共查询到20条相似文献,搜索用时 15 毫秒
1.
Xiao-Jun Tong 《Communications in Nonlinear Science & Numerical Simulation》2013,18(7):1725-1733
In order to solve the problem that chaos is degenerated in limited computer precision and Cat map is the small key space, this paper presents a chaotic map based on topological conjugacy and the chaotic characteristics are proved by Devaney definition. In order to produce a large key space, a Cat map named block Cat map is also designed for permutation process based on multiple-dimensional chaotic maps. The image encryption algorithm is based on permutation–substitution, and each key is controlled by different chaotic maps. The entropy analysis, differential analysis, weak-keys analysis, statistical analysis, cipher random analysis, and cipher sensibility analysis depending on key and plaintext are introduced to test the security of the new image encryption scheme. Through the comparison to the proposed scheme with AES, DES and Logistic encryption methods, we come to the conclusion that the image encryption method solves the problem of low precision of one dimensional chaotic function and has higher speed and higher security. 相似文献
2.
A. Akhshani A. Akhavan S.-C. Lim Z. Hassan 《Communications in Nonlinear Science & Numerical Simulation》2012,17(12):4653-4661
The topic of quantum chaos has begun to draw increasing attention in recent years. While a satisfactory definition for it is not settled yet in order to differentiate between its classical counterparts. Dissipative quantum maps can be characterized by sensitive dependence on initial conditions, like classical maps. Considering this property, an implementation of image encryption scheme based on the quantum logistic map is proposed. The security and performance analysis of the proposed image encryption is performed using well-known methods. The results of the reliability analysis are encouraging and it can be concluded that, the proposed scheme is efficient and secure. The results of this study also suggest application of other quantum maps such as quantum standard map and quantum baker map in cryptography and other aspects of security and privacy. 相似文献
3.
《Communications in Nonlinear Science & Numerical Simulation》2014,19(10):3653-3659
Many round-based chaotic image encryption algorithms employ the permutation–diffusion structure. This structure has been found insecure when the iteration round is equal to one and the secret permutation of some existing schemes can be recovered even a higher round is adopted. In this paper, we present a single round permutation–diffusion chaotic cipher for gray image, in which some temp-value feedback mechanisms are introduced to resist the known attacks. Specifically, we firstly embed the plaintext feedback technique in the permutation process to develop different permutation sequences for different plain-images and then employ plaintext/ciphertext feedback for diffusion to generate equivalent secret key dynamically. Experimental results show that the new scheme owns large key space and can resist the differential attack. It is also efficient. 相似文献
4.
A novel image encryption scheme based on spatial chaos map 总被引:1,自引:0,他引:1
In recent years, the chaos-based cryptographic algorithms have suggested some new and efficient ways to develop secure image encryption techniques, but the drawbacks of small key space and weak security in one-dimensional chaotic cryptosystems are obvious. In this paper, spatial chaos system are used for high degree security image encryption while its speed is acceptable. The proposed algorithm is described in detail. The basic idea is to encrypt the image in space with spatial chaos map pixel by pixel, and then the pixels are confused in multiple directions of space. Using this method one cycle, the image becomes indistinguishable in space due to inherent properties of spatial chaotic systems. Several experimental results, key sensitivity tests, key space analysis, and statistical analysis show that the approach for image cryptosystems provides an efficient and secure way for real time image encryption and transmission from the cryptographic viewpoint. 相似文献
5.
A. Kanso M. Ghebleh 《Communications in Nonlinear Science & Numerical Simulation》2012,17(7):2943-2959
Recently [Solak E, Çokal C, Yildiz OT Biyikogˇlu T. Cryptanalysis of Fridrich’s chaotic image encryption. Int J Bifur Chaos 2010;20:1405-1413] cryptanalyzed the chaotic image encryption algorithm of [Fridrich J. Symmetric ciphers based on two-dimensional chaotic maps. Int J Bifur Chaos 1998;8(6):1259-1284], which was considered a benchmark for measuring security of many image encryption algorithms. This attack can also be applied to other encryption algorithms that have a structure similar to Fridrich’s algorithm, such as that of [Chen G, Mao Y, Chui, C. A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos Soliton Fract 2004;21:749-761]. In this paper, we suggest a novel image encryption algorithm based on a three dimensional (3D) chaotic map that can defeat the aforementioned attack among other existing attacks. The design of the proposed algorithm is simple and efficient, and based on three phases which provide the necessary properties for a secure image encryption algorithm including the confusion and diffusion properties. In phase I, the image pixels are shuffled according to a search rule based on the 3D chaotic map. In phases II and III, 3D chaotic maps are used to scramble shuffled pixels through mixing and masking rules, respectively. Simulation results show that the suggested algorithm satisfies the required performance tests such as high level security, large key space and acceptable encryption speed. These characteristics make it a suitable candidate for use in cryptographic applications. 相似文献
6.
《Communications in Nonlinear Science & Numerical Simulation》2014,19(12):4094-4104
In this paper, an efficient self-adaptive model for chaotic image encryption algorithm is proposed. With the help of the classical structure of permutation-diffusion and double simple two-dimensional chaotic systems, an efficient and fast encryption algorithm is designed. However, different from most of the existing methods which are found insecure upon chosen-plaintext or known-plaintext attack in the process of permutation or diffusion, the keystream generated in both operations of our method is dependent on the plain-image. Therefore, different plain-images will have different keystreams in both processes even just only a bit is changed in the plain-image. This design can solve the problem of fixed chaotic sequence produced by the same initial conditions but for different images. Moreover, the operation speed is high because complex mathematical methods, such as Runge–Kutta method, of solving the high-dimensional partial differential equations are avoided. Numerical experiments show that the proposed self-adaptive method can well resist against chosen-plaintext and known-plaintext attacks, and has high security and efficiency. 相似文献
7.
An efficient diffusion approach for chaos-based image encryption 总被引:2,自引:0,他引:2
Kwok-Wo Wong Bernie Sin-Hung Kwok Ching-Hung Yuen 《Chaos, solitons, and fractals》2009,41(5):2652-2663
One of the existing chaos-based image cryptosystems is composed of alternative substitution and diffusion stages. A multi-dimensional chaotic map is usually employed in the substitution stage for image pixel permutation while a one-dimensional (1D) chaotic map is used for diffusion purpose. As the latter usually involves real number arithmetic operations, the overall encryption speed is limited by the diffusion stage. In this paper, we propose a more efficient diffusion mechanism using simple table lookup and swapping techniques as a light-weight replacement of the 1D chaotic map iteration. Simulation results show that at a similar security level, the proposed cryptosystem needs about one-third the encryption time of a similar cryptosystem. The effective acceleration of chaos-based image cryptosystems is thus achieved. 相似文献
8.
9.
G. Alvarez Shujun Li 《Communications in Nonlinear Science & Numerical Simulation》2009,14(11):3743-3749
This paper describes the security weakness of a recently proposed image encryption algorithm based on a logistic-like new chaotic map. We show that the chaotic map’s distribution is far from ideal, thus making it a bad candidate as a pseudo-random stream generator. As a consequence, the images encrypted with this algorithm are shown to be breakable through different attacks of variable complexity. 相似文献
10.
Liang Zhao Avishek AdhikariDi Xiao Kouichi Sakurai 《Communications in Nonlinear Science & Numerical Simulation》2012,17(8):3303-3327
An image scrambling encryption scheme for pixel bits was presented by Ye [Ye GD. Image scrambling encryption algorithm of pixel bit based on chaos map. Pattern Recognit Lett 2010;31:347-54], which can be seen as one kind of typical binary image scrambling encryption considering from the bit-plain of size M × (8N). However, recently, some defects existing in the original image encryption scheme, i.e., Ye’s scheme, have been observed by Li and Lo [Li CQ, Lo KT. Optimal quantitative cryptanalysis of permutation-only multimedia ciphers against plaintext attacks. Signal Process 2011;91:949-54]. In the attack proposed by Li and Lo at least 3 + ⌈log2(MN)⌉ plain images of size M × N are used to reveal the permutation matrix W = [w(i, k)] (i ∈ {1, 2, … , M}; k ∈ {1, 2, … , 8N}) which can be applied to recover the exact plain image. In the current paper, at first, one type of special plain image/cipher image is used to analyze the security weakness of the original image scrambling scheme under study. The final encryption vectors TM and TN or the decryption vectors TM′ and TN′ are revealed completely according to our attack. To demonstrate the performance of our attack, a quantified comparison is drawn between our attack and the attack proposed by Li and Lo. Compared with Li and Lo’s attack, our attack is more efficient in the general conditions. In particular, when the sizes of images satisfy the condition M = N or M ? 8N, the number of the used plain images/cipher images is at most 9, which is sharply less than 3 + ⌈log2(MN)⌉ when M and N are of large size. To overcome the weaknesses of the original scheme, in this paper, an improved image scrambling encryption scheme is proposed. In the improved scheme, the idea of the “self-correlation” method is used to resist the chosen-plaintext attack/known-plaintext attack. The corresponding simulations and analyses illustrate that the improved encryption method has good cryptographic properties, and can overcome the weakness of the original image encryption scheme. Finally, farther improvement is briefly presented for the future work. 相似文献
11.
David Arroyo Chengqing Li Shujun Li Gonzalo Alvarez Wolfgang A. Halang 《Chaos, solitons, and fractals》2009,41(5):2613-2616
Chaotic systems have been broadly exploited through the last two decades to build encryption methods. Recently, two new image encryption schemes have been proposed, where the encryption process involves a permutation operation and an XOR-like transformation of the shuffled pixels, which are controlled by three chaotic systems. This paper discusses some defects of the schemes and how to break them with a chosen-plaintext attack. 相似文献
12.
Xingyuan Wang Dapeng Luan 《Communications in Nonlinear Science & Numerical Simulation》2013,18(11):3075-3085
In this paper, a novel image encryption scheme is proposed based on reversible cellular automata (RCA) combining chaos. In this algorithm, an intertwining logistic map with complex behavior and periodic boundary reversible cellular automata are used. We split each pixel of image into units of 4 bits, then adopt pseudorandom key stream generated by the intertwining logistic map to permute these units in confusion stage. And in diffusion stage, two-dimensional reversible cellular automata which are discrete dynamical systems are applied to iterate many rounds to achieve diffusion on bit-level, in which we only consider the higher 4 bits in a pixel because the higher 4 bits carry almost the information of an image. Theoretical analysis and experimental results demonstrate the proposed algorithm achieves a high security level and processes good performance against common attacks like differential attack and statistical attack. This algorithm belongs to the class of symmetric systems. 相似文献
13.
A perceptual pyramid watermarking method is proposed. The key idea is to use the contrast sensitivity of the human visual
system (HVS) to determine “invisible” regions where watermark energy can be adjusted providing an invisible and robust watermark.
These invisibles regions are obtained by computing a “visibility map” at each level of the Gaussian pyramid (GP). The watermark
is weighted by the local contrast and a global scaling factor. The embedding process is performed by modifying the values
in some levels of the Laplacian Pyramid (LP) using the spread spectrum technique. Afterwards, the watermarked image can be
constructed from the levels of the LP. For watermark detection, a blind detection scheme using the threshold-correlation based
technique is proposed. Finally, the performances of the watermarking method are evaluated in terms of invisibility and robustness
using some quality metrics and different attacks of Stirmark such as Gaussian noise, low-pass filtering, Jpeg compression
and cropping. This evaluation is performed for the choice of some parameters of the watermarking system depending on performances
such as invisibility and robustness. The design of our watermarking technique can finally be formulated as an optimisation
problem where the objective is to guarantee a trade-off between invisibility and robustness. 相似文献
14.
Arman Kiani-B Kia Fallahi Naser Pariz Henry Leung 《Communications in Nonlinear Science & Numerical Simulation》2009,14(3):863-879
In recent years chaotic secure communication and chaos synchronization have received ever increasing attention. In this paper, for the first time, a fractional chaotic communication method using an extended fractional Kalman filter is presented. The chaotic synchronization is implemented by the EFKF design in the presence of channel additive noise and processing noise. Encoding chaotic communication achieves a satisfactory, typical secure communication scheme. In the proposed system, security is enhanced based on spreading the signal in frequency and encrypting it in time domain. In this paper, the main advantages of using fractional order systems, increasing nonlinearity and spreading the power spectrum are highlighted. To illustrate the effectiveness of the proposed scheme, a numerical example based on the fractional Lorenz dynamical system is presented and the results are compared to the integer Lorenz system. 相似文献
15.
16.
Semi-implicit finite volume scheme for solving nonlinear diffusion equations in image processing 总被引:1,自引:0,他引:1
Summary. We propose and prove a convergence of the semi-implicit finite volume approximation scheme for the numerical solution of the modified (in the sense of Catté, Lions, Morel and Coll) Perona–Malik nonlinear image selective smoothing equation (called anisotropic diffusion in the image processing). The proof is based on a-priori estimates and Kolmogorov's compactness theorem. The implementation aspects and computational results are discussed. Received January 7, 1999 / Revised version received May 31, 2000 / Published online March 20, 2001 相似文献
17.
An improved particle swarm optimization algorithm combined with piecewise linear chaotic map 总被引:3,自引:0,他引:3
Particle swarm optimization (PSO) has gained increasing attention in tackling complex optimization problems. Its further superiority when hybridized with other search techniques is also shown. Chaos, with the properties of ergodicity and stochasticity, is definitely a good candidate, but currently only the well-known logistic map is prevalently used. In this paper, the performance and deficiencies of schemes coupling chaotic search into PSO are analyzed. Then, the piecewise linear chaotic map (PWLCM) is introduced to perform the chaotic search. An improved PSO algorithm combined with PWLCM (PWLCPSO) is proposed subsequently, and experimental results verify its great superiority. 相似文献
18.
Unsteady state counter diffusion problem with position dependent diffusion coefficient can be modeled using Fick’s second law. A mathematical model was constructed and solved to quantitatively describe the dynamic behavior of solute diffusion through non-homogeneous materials where diffusion coefficient is a function of position. The eigenfunction expansion approach was utilized to solve the model. The eigenvalues and eigenfunction of the system were obtained using a variational method. It has been shown that position dependency of the material can be neglected if the thickness of the material is relatively small. Mathematical models were solved for different thicknesses and different diffusion coefficient functions. 相似文献
19.
We consider the problem of deterministic transport of particles in an asymmetric periodic ratchet potential of the rocking type. When the inertial term is taken into account, the dynamics can be chaotic and modify the transport properties. We calculate the bifurcation diagram as a function of the amplitude of forcing and analyze in detail the crisis bifurcation that leads to current reversals. Near this bifurcation we obtain intermittency and anomalous deterministic diffusion. 相似文献
20.