作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程 ›› 2006, Vol. 32 ›› Issue (2): 34-36.

• 博士论文 • 上一篇    下一篇

基于复合混沌系统的图像加密

彭 军 1, 2,廖晓峰2,张伟 3,李学明2,刘勇国4,王莅辉5   

  1. 1. 重庆科技学院电子信息工程学院,重庆 400050;2. 重庆大学计算机科学与工程学院,重庆 400044;3. 重庆教育学院计算机与现代教育技术系,重庆 400067;4. 上海交通大学计算机科学与工程系,上海 200030;5. 北京石油化工学院计算机系,北京 102600
  • 出版日期:2006-01-20 发布日期:2006-01-20

Image Encryption Based on Composite Chaotic System

PENG Jun1, 2, LIAO Xiaofeng2, ZHANG Wei3, LI Xueming2, LIU Yongguo4, WANG Lihui5   

  1. 1. School of Electronic Information Engineering, Chongqing University of Science and Technology, Chongqing 400050; 2. School of Computer Science and Engineering, Chongqing University, Chongqing 400044; 3. Department of Computer & Modern Education Technology, Chongqing Education College, Chongqing 400067; 4. Department of Computer Science and Engineering, Shanghai Jiaotong University, Shanghai 200030;5. Department of Computer Science and Technology, Beijing Institute of Petrochemical Technology, Beijing 102600
  • Online:2006-01-20 Published:2006-01-20

摘要: 研究了一个基于复合混沌系统的图像加密系统。在该加密系统中,使用具有复杂动力学特性的三维Chen 系统和一维Logistic 混沌映射,并以特定方式将两个混沌系统的输出序列复合起来,通过异或操作实现了对图像的快速加密处理。对该系统进行数值实验和安全性分析,结果表明该系统不但拥有大的密钥空间,而且对密钥和明文很敏感,具有优良的扩散性能和扰乱性能,并能抵抗已知明文攻击和选择明文攻击。

关键词: 复合混沌系统;图像加密;Chen 系统;Logistic 映射

Abstract: This paper proposes an image encryption system based on composite chaotic system. A three dimensional Chen’s system which has a complex dynamical behavior and a one dimensional logistic chaotic mapping are employed in the encryption system. The output sequences of these two chaotic systems are composed by using a special method, and a fast image encryption is realized by means of the bit-wise xor operations. The results of simulation experiments and security analyses indicate that this encryption system not only has a large key space but also has a very sensitivity with respect to the secret key and the original image. The encryption system proposed in this paper possesses perfect diffusion and confusion properties and it can resist the know-plaintext attacks and chosen-plaintext attacks

Key words: Composite chaotic system; Image encryption; Chen’s system; Logistic mapping