计算机科学 ›› 2014, Vol. 41 ›› Issue (9): 158-164.doi: 10.11896/j.issn.1002-137X.2014.09.030
蔡俊,陈昕,向旭东
CAI Jun,CHEN Xin and XIANG Xu-dong
摘要: 近年来,随着多媒体技术的发展,互联网上数字图像相关内容和应用的比例越来越高,其安全性也日益受到人们的关注。图像的安全性,一般通过加密方法来保证。图像加密算法中,基于置乱-扩散结构的加密算法因其充分考虑图像数据二维分布的特点,特别适合图像数据的加密。然而,该加密算法存在安全性不高、扩散效率低,以及密钥扩展计算复杂度高等问题。通过引入分组密码学中的代换-置换(SP,Substitution-Permutation)结构,提出了一种基于混沌的SP结构图像加密算法SPCME,该算法采取3种策略:(1)通过混沌映射进行置换和扩散,采用AES算法的S盒进行字节代换,以增强算法安全性;(2)使用双向的置乱-扩散策略,加快扩散速度;(3)运用简单的异或和移位操作,提高密钥扩展效率。为评价该算法的性能,文中做了密钥空间分析、密钥敏感性分析、统计直方图分析、相邻像素相关性分析、信息熵分析、差分攻击分析等大量的性能分析实验。实验结果表明,该算法仅通过3轮迭代就可达到与以前提出的图像加密算法相同的安全级别,加密效率明显提高。
[1] Alvarez G,Li S.Some basic cryptographic requirements for chaosbased cryptosystems[J].International Journal of Bifurcation and Chaos,2006,16(08):2129-2151 [2] 黄伟琦,陈志刚,梁涤青,等.基于多混沌系统的医学图像加密算法[J].计算机科学,2012,39(12):261-263,299 [3] Li Shu-jun,Mou Xuan-qin,Cai Yuan-long.Pseudo-random bitgenerator based on couple chaotic systems and its applications in stream-cipher cryptography[M]∥Progress in Cryptology-INDOCRYPT 2001.Springer Berlin Heidelberg,2001:316-329 [4] Liu Nian-sheng.Pseudo-randomness and complexity of binarysequences generated by the chaotic system[J].Communications in Nonlinear Science and Numerical Simulation,2011,16(2):761-768 [5] Chee C Y,Xu D.Chaotic encryption using discrete-time synchro-nous chaos[J].Physics Letters A,2006,348(3):284-292 [6] Kocarev L,Jakimoski G.Logistic map as a block encryption algorithm [J].Physics Letters A,2001,289(4):199-206 [7] Fridrich J.Symmetric ciphers based on two-dimensional chaotic maps[J].International Journal of Bifurcation and Chaos,1998,8(6):1259-1284 [8] Chen Guan-rong,Mao Yao-bin,Chui C K.A symmetric image encryption scheme based on 3D chaotic cat maps[J].Chaos,Solitons & Fractals,2004,21(3):749-761 [9] Zhu Zhi-liang,Zhang Wei,Wong K,et al.A chaos-based symmetric image encryption scheme using a bit-level permutation[J].Information Sciences,2011,181(6):1171-1186 [10] Tong Xiao-jun,Cui Ming-gen.Image encryption scheme basedon 3D baker with dynamical compound chaotic sequence cipher generator[J].Signal Processing,2009,89(4):480-491 [11] Tong Xiao-jun.Design of an image encryption scheme based on a multiple chaotic map[J].Communications in Nonlinear Science and Numerical Simulation,2012,18(7):1725-1733 [12] Rhouma R,Meherzi S,Belghith S.OCML-based colour imageencryption[J].Chaos,Solitons & Fractals,2009,40(1):309-318 [13] Xu Shu-jiang,Chen Xiu-bo,Zhang Ru,et al.An improved chaoticcryptosystem based on circular bit shift and XOR operations[J].Physics Letters A,2012,376(10):1003-1010 [14] Mazloom S,Eftekhari-Moghadam A M.Color image encrypttion based on coupled nonlinear chaotic map[J].Chaos,Solitons & Fractals,2009,42(3):1745-1754 [15] Wang Yong,Wong K,Liao Xiao-feng,et al.A chaos-based image encryption algorithm with variable control parameters[J].Chaos,Solitons & Fractals,2009,41(4):1773-1783 [16] Zhang Wei,Wong K,Yu Hai,et al.An image encryption scheme using reverse 2-dimensional chaotic map and dependent diffusion[J].Communications in Nonlinear Science and Numerical Simulation,2013,18(8):2066-2080 [17] Fu Chong,Chen Jun-jie,Zou Hao,et al.A chaos-based digitalimage encryption scheme with an improved diffusion strategy[J].Optics Express,2012,20(3):2363-2378 [18] Shannon C E.Communication theory of secrecy systems [J].Bell system technical journal,1949,28(4):656-715 [19] Wang Yong,Wong K,Liao Xiao-feng,et al.A new chaos-based fast image encryption algorithm[J].Applied soft computing,2011,11(1):514-522 [20] Schneier B.Applied cryptography:protocols,algorithms,andsource code in C[M].John Wiley & Sons,2007 [21] 郭建胜,张锋.一种图像加密算法的等效密钥攻击方案[J].电子学报,2010,38(4):781-785 [22] Solak E,C,okal C,Yildiz O T,et al.Cryptanalysis of Fridrich’s chaotic image encryption[J].International Journal of Bifurcation and Chaos,2010,20(05):1405-1413 [23] Lian S,Sun J,Wang Z.A block cipher based on a suitable use of the chaotic standard map[J].Chaos,Solitons & Fractals,2005,26(1):117-129 |
No related articles found! |
|