计算机科学 ›› 2016, Vol. 43 ›› Issue (Z11): 411-416.doi: 10.11896/j.issn.1002-137X.2016.11A.094
朱淑芹,李俊青,葛广英
ZHU Shu-qin, LI Jun-qing and GE Guang-ying
摘要: 结合Logistic映射和三维离散Lorenz映射,构造了一个新的五维离散混沌映射。基于该映射,提出了一个只有两轮扩散操作的图像加密算法,在第一轮扩散操作中的密钥流与明文相关,在第二轮扩散操作中的密钥流与第一轮的密文相关,这导致算法中的最终加密密钥与明文相关且密文与明文、密钥之间的关系复杂化。实验结果和安全性分析表明,该算法具有密钥空间大、密文图像统计特性良好、密文对明文和密钥非常敏感、抵抗选择明(密)文的攻击、加密速度快的优点。所提算法在图像保密通信和存储应用中将具有良好的应用前景。
[1] Liu W B,Chen G R.A three-dimensional smooth autonomous quadratic Chaotic system generate a single four-scroll attractor[J].Int.J.Bifurc.Chaos,2004,14:1395-1403 [2] Li C B,Sprott J C.Multistability in a butterfly flow[J].Int.J.Bifurc.Chaos,2013,23:1350199-1350209 [3] 官国荣,吴成茂,贾倩.一种改进高性能Lorenz 混沌系统构造及其应用[J].物理学报,2015,64(2):31-44 [4] 朱淑芹,杨淼,张先华,等.利用Silnikov定理构造混沌系统[J].北京科技大学学报,2005,27(5):635-637 [5] Chen G,Ueta T.Yet another chaotic attractor[J].Int J Bifurcation Chaos,1999,9(7):1465-1466 [6] Lu J,Chen G.A new chaotic attractor coined[J].Int J Bifurcation Chaos,2002,12(3):659-661 [7] Cˇelikovsky′ S,Chen G.On a generalized Lorenz canonical form of chaotic systems[J].Int J Bifurcation Chaos,2002,12(8):1789-1812 [8] Lu J,Chen G,Cheng D,et al.Bridge the gap between the Lorenz system and the Chen system[J].Int J Bifurcation Chaos,2002,12(12):2917-2926 [9] Gao T,Chen Z,Yuan Z,et al.A hyperchaos generated fromChen’s system[J].Int J Mod Phys C,2006,7(4):471-478 [10] Li Y,Tang W K S,Chen G.Hyperchaos evolved from the generalized Lorenz equation[J].Int J Circ Theory,2005,33(4):235-251 [11] Chen A,Lu J,Lu J,et al.Generating hyperchaotic Lu attractor via state feedback control[J].Physica A,2006,364:103-110 [12] Wang G,Zhang X,Zhen Y,et al.A new modified hyperchaotic Lu system[J].Physica A,2006,371(2):260-272 [13] Li Y,Chen G,Tang WKS.Controlling a unified chaotic system to hyperchaotic[J].IEEE Trans Circuits Syst II,2005,52(4):204-207 [14] 韩双霜,闵乐泉,韩丹丹.一种新的混沌图像加密算法设计[J].河南科技大学学报(自然科学版),2014,5(5):37-41 [15] 韩双霜,闵乐泉,韩丹丹.一种基于三维离散混沌映射的伪随机数生器[J].华中科技大学学报(自然科学版),2013,41(8):16-19 [16] DraganLambi′c.A new discrete chaotic map based on the composition of permutations[J].Chaos,Solitons and Fractals,2015,8:245-248 [17] Wang Yong,Wong K W,Liao Xiao-feng,et al.A new chaos-based fast image encryption algorithm[J].Applied Soft Computing,2011,11(11):514-522 [18] Ye Rui-song.A novel chaos-based image encryption scheme with an efficient permutation-diffusion mechanism[J].Optics Communications,2011,4:5290-5298 [19] Zhang Guo-ji,Liu Qing.A novel image encryption method based on total shuffling scheme[J].Optics Communications,2011,4:2775-2780 [20] Rudin L,Osher S,Fatemi E.Nonlinear total variation based on noise removal algorithms[J].Physica D,1992,60:259-268 [21] Sprott J C.Chaos and time-series analysis[M].Oxford:Oxford University Press,2003:513 [22] 王静,蒋国平.一种超混沌图像加密算法的安全性分析及其改进[J].物理学报,2011,0(6):83-93 [23] Behnia S,Akhshani A,Mahmodi H,et al.A Novel Algorithm for Image Encryption Based on Mixture of Chaotic Maps[J].Chaos,Solitons & Fractals,2008,5(2):408-419 [24] Rodriguez J.Computational Cryptography based on trigonome-tric algorithms and intensity superposition[J].The Imaging Science Journal,2010,58(1):61-80 [25] 卢辉斌,孙艳.基于新的超混沌系统的图像加密方案[J].计算机科学,2011,38(6):49-52 |
No related articles found! |
|