电子与信息学报
電子與信息學報
전자여신식학보
JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY
2014年
6期
1271-1277
,共7页
刘泉%李佩玥%章明朝%隋永新%杨怀江
劉泉%李珮玥%章明朝%隋永新%楊懷江
류천%리패모%장명조%수영신%양부강
图像加密%混沌%Markov分割%时空混沌
圖像加密%混沌%Markov分割%時空混沌
도상가밀%혼돈%Markov분할%시공혼돈
Image encryption%Chaos%Markov portion%Spatiotemporal chaos
为了设计复杂度高、安全性好而计算代价小的图像密码算法,该文从一类新的具有Markov分割性质的混沌系统出发构造了此算法。首先,通过控制此混沌系统的参数并配合时空混沌系统设计了一个密钥流发生器;然后,利用真随机数发生器产生的随机数来扰动系统的初始密钥,以动态生成图像的置换矩阵和加密密钥流;最后,通过利用不同群中的加法混合运算构造扩散函数以增加破译复杂度,以两轮迭代完成了图像加密过程。实验结果表明,此混沌系统产生的密钥流序列有比较好的统计特征,该算法可以破坏原始图像的特征,使得密文图像难以辨识。进一步分析可知,该算法可以很好地抵抗差分分析等其它已知攻击,效率高于一些基于超混沌系统设计的密码算法。此外,此算法计算简单,安全性高,易于实现,具有良好的应用前景。
為瞭設計複雜度高、安全性好而計算代價小的圖像密碼算法,該文從一類新的具有Markov分割性質的混沌繫統齣髮構造瞭此算法。首先,通過控製此混沌繫統的參數併配閤時空混沌繫統設計瞭一箇密鑰流髮生器;然後,利用真隨機數髮生器產生的隨機數來擾動繫統的初始密鑰,以動態生成圖像的置換矩陣和加密密鑰流;最後,通過利用不同群中的加法混閤運算構造擴散函數以增加破譯複雜度,以兩輪迭代完成瞭圖像加密過程。實驗結果錶明,此混沌繫統產生的密鑰流序列有比較好的統計特徵,該算法可以破壞原始圖像的特徵,使得密文圖像難以辨識。進一步分析可知,該算法可以很好地牴抗差分分析等其它已知攻擊,效率高于一些基于超混沌繫統設計的密碼算法。此外,此算法計算簡單,安全性高,易于實現,具有良好的應用前景。
위료설계복잡도고、안전성호이계산대개소적도상밀마산법,해문종일류신적구유Markov분할성질적혼돈계통출발구조료차산법。수선,통과공제차혼돈계통적삼수병배합시공혼돈계통설계료일개밀약류발생기;연후,이용진수궤수발생기산생적수궤수래우동계통적초시밀약,이동태생성도상적치환구진화가밀밀약류;최후,통과이용불동군중적가법혼합운산구조확산함수이증가파역복잡도,이량륜질대완성료도상가밀과정。실험결과표명,차혼돈계통산생적밀약류서렬유비교호적통계특정,해산법가이파배원시도상적특정,사득밀문도상난이변식。진일보분석가지,해산법가이흔호지저항차분분석등기타이지공격,효솔고우일사기우초혼돈계통설계적밀마산법。차외,차산법계산간단,안전성고,역우실현,구유량호적응용전경。
In order to construct a high complexity, secure and low cost image encryption algorithm, a class of chaos with Markov properties is studied and used to build the encryption algorithm. First, the key stream generator is designed by the Markov Chaos with changeable parameters and the improved spatiotemporal chaos. Then, a true uniform random number generator is used to disturb the original key of the algorithm, which can dynamically change the mixed matrix and the key stream. Finally, the diffusion function is built by two iterations of the round function which is composed of different kinds of additions in different groups to increase the complexity of decipher. The experiments indicate that the key stream possesses good statistical properties, and the characteristic of the original image is broken which makes the cipher image undistinguishable. The further analysis indicates that the proposed algorithm can resist some known attacks like differential attacks, and the proposed algorithm is more efficient than the existed algorithms based on super chaos. Additionally, the proposed algorithm is easy to realize and can satisfy the security and efficiency requirements, which indicates promising applications.