|Table of Contents|

The Generation of Chaotic Sequence and Its Application to Image Encryption(PDF)

南京师范大学学报(工程技术版)[ISSN:1006-6977/CN:61-1281/TN]

Issue:
2004年01期
Page:
56-59
Research Field:
Publishing date:

Info

Title:
The Generation of Chaotic Sequence and Its Application to Image Encryption
Author(s):
Sun XiuhuaDai YueweiWang Zhiquan
Department of Automation, Nanjing University of Science and Technology, Nanjing 210094, PRC
Keywords:
chaotic sequence performance evaluation stream cipher bitmap
PACS:
TP309
DOI:
-
Abstract:
Chaos systems are characterized by its critical sensitivity to initial conditions and parameters, pseudo-randomness, and determinability. In this paper a software platform is brought forward, which can be used to generate and evaluate chaotic binary sequences. It utilizes three typical kinds of chaotic dynamics model to generate encryption sequences. Massive experim ents on randomness, sensitivity and repeatability verify that chaotic sequence has higher performance in encryption. Besides, it has the capability to encrypt and decrypt many kinds of objects. The experimental results have been given on bitmap image en cryption as an example.

References:

[ 1] 黄月江. 信息安全与保密: 现代战争的信息卫士[M] . 北京: 国防工业出版社, 1999.
[ 2] Ljupco Kocarev, Goce Jakimoski. Chaos and Cryptography- PART Ⅰ : From Chaotic Maps to Encryption Algorithms[ J/ OL] . http: / / rfic. ucsd. edu/ chaos/ papers. html, 2000.
[ 3] Goce Jakimoski, Ljupco Kocare. Chaos and Cryptography- PART Ⅱ : Block Encryption Based on Chaotic Maps[ J/ OL] . http: / / rfic. ucsd. edu/ chaos/ papers. html, 2000.
[ 4] 吴伟陵. 信息处理与编码[M] . 北京: 人民邮电出版社, 1999, 7.
[ 5] 戴跃伟, 卓成春, 王执铨. 一种二值混沌加密序列的产生及性能分析[ J] . 南京理工大学学报, 2001, 25( 5) .
[ 6] 邓浩. 混沌伪随机序列和数字语音保密通信[ J] . 通信学报, 1999, 20( 4) : 29~ 35.
[ 7] 丁玮, 齐东旭. 数字图像变换及信息隐藏与伪装技术 [ J] . 计算机学报, 1998, 21( 9) : 838~ 843.

Memo

Memo:
-
Last Update: 2013-04-29