首页> 美国卫生研究院文献>other >Chaotic Image Encryption Based on Running-Key Related to Plaintext
【2h】

Chaotic Image Encryption Based on Running-Key Related to Plaintext

机译:基于与纯文本相关的运行密钥的混沌图像加密

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

In the field of chaotic image encryption, the algorithm based on correlating key with plaintext has become a new developing direction. However, for this kind of algorithm, some shortcomings in resistance to reconstruction attack, efficient utilization of chaotic resource, and reducing dynamical degradation of digital chaos are found. In order to solve these problems and further enhance the security of encryption algorithm, based on disturbance and feedback mechanism, we present a new image encryption scheme. In the running-key generation stage, by successively disturbing chaotic stream with cipher-text, the relation of running-key to plaintext is established, reconstruction attack is avoided, effective use of chaotic resource is guaranteed, and dynamical degradation of digital chaos is minimized. In the image encryption stage, by introducing random-feedback mechanism, the difficulty of breaking this scheme is increased. Comparing with the-state-of-the-art algorithms, our scheme exhibits good properties such as large key space, long key period, and extreme sensitivity to the initial key and plaintext. Therefore, it can resist brute-force, reconstruction attack, and differential attack.
机译:在混沌图像加密领域,基于密钥与明文的关联算法已成为一个新的发展方向。然而,对于这种算法,发现了在抵抗重建攻击,有效利用混沌资源以及减少数字混沌的动态退化方面的一些缺点。为了解决这些问题,进一步提高加密算法的安全性,基于扰动和反馈机制,提出了一种新的图像加密方案。在运行密钥生成阶段,通过用密文连续扰乱混沌流,建立了运行密钥与明文的关系,避免了重构攻击,保证了混沌资源的有效利用,并最大程度地减少了数字混沌的动态退化。 。在图像加密阶段,通过引入随机反馈机制,增加了破解该方案的难度。与最先进的算法相比,我们的方案具有良好的属性,例如较大的密钥空间,较长的密钥周期以及对初始密钥和明文的极端敏感性。因此,它可以抵抗暴力,重建攻击和差异攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号