计算机科学 ›› 2013, Vol. 40 ›› Issue (9): 133-135.

• 信息安全 • 上一篇    下一篇

基于忆阻细胞自动机的图像像素值置换加密技术

王晓东,王丽丹,段书凯   

  1. 西南大学电子信息工程学院 重庆400715;西南大学电子信息工程学院 重庆400715;西南大学电子信息工程学院 重庆400715
  • 出版日期:2018-11-16 发布日期:2018-11-16
  • 基金资助:
    本文受国家自然科学基金(60972155,3),教育部“春晖计划”科研项目(z2011148),中央高校基本科研业务费专项资金(XDJK2012A007,XDJK2010C02),重庆市高等学校青年骨干教师资助

Pixel Value Replacement Method to Encryption Image Based on Memrisitive Cellular Automata

WANG Xiao-dong,WANG Li-dan and DUAN Shu-kai   

  • Online:2018-11-16 Published:2018-11-16

摘要: 忆阻细胞自动机是一种全新的细胞自动机,它的响应会引起细胞状态和细胞间链接状态的变化。在分析了忆阻细胞自动机中的细胞间链接状态丰富变化的基础上,设计了一种全新的图像加密算法:以一个W×H的忆阻自动机阵列为公钥,以细胞的初始状态和细胞迭代次数为私钥,将细胞与相邻细胞间的一组链接状态加权后设置成加密矩阵,同时采用像素置换方法对数字图像进行加密。这种加密算法具有较好的混乱特性、扩散特性和良好的保密性、抗蛮力破解特性,能够满足数字图像加密的安全性要求。

关键词: 忆阻细胞自动机,图像加密,像素替换 中图法分类号TP391.41文献标识码A

Abstract: Memrisitive cellular automata is a kind of new cellular automata,and its operation can produce transformation of cells state and make its links changed.We analyzed the varied change of cellular automata and the links between the cells,then we designed a new encryption algorithm:use a W×H cells automata arrays as Public-Key,the initial states and respond time as Private-Key,get the links between the cells as a encryption matrix.Meanwhile,we used the pixel value replacement method to encrypt a image.This algorithm has the advantage of confusion and diffusion properties,besides,it owes its advantage in fine security,large key space and diffusion.The algorithm analyzes turn out that this method is of high encryption efficiency and security,which could just meet the digital image demands on security.

Key words: Memristive cellular automata,Image encryption,Pixel value replacement

[1] Adamatzky A.Controllable transmission of information in excita-ble medium:the 2+medium[J].Advanced Materials for Optics and Electronics,1995,5:145-155
[2] Alonso-Sanz R.A structurally dynamic cellular automaton with memory[J].Chaos,Solitons and Fractals,2006,32:1285-1295
[3] Adamatzky A,Holland O.Phenomenology of excitation in 2D cellular automata and swarm systems[J].Chaos,Solitons & Fractals,1998,3:1233-1265
[4] Adamatzky A,Andrew W,Benjamin D L C.Glider-based computing in reaction-diffusion hexagonal cellular automata[J].Chaos,Solitons & Fractals,2006,27(2):287-295
[5] Wolfram S.Cryptography with cellular automat[J].Advances in Cryptology,1985,218:429-432
[6] Kuang T L.Information hiding based on binary encoding metho-ds and pixel scrambling techniques[J].Applied Optics,2010,49(2):271-277
[7] Seredynski F,Bouvry P,Zomaya A Y.Cellular automata computations and secret key cryptography[J].Parallel Computing,2004,30(5):753-766
[8] Itoh M,Chua L O.Advanced image processing cellular neuralnetworks[J].International Journal of Bifurcation and Chaos,2007,17:1109-1150
[9] Itoh M,Chua L O.Memristor Cellular Automata and Memristor Discrete-Time Cellular Neural Networks[J].International Journal of Bifurcation and Chaos,2009,19(11):3605-3656
[10] Adamatzky A,Chua L O.Memristive excitable cellular automata[J].International Journal of Bifurcation and Chaos,2011,21(11):3083-3102
[11] 臧鸿雁,闵乐泉,吴春雪,等.基于离散混沌系统广义同步定力的数字图像加密方案[J].北京科技大学学报,2007,29(1):96-101
[12] 朱从旭,陈志刚,欧阳文卫.一种基于广义Chen’s混沌系统的图像加密新算法[J].中南大学学报:自然科学版,2006,7(6):1142-1148
[13] Islam N,Puech W.Decryption of noisy encrypted images by statistical analysis[C]∥20113rd European Workshop on Visual Information Processing(EUVIP).Paris,2011,2-198

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!