Computer Science ›› 2018, Vol. 45 ›› Issue (11A): 361-366.

• Information Security • Previous Articles     Next Articles

Double Chaotic Image Encryption Algorithm Based on Run-length Sequence

WANG Le-le, LI Guo-dong   

  1. School of Mathematics,Xinjiang University of Finance and Economics,Urumqi 830012,China
  • Online:2019-02-26 Published:2019-02-26

Abstract: Image encryption has an important position in life and is an interesting topic in the Internet transmission.An improved H-L chaotic image encryption algorithm was proposed.Based on the run-lengths sequence,the improved H-L agorithm is applied to image encryption.After the computer simulation,the simulation results show that the improved algorithm achieves a better encryption effect,enhances the anti-attack performance,and has certain value.

Key words: Chaotic encryption, Chaotic maps, DCT, Image encryption

CLC Number: 

  • TP309
[1] ADLEMAN L M.Molecular Computation of Solutions to Combinatorial Problems [J].Science,1994,266(5187):1021-1024.
[2]黄冬梅,耿霞,魏立斐.基于Henon映射的加密遥感图像的安全检索方案[J]. 软件学报,2016,27(7):1729-1740.
[3]赵国敏,李国东.基于广义 Henon映射以及CNN超混沌系统图像加密方案[J].信阳师范学院学报(自然科学版),2015,15(1):141-145.
[4]黄清梅,李国东.基于CNN超混沌特性对图像加密技术的应用研究 [J].绵阳师范学院学报,2017,2(2):60-66.
[5]燕善俊,程德强.一种基于DCT和混沌序列的图像加密算法 [J].徐州工程学院学报(自然科学版),2014,4(4):39-43.
[6]梁涛,李华.基于混沌映射和DNA编码的图像加密算法 [J].计算机工程,2014,40(6):70-74.
[7]徐兵,袁立.基于改进Logistic混沌映射的数字图像加密算法研究 [J].计算机测量与控制,2014,22(7):165-167.
[8]郭伟创,叶瑞松.一种基于猫映射和伯努利移位映射的图像加密算法 [J].汕头大学学报(自然科学版),2015,30(1):13-23.
[9]张雪锋,范九伦.一种改进的基于混沌系统的数字图像加密算法 [J].计算机应用研究,2007,24(4):184-186.
[10]郑凡,田小建,范文华,等.基于Henon映射的数字图像加密 [J].北京邮电大学学报,2008,31(1):66-70.
[11]牛秀龄,陈浩.基于混沌置乱和小波变换的彩色图像加密方法[J].电脑知识与技术,2016,12(11):225-226.
[12]韩凤英,李云.利用复合混沌系统的图像加密方案研究与设计[J].电脑知识与技术,2010,6(13):3450-3452.
[13]黄婵,曾小龙.基于可逆记忆CA融合时问延迟的图像加密算法研究[J].科学技术与工程,2014,14(3):86-92.
[14]孙倩,胡苏.基于改进cat映射与混沌系统的彩色图像快速加密算法 [J].计算机应用研究,2017,34(1):233-237.
[15]马俊明,叶瑞松.对“基于改进广义cat映射的彩色卫星图像加密算法”的安全性分析 [J].汕头大学学报(自然科学版),2016,31(2):50-58.
[16]LI G D,WANG L LÁ.Double chaotic image encryption algorithm based on optimal sequence solution and fractional transform[J].Visual Computer,2018,1(1):1-11.
[1] ZHOU Lian-bing, ZHOU Xiang-zhen, CUI Xue-rong. Compressed Image Encryption Scheme Based on Dual Two Dimensional Chaotic Map [J]. Computer Science, 2022, 49(8): 344-349.
[2] ZHANG Sai-nan, LI Qian-mu. Color Image Encryption Algorithm Based on Logistic-Sine-Cosine Mapping [J]. Computer Science, 2022, 49(1): 353-358.
[3] REN Shuai, WANG Meng, FAN Ao-xiong, GAO Ze, XU Jie, Shahzad KHURRAM, ZHANG Tao. Zero-high-resolution Information Hiding Algorithm for 3D Mesh Model [J]. Computer Science, 2020, 47(7): 328-334.
[4] SHANG Jin-yue, BI Xiu-li, XIAO Bin, LI Wei-sheng. Image Forgery Detection Based on DCT Coefficients Hashing [J]. Computer Science, 2020, 47(6): 310-315.
[5] BAN Duo-han, LV Xin, WANG Xin-yuan. Efficient Image Encryption Algorithm Based on 1D Chaotic Map [J]. Computer Science, 2020, 47(4): 278-284.
[6] YU Feng,GONG Xin-hui,WANG Shi-hong. Cryptanalysis of Medical Image Encryption Algorithm Using High-speed Scrambling and Pixel Adaptive Diffusion [J]. Computer Science, 2020, 47(2): 276-280.
[7] TIAN Jun-feng, PENG Jing-jing, ZUO Xian-yu, GE Qiang, FAN Ming-hu. Image Encryption Algorithm Based on Cyclic Shift and Multiple Chaotic Maps [J]. Computer Science, 2020, 47(10): 327-331.
[8] WANG Li-juan, LI Guo-dong, LV Dong-mei. Chaotic System Image Encryption Algorithm Based on Dynamic Parameter Control [J]. Computer Science, 2019, 46(11A): 469-472.
[9] HAN Xue-juan, LI Guo-dong, WANG Si-xiu. Cryptographic Algorithm Based on Combination of Logistic and Hyperchaos [J]. Computer Science, 2019, 46(11A): 477-482.
[10] ZHAO Fang-zheng, LI Cheng-hai, LIU Chen, SONG Ya-fei. Security Analysis and Optimization of Hyper-chaotic Color Image Encryption Algorithm [J]. Computer Science, 2019, 46(11A): 483-487.
[11] ZHU Shu-qin, WANG Wen-hong and LI Jun-qing. Chosen Plaintext Attack on Chaotic Image Encryption Algorithm Based on Perceptron Model [J]. Computer Science, 2018, 45(4): 178-181.
[12] ZANG Rui, YU Yang. Composite Image Encryption Algorithm Based on Involutory Matrix [J]. Computer Science, 2018, 45(11A): 389-392.
[13] WANG Le-le, LI Guo-dong. Double Chaotic Image Encryption Algorithm Based on Fractional Transform [J]. Computer Science, 2018, 45(11A): 393-397.
[14] ZHU Shu-qin and LI Jun-qing. Image Encryption Scheme Based on Chaos with Parameter Perturbation [J]. Computer Science, 2017, 44(Z6): 356-360.
[15] LIU Chun-yang, WU Ze-min, HU Lei and LIU Xi. Pedestrian Detection Based on DCT of Multi-channel Feature [J]. Computer Science, 2017, 44(Z11): 221-224.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!