计算机应用
計算機應用
계산궤응용
COMPUTER APPLICATION
2009年
11期
2993-2997
,共5页
Logistic映射%混沌互扰系统%二值序列%伪随机序列
Logistic映射%混沌互擾繫統%二值序列%偽隨機序列
Logistic영사%혼돈호우계통%이치서렬%위수궤서렬
Logistic mapping%chaotic inter-perturbed system%binary sequence%pseudo random sequence
针对低维混沌系统有可能退化为周期问题,以及高维混沌系统计算量大的缺陷,提出基于双混沌互扰系统的图像加密算法.通过两个简单的Logistic映射间的互扰,构造一个双混沌互扰系统.双混沌互扰系统的最大特点是扰动项同时包括常数扰动项和随机扰动项,不仅保证了系统必要的复杂性,而且增大了系统参数的取值范围.以双混沌互扰系统作为序列密钥发生器,提出一种改进的二值序列量化方法.对二值序列做随机性检验和相关性分析的结果表明,该二值序列具有良好的伪随机性和相关性,适合作为加密密钥.将其应用于图像加密的仿真实验结果也表明,该二值序列能有效且安全地掩盖明文信息,取得了较好的加密效果.
針對低維混沌繫統有可能退化為週期問題,以及高維混沌繫統計算量大的缺陷,提齣基于雙混沌互擾繫統的圖像加密算法.通過兩箇簡單的Logistic映射間的互擾,構造一箇雙混沌互擾繫統.雙混沌互擾繫統的最大特點是擾動項同時包括常數擾動項和隨機擾動項,不僅保證瞭繫統必要的複雜性,而且增大瞭繫統參數的取值範圍.以雙混沌互擾繫統作為序列密鑰髮生器,提齣一種改進的二值序列量化方法.對二值序列做隨機性檢驗和相關性分析的結果錶明,該二值序列具有良好的偽隨機性和相關性,適閤作為加密密鑰.將其應用于圖像加密的倣真實驗結果也錶明,該二值序列能有效且安全地掩蓋明文信息,取得瞭較好的加密效果.
침대저유혼돈계통유가능퇴화위주기문제,이급고유혼돈계통계산량대적결함,제출기우쌍혼돈호우계통적도상가밀산법.통과량개간단적Logistic영사간적호우,구조일개쌍혼돈호우계통.쌍혼돈호우계통적최대특점시우동항동시포괄상수우동항화수궤우동항,불부보증료계통필요적복잡성,이차증대료계통삼수적취치범위.이쌍혼돈호우계통작위서렬밀약발생기,제출일충개진적이치서렬양화방법.대이치서렬주수궤성검험화상관성분석적결과표명,해이치서렬구유량호적위수궤성화상관성,괄합작위가밀밀약.장기응용우도상가밀적방진실험결과야표명,해이치서렬능유효차안전지엄개명문신식,취득료교호적가밀효과.
An image encryption algorithm based on inter-perturbations of dual chaotic systems was proposed for the possible degradation of low-dimensional chaotic system and the high computing work of high-dimensional chaotic system. Dual chaotic system was constructed through inter-perturbations of two simple Logistic mappings. And the most prominent feature of inter-perturbations between chaotic systems was that perturbation included constant perturbation and random perturbation simultaneously, which not only ensured the necessary system complexity, but also increased the range of system parameters. Taking dual chaotic inter-perturbed system as sequence key generator, an improved quantization method for converting chaotic sequence to binary sequence was put forward. Random testing and correlation analysis were done on binary sequence. The results show that the binary sequence has good pseudo-randomness and correlation, and appropriate to be encryption key. Simulation results of image encryption applied with the binary sequence also show that the binary sequence can cover up plaintext effectively and safely, and good encryption results are achieved.