• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Wen Changci, Wang Qin, Liu Xianghong, Huang Fumin, Yuan Zhishu. An Encryption Algorithm for Image Based on Affine and Composed Chaos[J]. Journal of Computer Research and Development, 2013, 50(2): 319-324.
Citation: Wen Changci, Wang Qin, Liu Xianghong, Huang Fumin, Yuan Zhishu. An Encryption Algorithm for Image Based on Affine and Composed Chaos[J]. Journal of Computer Research and Development, 2013, 50(2): 319-324.

An Encryption Algorithm for Image Based on Affine and Composed Chaos

More Information
  • Published Date: February 14, 2013
  • With the popular application of multimedia, the security of digital image becomes more and more important. According to the feature of digital image and on the basis of three-dimension affine transformation and chaos, a novel spatial domain encryption algorithm is proposed. Firstly, it scrambles pixel position and confuses pixel value according to the corresponding coordination. Secondly, it takes a series of nonlinear diffusion and substitution in turn for all lines. The algorithm proceeds with the above two steps for at least 3 times, and it can be conveniently converted to the frequency domain algorithm while replacing the processed data in the spatial domain with quantized coefficients in the frequency domain. In the process of substitution, pixel value is introduced to perturb multiple chaos systems that are coupled together for self-adaptive encryption. In the encryption process, the scrambling parameters are generated by chaos systems automatically, and the scrambling function is compatible with images at any ratio of length to width without any preprocessing. Theoretical analysis shows that the algorithm has huge key space to defend against violent attack, the mapping relation between the plaintext and the ciphertext is complex enough to resist chosen plaintext attack efficiently, and the algorithm using simple chaos systems is designed modularly in order to be realized parallelly conveniently. Experimental results show that the algorithm takes good encryption result, gets strong sensitivity, conforms to confusion and diffusion principles in cryptography, and achieves high security.
  • Related Articles

    [1]Liu Xinghong, Zhou Yi, Zhou Tao, Qin Jie. Self-Paced Learning for Open-Set Domain Adaptation[J]. Journal of Computer Research and Development, 2023, 60(8): 1711-1726. DOI: 10.7544/issn1000-1239.202330210
    [2]Dai Hao, Jin Ming, Chen Xing, Li Nan, Tu Zhiying, Wang Yang. Survey of Data-Driven Application Self-Adaptive Technology[J]. Journal of Computer Research and Development, 2022, 59(11): 2549-2568. DOI: 10.7544/issn1000-1239.20210221
    [3]Tong Yanxiang, Qin Yi, Ma Xiaoxing. Evaluating the Fitness of Model Deviation Detection Approaches on Self-Adaptive Software Systems[J]. Journal of Computer Research and Development, 2022, 59(9): 1929-1946. DOI: 10.7544/issn1000-1239.20220015
    [4]Li Zeyu, Wang Quan, Yang Pengfei, Xu Zhiwei, Liang Jinpeng, Gao Ge. FPGA Fault Tolerance Based on Dynamic Self-Adaptive Redundancy[J]. Journal of Computer Research and Development, 2022, 59(7): 1428-1438. DOI: 10.7544/issn1000-1239.20210181
    [5]Yang Yaolin, He Hongjie, Chen Fan, Yuan Changqi. Reversible Data Hiding of Image Encryption Based on Prediction Error Adaptive Coding[J]. Journal of Computer Research and Development, 2021, 58(6): 1340-1350. DOI: 10.7544/issn1000-1239.2021.20200172
    [6]Xu Zhengguo, Zheng Hui, He Liang, Yao Jiaqi. Self-Adaptive Clustering Based on Local Density by Descending Search[J]. Journal of Computer Research and Development, 2016, 53(8): 1719-1728. DOI: 10.7544/issn1000-1239.2016.20160136
    [7]Xue Yu, Zhuang Yi, Meng Xin, Zhang Youyi. Self-Adaptive Learning Based Ensemble Algorithm for Solving Matrix Eigenvalues[J]. Journal of Computer Research and Development, 2013, 50(7): 1435-1443.
    [8]Yang Xin, Zhou Dake, Fei Shumin. A Self-Adapting Bilateral Total Variation Technology for Image Super-Resolution Reconstruction[J]. Journal of Computer Research and Development, 2012, 49(12): 2696-2701.
    [9]Chen Honglong, Li Renfa, Li Rui, Edwin Sha. An Assignment Model and Algorithm for Self-Adaptive Software Based on Architecture[J]. Journal of Computer Research and Development, 2011, 48(12): 2300-2307.
    [10]Zhang Jianyu, Wei Tao, and Zou Wei. A Packet Classification Algorithm Based on Self-Adaptive Cache[J]. Journal of Computer Research and Development, 2006, 43(2): 196-203.

Catalog

    Article views (812) PDF downloads (706) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return