一种基于公共图像和混沌的快速图像加密方案

Yong Zhang, Qiong Zhang, Hancheng Liao, Wenhua Wu, Xueqian Li, Hui-Chong Niu
{"title":"一种基于公共图像和混沌的快速图像加密方案","authors":"Yong Zhang, Qiong Zhang, Hancheng Liao, Wenhua Wu, Xueqian Li, Hui-Chong Niu","doi":"10.1109/CIIS.2017.69","DOIUrl":null,"url":null,"abstract":"A novel image cryptosystem based on public image and chaotic systems is proposed in this paper. In proposed system, with the help of piecewise linear map and Chen's chaotic system, a public key is used to generate a public image, and a secret key is used to generate three key streams for image encryption. Then, the public image and one key stream are used for covering image. The other two key streams are used for image diffusion. The image encryption system includes two covering modules, two plaintext-unrelated diffusion modules and one plaintext-related confusion module. With the use of public image and plain image related confusion operation, the proposed system can resist the chosen/known plaintext attacks. Each encryption process uses a new public key, then the public key and cipher image are transmitted to the receiver through the public information channel. Even for the same plain image, each encryption process will produce totally different cipher images. When the public key is authenticated, the image cryptosystem can prevent active attacks. The simulation results show that the proposed scheme possesses the merits of fast encryption/decryption speed and high information security, and can be used to protect the image information on the internet.","PeriodicalId":254342,"journal":{"name":"2017 International Conference on Computing Intelligence and Information System (CIIS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"A Fast Image Encryption Scheme Based on Public Image and Chaos\",\"authors\":\"Yong Zhang, Qiong Zhang, Hancheng Liao, Wenhua Wu, Xueqian Li, Hui-Chong Niu\",\"doi\":\"10.1109/CIIS.2017.69\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A novel image cryptosystem based on public image and chaotic systems is proposed in this paper. In proposed system, with the help of piecewise linear map and Chen's chaotic system, a public key is used to generate a public image, and a secret key is used to generate three key streams for image encryption. Then, the public image and one key stream are used for covering image. The other two key streams are used for image diffusion. The image encryption system includes two covering modules, two plaintext-unrelated diffusion modules and one plaintext-related confusion module. With the use of public image and plain image related confusion operation, the proposed system can resist the chosen/known plaintext attacks. Each encryption process uses a new public key, then the public key and cipher image are transmitted to the receiver through the public information channel. Even for the same plain image, each encryption process will produce totally different cipher images. When the public key is authenticated, the image cryptosystem can prevent active attacks. The simulation results show that the proposed scheme possesses the merits of fast encryption/decryption speed and high information security, and can be used to protect the image information on the internet.\",\"PeriodicalId\":254342,\"journal\":{\"name\":\"2017 International Conference on Computing Intelligence and Information System (CIIS)\",\"volume\":\"5 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-04-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 International Conference on Computing Intelligence and Information System (CIIS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CIIS.2017.69\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 International Conference on Computing Intelligence and Information System (CIIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CIIS.2017.69","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

摘要

提出了一种基于公共图像和混沌系统的新型图像密码系统。在该系统中,利用分段线性映射和Chen混沌系统,使用公钥生成公共图像,使用密钥生成三个密钥流用于图像加密。然后,使用公共图像和一个密钥流对图像进行覆盖。另外两个关键流用于图像扩散。该图像加密系统包括两个覆盖模块、两个与明文无关的扩散模块和一个与明文相关的混淆模块。利用公共图像与明文图像相关的混淆运算,使系统能够抵御所选/已知明文攻击。每个加密过程使用一个新的公钥,然后将公钥和密码图像通过公开信息通道传输给接收方。即使对于相同的明文图像,每次加密过程也会产生完全不同的密码图像。通过公钥认证后,图像密码系统可以防止主动攻击。仿真结果表明,该方案具有加/解密速度快、信息安全性高的优点,可用于保护互联网上的图像信息。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
A Fast Image Encryption Scheme Based on Public Image and Chaos
A novel image cryptosystem based on public image and chaotic systems is proposed in this paper. In proposed system, with the help of piecewise linear map and Chen's chaotic system, a public key is used to generate a public image, and a secret key is used to generate three key streams for image encryption. Then, the public image and one key stream are used for covering image. The other two key streams are used for image diffusion. The image encryption system includes two covering modules, two plaintext-unrelated diffusion modules and one plaintext-related confusion module. With the use of public image and plain image related confusion operation, the proposed system can resist the chosen/known plaintext attacks. Each encryption process uses a new public key, then the public key and cipher image are transmitted to the receiver through the public information channel. Even for the same plain image, each encryption process will produce totally different cipher images. When the public key is authenticated, the image cryptosystem can prevent active attacks. The simulation results show that the proposed scheme possesses the merits of fast encryption/decryption speed and high information security, and can be used to protect the image information on the internet.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Network Traffic Anomaly Detection Based on Dynamic Programming Study on the Robustness Based on PID Fuzzy Controller The Best Performance Evaluation of Encryption Algorithms to Reduce Power Consumption in WSN Non-redundant Distributed Database Allocation Technology Research Research and Implementation Based on Three-Dimensional Model Watermarking Algorithm
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1