咨询与建议

看过本文的还看了

相关文献

该作者的其他文献

文献详情 >A color image encryption schem... 收藏

A color image encryption scheme based on a 2D coupled chaotic system and diagonal scrambling algorithm

作     者:苏静明 方士辉 洪炎 温言 Jingming Su;Shihui Fang;Yan Hong;Yan Wen

作者机构:Anhui Mining Machinery and Electrical Equipment Coordination Innovation CenterAnhui University of Science and TechnologyHuainan 232001China School of Computer Science and Information EngineeringHefei University of TechnologyHefei 230009China 

出 版 物:《Chinese Physics B》 (中国物理B(英文版))

年 卷 期:2024年第33卷第7期

页      面:233-243页

核心收录:

学科分类:0839[工学-网络空间安全] 08[工学] 081201[工学-计算机系统结构] 0812[工学-计算机科学与技术(可授工学、理学学位)] 

基  金:Project supported by the National Natural Science Foundation of China(Grant Nos.62105004 and 52174141) the College Student Innovation and Entrepreneurship Fund Project(Grant No.202210361053) Anhui Mining Machinery and Electrical Equipment Coordination Innovation Center,Anhui University of Science&Technology(Grant No.KSJD202304) the Anhui Province Digital Agricultural Engineering Technology Research Center Open Project(Grant No.AHSZNYGC-ZXKF021) 

主  题:color image encryption discrete cosine transform two-dimensional(2D)coupled chaotic system diagonal scrambling 

摘      要:A novel color image encryption scheme is developed to enhance the security of encryption without increasing the complexity. Firstly, the plain color image is decomposed into three grayscale plain images, which are converted into the frequency domain coefficient matrices(FDCM) with discrete cosine transform(DCT) operation. After that, a twodimensional(2D) coupled chaotic system is developed and used to generate one group of embedded matrices and another group of encryption matrices, respectively. The embedded matrices are integrated with the FDCM to fulfill the frequency domain encryption, and then the inverse DCT processing is implemented to recover the spatial domain signal. Eventually,under the function of the encryption matrices and the proposed diagonal scrambling algorithm, the final color ciphertext is obtained. The experimental results show that the proposed method can not only ensure efficient encryption but also satisfy various sizes of image encryption. Besides, it has better performance than other similar techniques in statistical feature analysis, such as key space, key sensitivity, anti-differential attack, information entropy, noise attack, etc.

读者评论 与其他读者分享你的观点

用户名:未登录
我的评分