基于混沌系統(tǒng)的圖像加密算法研究
[Abstract]:With the rapid development of computer and network technology, the problem of network security has attracted more and more attention. The digital image, because of its image, visual and vivid features, makes it an important expression in the transmission of network information. However, the traditional encryption algorithm, such as AES, is no longer suitable for image encryption because the digital image has the characteristics of large data volume, high redundancy, strong correlation among pixels, and the like. On the other hand, the hybrid system makes it particularly suitable for image encryption because of its sensitivity to the initial conditions and control parameters, the density of the periodic points, and the topological transitivity. In recent years, a large number of hybrid-based image encryption algorithms have been proposed. Most of the traditional encryption techniques are based on one-dimensional mixed encryption. Because these encryption techniques have the disadvantages of small key space, low security, and so on, these encryption algorithms are very defective. In this paper, the fractional-order Chen system and the high-dimensional hybrid system are applied to the image encryption algorithm, and the security and the complexity of the algorithm are improved. The main work and innovation of this paper are: 1. First of all, the present situation and significance of the research on the encryption of the mixed image are analyzed, and the basic knowledge of the theory of mixing and the basic knowledge of cryptography are introduced in detail, and the relation between them is cut. In this paper, the general procedure and the evaluation index of the hybrid image encryption algorithm are introduced. The image encryption based on the fractional-order Chen system is presented in this paper. The method comprises the following steps of: firstly, generating a required scrambling sequence by using a fractional-order Chen system; then, performing selection of a row-and-column scrambling sequence by the judgment of the plaintext information, so as to ensure the correlation with the plaintext; and performing a packet-exclusive-OR algorithm on the scrambled image to carry out the pixel value thereof. preprocessing, carrying out two-wheel pixel encryption on the pre-processed image at the same time, and increasing the complexity of the algorithm and and finally, comparing with an integer-order Chen system algorithm, the algorithm has the advantages of low cipher text degree, larger key space and higher security. 3. Based on the properties of the super-hybrid system, a complete scrambling scheme is proposed. The method comprises the following steps of: firstly, generating the required mixed sequence by using a super-hybrid system, and further realizing the scrambling of the position of the pixel points; and generating an encryption sequence as a key of the logistic mapping by using the generated scrambling sequence as a key of the logistic mapping, and increasing the two processes. and the sum of the gray values of all the pixel points after the single point pixel point and the previous encryption are used to encrypt the pixel value, and the correlation between the pixel value and the clear cipher text is ensured, so that the known/ selected plaintext can be effectively resisted. The theoretical analysis and the experiment show that the algorithm has the advantages of low cipher text correlation, larger key space and security. in ord to improve that security of the algorithm, a block-based method is proposed to improve the security of the algorithm. The method comprises the following steps of: firstly, generating four groups of mixed color sequences by using a high-dimensional hybrid system, and simultaneously dividing the images into four equal-size four, and determining the selection of the scrambling sequence through the plaintext information of each block, and then the generated scrambling sequence is combined with the plaintext information, the previous encrypted ciphertext information and the upper block cipher text information corresponding to the plaintext information to generate the ciphertext image, the coupling degree between the two processes is increased, The correlation between the blocks so that it can be effectively protected against known/ selected The theoretical analysis and the experiment show that the algorithm has the advantages of low cipher text correlation, larger key space, In the end, the paper summarizes the work of the paper, and points out the addition of the mixed image.
【學(xué)位授予單位】:揚州大學(xué)
【學(xué)位級別】:碩士
【學(xué)位授予年份】:2014
【分類號】:TP309.7
【共引文獻】
相關(guān)會議論文 前5條
1 柳曉東;張瑞成;陳至坤;;軋機APC系統(tǒng)中出現(xiàn)的混沌現(xiàn)象及特性分析研究[A];中國計量協(xié)會冶金分會2009年年會論文集[C];2009年
2 葉瑞松;程東升;;一種基于混合混沌系統(tǒng)的圖像加密算法[A];全國第19屆計算機技術(shù)與應(yīng)用(CACIS)學(xué)術(shù)會議論文集(上冊)[C];2008年
3 武國正;李暢游;張生;賈克力;姜忠峰;楊志巖;;基于分形理論的草型湖泊富營養(yǎng)化等級分區(qū)評價研究[A];第二屆全國農(nóng)業(yè)環(huán)境科學(xué)學(xué)術(shù)研討會論文集[C];2007年
4 安韶君;;一種新的采用Floyd-Steinberg誤差擴散法的灰度圖象秘密共享方法[A];第十二屆全國圖象圖形學(xué)學(xué)術(shù)會議論文集[C];2005年
5 劉云;鄭永愛;莫麗麗;;基于超混沌系統(tǒng)的圖像加密方案[A];2009年中國智能自動化會議論文集(第六分冊)[中南大學(xué)學(xué)報(增刊)][C];2009年
相關(guān)博士學(xué)位論文 前10條
1 羅啟彬;基于混沌理論的遙測信息安全技術(shù)研究[D];中國工程物理研究院;2009年
2 孫明;基于小波和遲滯的混沌神經(jīng)網(wǎng)絡(luò)及其應(yīng)用[D];哈爾濱工程大學(xué);2010年
3 李建平;面向異構(gòu)數(shù)據(jù)源的網(wǎng)絡(luò)安全態(tài)勢感知模型與方法研究[D];哈爾濱工程大學(xué);2010年
4 潘林;一類混沌系統(tǒng)的同步與控制方法研究[D];東華大學(xué);2010年
5 唐漾;復(fù)雜網(wǎng)絡(luò)動力學(xué)及其應(yīng)用的若干問題研究[D];東華大學(xué);2010年
6 趙斌;生物數(shù)學(xué)的起源與形成[D];西北大學(xué);2011年
7 張麗娟;離散動力系統(tǒng)的混沌判定和擾動[D];山東大學(xué);2011年
8 王洪武;多相復(fù)合膏體充填料配比與輸送參數(shù)優(yōu)化[D];中南大學(xué);2010年
9 董科強;分形理論和時間序列分析若干問題研究[D];北京交通大學(xué);2011年
10 郭現(xiàn)峰;基于混沌動態(tài)S盒的密碼算法及其應(yīng)用研究[D];西南交通大學(xué);2011年
相關(guān)碩士學(xué)位論文 前10條
1 王曉艷;非線性混沌電路的分析與設(shè)計[D];哈爾濱工程大學(xué);2010年
2 趙洪超;多維混沌加密通信系統(tǒng)的研究[D];哈爾濱理工大學(xué);2010年
3 鄒奇峰;圖像仿射模變換均勻置亂方法研究[D];哈爾濱理工大學(xué);2010年
4 甘斌;基于奇異值分解的DWT數(shù)字水印算法研究與優(yōu)化[D];南昌大學(xué);2010年
5 段志梅;基于混沌理論的話務(wù)量時間序列預(yù)測研究[D];昆明理工大學(xué);2008年
6 楊夷梅;基于混沌序列和RSA算法的圖像加密技術(shù)的研究[D];中南林業(yè)科技大學(xué);2007年
7 常悅;混沌分形圖在日用品設(shè)計中的應(yīng)用研究[D];沈陽建筑大學(xué);2011年
8 郭蘭英;建設(shè)項目全生命環(huán)保投資混沌估算方法研究[D];石家莊鐵道學(xué)院;2010年
9 孫立瑩;基于Duffing-Holmes混沌系統(tǒng)的弱信號檢測方法及應(yīng)用[D];東北電力大學(xué);2011年
10 郝舒欣;基于混沌公鑰密碼的身份認證研究[D];西安電子科技大學(xué);2011年
,本文編號:2404028
本文鏈接:http://sikaile.net/shoufeilunwen/xixikjs/2404028.html