首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
Digital image encryption with chaotic map lattices   总被引:1,自引:0,他引:1       下载免费PDF全文
孙福艳  吕宗旺 《中国物理 B》2011,20(4):40506-040506
This paper proposes a secure approach for encryption and decryption of digital images with chaotic map lattices. In the proposed encryption process,eight different types of operations are used to encrypt the pixels of an image and one of them will be used for particular pixels decided by the outcome of the chaotic map lattices. To make the cipher more robust against any attacks,the secret key is modified after encrypting each block of sixteen pixels of the image. The experimental results and security analysis show that the proposed image encryption scheme achieves high security and efficiency.  相似文献   

2.
基于混沌神经网络的单向Hash函数   总被引:1,自引:0,他引:1       下载免费PDF全文
刘光杰  单梁  戴跃伟  孙金生  王执铨 《物理学报》2006,55(11):5688-5693
提出了一种基于混沌神经网络的单向Hash函数,该方法通过使用以混沌分段线性函数作为输出函数的神经网络和基于时空混沌的密钥生成函数实现明文和密钥信息的混淆和扩散,并基于密码块连接模式实现对任意长度的明文序列产生128位的Hash值.理论分析和实验结果表明,提出的Hash函数可满足所要求的单向性,初值和密钥敏感性,抗碰撞性和实时性等要求. 关键词: 混沌神经网络 Hash函数 分段线性混沌映射 时空混沌  相似文献   

3.
徐淑奖  王继志  杨素香 《中国物理 B》2008,17(11):4027-4032
Recently, two chaotic image encryption schemes have been proposed, in which shuffling the positions and changing the grey values of image pixels are combined. This paper provides the chosen plaintext attack to recover the corresponding plaintext of a given ciphertext. Furthermore, it points out that the two schemes are not sufficiently sensitive to small changes of the plaintext. Based on the given analysis, it proposes an improved algorithm which includes two rounds of substitution and one round of permutation to strengthen the overall performance.  相似文献   

4.
A digital image encryption scheme using chaotic map lattices has been proposed recently. In this paper, two fatal flaws of the cryptosystem are pointed out. According to these two drawbacks, cryptanalysts could recover the plaintext by applying the chosen plaintext attack. Therefore, the proposed cryptosystem is not secure enough to be used in the image transmission system. Experimental results show the feasibility of the attack. As a result, we make some improvements to the encryption scheme, which can completely resist our chosen plaintext attack.  相似文献   

5.
Yining Su 《中国物理 B》2022,31(11):110503-110503
This paper proposes an image encryption algorithm based on spatiotemporal chaos and middle order traversal of a binary tree. Firstly, other programming software is used to perform the middle order traversal, and the plaintext image is sorted according to the middle order traversal sequence on the permutation. Secondly, the chaotic sequence is generated using the coupled map lattice to set the chaotic interference value. Finally, the XOR operation between the adjacent pixel values of the replacement image is completed to generate the ciphertext matrix. The simulation and experimental results show that the proposed algorithm can resist typical attacks and has good robustness.  相似文献   

6.
基于非对称密码系统的彩色图像加密技术   总被引:1,自引:1,他引:0       下载免费PDF全文
为了实现对彩色图像的加密,提出一种基于傅里叶变换和非对称密钥加密系统的加密方法。把彩色图像分成三基色分量:红,绿,蓝。然后对这3帧灰度图像的傅里叶频谱进行截取,合成一个目标图像,该目标图像包含了原始彩色图像的大部分信息。对此目标图像的幅度和相位分别用非对称密钥加密系统加密,即实现了彩色图像的加密。 给出了理论分析和计算机模拟结果,实验结果证实了该方法的可行性。  相似文献   

7.
王兴元  张娜  任小丽  张永雷 《中国物理 B》2011,20(2):20507-020507
Coupled map lattices (CMLs) are taken as examples to study the synchronization of spatiotemporal chaotic systems.In this paper,we use the nonlinear coupled method to implement the synchronization of two coupled map lattices.Through the appropriate separation of the linear term from the nonlinear term of the spatiotemporal chaotic system,we set the nonlinear term as the coupling function and then we can achieve the synchronization of two coupled map lattices.After that,we implement the secure communication of digital image using this synchronization method.Then,the discrete characteristics of the nonlinear coupling spatiotemporal chaos are applied to the discrete pixel of the digital image.After the synchronization of both the communication parties,the receiver can decrypt the original image.Numerical simulations show the effectiveness and the feasibility of the proposed program.  相似文献   

8.
9.
孙福艳  刘树堂  吕宗旺 《中国物理》2007,16(12):3616-3623
In recent years, the chaos based cryptographic algorithms have suggested some new and efficient ways to develop secure image encryption techniques. This paper proposes a new approach for image encryption based on a high-dimensional chaotic map. The new scheme employs the Cat map to shuffle the positions, then to confuse the relationship between the cipher-image and the plain-image using the high-dimensional Lorenz chaotic map preprocessed. The results of experimental, statistical analysis and key space analysis show that the proposed image encryption scheme provides an efficient and secure way for real-time image encryption and transmission.  相似文献   

10.
非线性耦合时空混沌系统的反同步研究   总被引:5,自引:0,他引:5       下载免费PDF全文
吕翎  夏晓岚 《物理学报》2009,58(2):814-818
利用非线性耦合方法研究了离散型时空混沌系统的反同步问题.对时空混沌系统的线性项和非线性项进行适当的分离,利用系统本身的非线性项作为耦合函数,实现了两个二维耦合映象格子的反同步.进一步将这种非线性耦合方法推广应用到由二维耦合映象格子构成复杂网络的反同步研究中,仿真模拟发现仍具有理想的反同步效果. 关键词: 反同步 非线性耦合 耦合映象格子 复杂网络  相似文献   

11.
王世红  李达 《中国物理 B》2010,19(8):80505-080505
<正>In this paper we analyse the security of a multiple pseudorandom-bit generator based on the coupled map lattice and suggest an improved model.Utilizing the error function attack,the multiple pseudorandom-bit generators which can be realized by the three digitization methods are analysed and the effective key spaces are estimated.We suggest an improved multiple pseudorandom-bit generator with 128-bit secret key,and analyse the key sensitivity and statistical properties of the system.  相似文献   

12.
刘建东  余有明 《物理学报》2007,56(3):1297-1304
在分析单向与双向耦合映像格子系统的初值与参数敏感性的基础上,提出了一种基于可变参数双向耦合映像系统的时空混沌单向Hash函数构造方案.该方案以耦合映像系统的部分初态作为密钥,在迭代过程中, 通过上一次的迭代值和线性变换后的不同位置的明文消息比特动态确定双向耦合映像系统模型参数,将明文消息多格点并行注入时空混沌轨迹中;取迭代序列中最后一轮迭代结果的适当空间项,线性映射为Hash值要求的128 bit值.由于耦合映像系统的双向扩散机理与混乱作用,迭代过程具有极强的不可逆性及初值与参数敏感性,Hash结果的每位都与明文及密钥有着敏感、复杂的非线性强耦合关系.仿真实验与分析结果表明,该算法达到了Hash函数的各项性能要求,安全性好,执行效率高. 关键词: Hash函数 时空混沌 耦合映像格子  相似文献   

13.
In this paper, we propose a novel image encryption scheme based on DNA (Deoxyribonucleic acid) sequence operations and chaotic system. Firstly, we perform bitwise exclusive OR operation on the pixels of the plain image using the pseudorandom sequences produced by the spatiotemporal chaos system, i.e., CML (coupled map lattice). Secondly, a DNA matrix is obtained by encoding the confused image using a kind of DNA encoding rule. Then we generate the new initial conditions of the CML according to this DNA matrix and the previous initial conditions, which can make the encryption result closely depend on every pixel of the plain image. Thirdly, the rows and columns of the DNA matrix are permuted. Then, the permuted DNA matrix is confused once again. At last, after decoding the confused DNA matrix using a kind of DNA decoding rule, we obtain the ciphered image. Experimental results and theoretical analysis show that the scheme is able to resist various attacks, so it has extraordinarily high security.  相似文献   

14.
牛培峰  张君  关新平 《物理学报》2007,56(5):2493-2497
提出了采用改进的遗传算法优化比例-积分-微分(PID)神经网络解耦控制器的连接权值,从而实现PID控制器参数的优化及非线性多变量系统的解耦控制. 改进的遗传算法优于基本遗传算法,它使寻优过程中的计算量减少,计算效率提高,收敛速度加快. 将优化后的PID神经网络解耦控制器应用于统一混沌系统的控制中,仿真实验收到良好的控制效果,证明了PID控制器应用于统一混沌系统控制的有效性. 关键词: 混沌系统 遗传算法 比例-积分-微分 神经网络  相似文献   

15.
Recently, a novel block encryption system has been proposed as an improved version of the chaotic cryptographic method based on iterating a chaotic map. In this Letter, a flaw of this cryptosystem is pointed out and a chosen plaintext attack is presented. Furthermore, a remedial improvement is suggested, which avoids the flaw while keeping all the merits of the original cryptosystem.  相似文献   

16.
郭业才  周林锋 《物理学报》2015,64(19):194204-194204
在图像去噪过程中, 大部分基于偏微分方程的各向异性扩散模型均使用梯度信息检测边缘, 当边缘部分被噪声严重污染时, 这些方法不能有效检测出这些边缘, 因而无法保留边缘特征. 为了较完整的保留图像的区域信息, 用脉冲耦合神经网络(PCNN)能使具有相似输入的神经元同时产生脉冲的性质对噪声图像做处理, 得到图像熵序列, 并将图像熵序列作为边缘检测算子引入到扩散方程中, 不仅能克服仅用梯度作为边缘检测算子易受噪声影响的弊端, 而且能较完整地保留图像的区域信息. 然后, 用最小交叉熵准则搜索使去噪前后图像信息量差异最小的阈值, 设计最佳阈值控制扩散强度, 建立基于脉冲耦合神经网络与图像熵改进的各向异性扩散模型(PCNN-IEAD). 分析与仿真结果表明, 该模型与经典模型相比, 保留了更多的图像信息, 能够兼顾去除图像的噪声和保护图像的边缘纹理等细节信息, 较完整的保留了图像的区域信息, 性能指标同样也证实了新模型的优越性. 另外, 该模型的运行时间较经典模型的短, 因此, 该模型是一个理想的模型.  相似文献   

17.
A new cryptosystem based on spatial chaotic system   总被引:1,自引:0,他引:1  
Encryption of images is different from that of texts due to some intrinsic features of images such as bulk data capacity and high redundancy, which is generally difficult to handle by traditional methods. This paper proposes a new spatial chaos system (SCS), which is investigated by conducting FIPS 140-1 statistic test, and is especially useful for encryption of digital images. It is shown how to adapt a two dimensional (2D) ergodic matrix obtained from SCS to permute the positions of image pixels and confuse the relationship between the cipher image and plain image simultaneously. Experimental results show that the performance and security of the proposed cryptographic system are better than those of existing lower dimensional chaotic cryptographic systems.  相似文献   

18.
An image encryption scheme based on new spatiotemporal chaos   总被引:1,自引:0,他引:1  
Spatiotemporal chaos is chaotic dynamics in spatially extended system, which has attracted much attention in the image encryption field. The spatiotemporal chaos is often created by local nonlinearity dynamics and spatial diffusion, and modeled by coupled map lattices (CML). This paper introduces a new spatiotemporal chaotic system by defining the local nonlinear map in the CML with the nonlinear chaotic algorithm (NCA) chaotic map, and proposes an image encryption scheme with the permutation-diffusion mechanism based on these chaotic maps. The encryption algorithm diffuses the plain image with the bitwise XOR operation between itself pixels, and uses the chaotic sequence generated by the NCA map to permute the pixels of the resulting image. Finally, the constructed spatiotemporal chaotic sequence is employed to diffuse the shuffled image. The experiments demonstrate that the proposed encryption scheme is of high key sensitivity and large key space. In addition, the scheme is secure enough to resist the brute-force attack, entropy attack, differential attack, chosen-plaintext attack, known-plaintext attack and statistical attack.  相似文献   

19.
曾喆昭* 《物理学报》2013,62(3):30504-030504
对不确定混沌系统控制问题, 研究了一种基于径向基函数神经网络(radial basis function neural network, RBFNN)的反馈补偿控制方法. 该方法首先用RBFNN对混沌系统的动力学特性进行学习, 然后用训练好的RBFNN模型对混沌系统进行反馈补偿控制. 该方法的特点是不需要被控混沌系统的数学模型,可以快速跟踪任意给定的参考信号. 数值仿真试验表明了该控制方法不仅具有响应速度快、控制精度高, 而且具有较强的抑制混沌系统参数摄动能力和抗干扰能力.  相似文献   

20.
To ensure the security of a digital image, a new self-adapting encryption algorithm based on the spatiotemporal chaos and ergodic matrix is proposed in this paper. First, the plain-image is divided into different blocks of the same size, and each block is sorted in ascending order to obtain the corresponding standard ergodic matrix. Then each block is encrypted by the spatiotemporal chaotic system and shuffled according to the standard ergodic matrix. Finally, all modules are rearranged to acquire the final encrypted image. In particular, the plain-image information is used in the initial conditions of the spatiotemporal chaos and the ergodic matrices, so different plain-images will be encrypted to obtain different cipherimages. Theoretical analysis and simulation results indicate that the performance and security of the proposed encryption scheme can encrypt the image effectively and resist various typical attacks.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号