基于混沌系统的图像加密算法研究
[Abstract]:With the rapid development of computer and network technology, the problem of network security has attracted more and more attention. The digital image, because of its image, visual and vivid features, makes it an important expression in the transmission of network information. However, the traditional encryption algorithm, such as AES, is no longer suitable for image encryption because the digital image has the characteristics of large data volume, high redundancy, strong correlation among pixels, and the like. On the other hand, the hybrid system makes it particularly suitable for image encryption because of its sensitivity to the initial conditions and control parameters, the density of the periodic points, and the topological transitivity. In recent years, a large number of hybrid-based image encryption algorithms have been proposed. Most of the traditional encryption techniques are based on one-dimensional mixed encryption. Because these encryption techniques have the disadvantages of small key space, low security, and so on, these encryption algorithms are very defective. In this paper, the fractional-order Chen system and the high-dimensional hybrid system are applied to the image encryption algorithm, and the security and the complexity of the algorithm are improved. The main work and innovation of this paper are: 1. First of all, the present situation and significance of the research on the encryption of the mixed image are analyzed, and the basic knowledge of the theory of mixing and the basic knowledge of cryptography are introduced in detail, and the relation between them is cut. In this paper, the general procedure and the evaluation index of the hybrid image encryption algorithm are introduced. The image encryption based on the fractional-order Chen system is presented in this paper. The method comprises the following steps of: firstly, generating a required scrambling sequence by using a fractional-order Chen system; then, performing selection of a row-and-column scrambling sequence by the judgment of the plaintext information, so as to ensure the correlation with the plaintext; and performing a packet-exclusive-OR algorithm on the scrambled image to carry out the pixel value thereof. preprocessing, carrying out two-wheel pixel encryption on the pre-processed image at the same time, and increasing the complexity of the algorithm and and finally, comparing with an integer-order Chen system algorithm, the algorithm has the advantages of low cipher text degree, larger key space and higher security. 3. Based on the properties of the super-hybrid system, a complete scrambling scheme is proposed. The method comprises the following steps of: firstly, generating the required mixed sequence by using a super-hybrid system, and further realizing the scrambling of the position of the pixel points; and generating an encryption sequence as a key of the logistic mapping by using the generated scrambling sequence as a key of the logistic mapping, and increasing the two processes. and the sum of the gray values of all the pixel points after the single point pixel point and the previous encryption are used to encrypt the pixel value, and the correlation between the pixel value and the clear cipher text is ensured, so that the known/ selected plaintext can be effectively resisted. The theoretical analysis and the experiment show that the algorithm has the advantages of low cipher text correlation, larger key space and security. in ord to improve that security of the algorithm, a block-based method is proposed to improve the security of the algorithm. The method comprises the following steps of: firstly, generating four groups of mixed color sequences by using a high-dimensional hybrid system, and simultaneously dividing the images into four equal-size four, and determining the selection of the scrambling sequence through the plaintext information of each block, and then the generated scrambling sequence is combined with the plaintext information, the previous encrypted ciphertext information and the upper block cipher text information corresponding to the plaintext information to generate the ciphertext image, the coupling degree between the two processes is increased, The correlation between the blocks so that it can be effectively protected against known/ selected The theoretical analysis and the experiment show that the algorithm has the advantages of low cipher text correlation, larger key space, In the end, the paper summarizes the work of the paper, and points out the addition of the mixed image.
【学位授予单位】:扬州大学
【学位级别】:硕士
【学位授予年份】:2014
【分类号】:TP309.7
【共引文献】
相关会议论文 前5条
1 柳晓东;张瑞成;陈至坤;;轧机APC系统中出现的混沌现象及特性分析研究[A];中国计量协会冶金分会2009年年会论文集[C];2009年
2 叶瑞松;程东升;;一种基于混合混沌系统的图像加密算法[A];全国第19届计算机技术与应用(CACIS)学术会议论文集(上册)[C];2008年
3 武国正;李畅游;张生;贾克力;姜忠峰;杨志岩;;基于分形理论的草型湖泊富营养化等级分区评价研究[A];第二届全国农业环境科学学术研讨会论文集[C];2007年
4 安韶君;;一种新的采用Floyd-Steinberg误差扩散法的灰度图象秘密共享方法[A];第十二届全国图象图形学学术会议论文集[C];2005年
5 刘云;郑永爱;莫丽丽;;基于超混沌系统的图像加密方案[A];2009年中国智能自动化会议论文集(第六分册)[中南大学学报(增刊)][C];2009年
相关博士学位论文 前10条
1 罗启彬;基于混沌理论的遥测信息安全技术研究[D];中国工程物理研究院;2009年
2 孙明;基于小波和迟滞的混沌神经网络及其应用[D];哈尔滨工程大学;2010年
3 李建平;面向异构数据源的网络安全态势感知模型与方法研究[D];哈尔滨工程大学;2010年
4 潘林;一类混沌系统的同步与控制方法研究[D];东华大学;2010年
5 唐漾;复杂网络动力学及其应用的若干问题研究[D];东华大学;2010年
6 赵斌;生物数学的起源与形成[D];西北大学;2011年
7 张丽娟;离散动力系统的混沌判定和扰动[D];山东大学;2011年
8 王洪武;多相复合膏体充填料配比与输送参数优化[D];中南大学;2010年
9 董科强;分形理论和时间序列分析若干问题研究[D];北京交通大学;2011年
10 郭现峰;基于混沌动态S盒的密码算法及其应用研究[D];西南交通大学;2011年
相关硕士学位论文 前10条
1 王晓艳;非线性混沌电路的分析与设计[D];哈尔滨工程大学;2010年
2 赵洪超;多维混沌加密通信系统的研究[D];哈尔滨理工大学;2010年
3 邹奇峰;图像仿射模变换均匀置乱方法研究[D];哈尔滨理工大学;2010年
4 甘斌;基于奇异值分解的DWT数字水印算法研究与优化[D];南昌大学;2010年
5 段志梅;基于混沌理论的话务量时间序列预测研究[D];昆明理工大学;2008年
6 杨夷梅;基于混沌序列和RSA算法的图像加密技术的研究[D];中南林业科技大学;2007年
7 常悦;混沌分形图在日用品设计中的应用研究[D];沈阳建筑大学;2011年
8 郭兰英;建设项目全生命环保投资混沌估算方法研究[D];石家庄铁道学院;2010年
9 孙立莹;基于Duffing-Holmes混沌系统的弱信号检测方法及应用[D];东北电力大学;2011年
10 郝舒欣;基于混沌公钥密码的身份认证研究[D];西安电子科技大学;2011年
,本文编号:2404028
本文链接:https://www.wllwen.com/shoufeilunwen/xixikjs/2404028.html