discrete-space chaotic map based on the multiplication of integer numbers and circular shift is presented. Dynamical properties of the...  相似文献   

18.
Farah  M. A. Ben  Farah  A.  Farah  T. 《Nonlinear dynamics》2020,99(4):3041-3064
Nonlinear Dynamics - This paper proposes a new hybrid chaotic map and a different way of using optimization technique to improve the performance of encryption algorithms. Compared to other chaotic...  相似文献   

19.
20.
Image encryption has been an attractive research field in recent years. The chaos-based cryptographic algorithms have suggested some new and efficient ways to develop secure image encryption techniques. This paper proposes a novel image encryption scheme, which is based on the chaotic tent map. Image encryption systems based on such map show some better performances. Firstly, the chaotic tent map is modified to generate chaotic key stream that is more suitable for image encryption. Secondly, the chaos-based key stream is generated by a 1-D chaotic tent map, which has a better performance in terms of randomness properties and security level. The performance and security analysis of the proposed image encryption scheme is performed using well-known ways. The results of the fail-safe analysis are inspiring, and it can be concluded that the proposed scheme is efficient and secure.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号