通信学报 ›› 2014, Vol. 35 ›› Issue (3): 216-223.doi: 10.3969/j.issn.1000-436x.2014.03.025

• 学术通信 • 上一篇    下一篇

像素位置与比特双重置乱的图像混沌加密算法

邓晓衡,廖春龙,朱从旭,陈志刚   

  1. 中南大学 信息科学与工程学院,湖南 长沙 410083
  • 出版日期:2014-03-25 发布日期:2017-08-17
  • 基金资助:
    国家自然科学基金资助项目;国家自然科学基金资助项目;国家自然科学基金资助项目;国家自然科学基金资助项目;湖南省自然科学基金资助项目

Image encryption algorithms based on chaos through dual scrambling of pixel position and bit

Xiao-heng DENG,Chun-long LIAO,Cong-xu ZHU,Zhi-gang CHEN   

  1. School of Information Science and Engineering,Central South University,Changsha 410083,China
  • Online:2014-03-25 Published:2017-08-17
  • Supported by:
    The National Natural Science Foundation of China;The National Natural Science Foundation of China;The National Natural Science Foundation of China;The National Natural Science Foundation of China;The Natural Science Foundation of Hunan Province

摘要:

针对当前流行的一类具有置乱—扩散结构的混沌图像加密算法存在的安全缺陷问题,提出了一种能抵抗选择明(密)文攻击的图像加密算法。算法采用Kent混沌映射生成密钥序列,并根据明文像素值的特征和输入的密钥,分别产生混沌系统的参数和预迭代次数。首先,利用混沌序列实现图像像素位置的全局置乱;其次,根据另一个新生成的混沌序列,实现对图像像素值中0 bit、1 bit的置乱。实现了混沌映射产生的序列与图像本身内容的往关联,从而实现了中间密钥随明文自适应变化,能有效抵抗选择明(密)文攻击。实验结果表明,该算法克服了以算法不能抵抗选择明(密)文攻击的缺陷,同时具有加密算法简单、密钥空间大等加密性能,并能较好地抵抗统计特性分析、差分分析攻击。

关键词: 图像加密, 混沌系统, 像素置乱, 比特置乱

Abstract:

As the current popular chaos-based image encryption algorithms with the permutation–diffusion structure have security flaws of no immunity to attack.A new image encryption algorithm was proposed based on the analysis of current algorithms,which can well resist the chosen-plaintext and the chosen-ciphertext attacks.The algorithm uses Kent chaotic map to generate key streams,and produces the parameters of the chaotic system and the iteration times according to the characteristics of plaintext pixels and input key.Firstly,the positions of pixels were shuffled totally with the chaotic sequence.Secondly,the 0 and 1 bit positions of image pixels were scrambled by using another chaotic sequence generated by the input key.The experimental results show that the algorithm cannot only resist the chosen plaintext attack and chosen ciphertext attack but also achieve better cryptographic properties,such as key space,statistical analysis.

Key words: image encryption, chaotic system, pixels scrambling, bit scrambling

No Suggested Reading articles found!