当前位置: X-MOL 学术Wireless Netw. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Computer generated hologram-based image cryptosystem with multiple chaotic systems
Wireless Networks ( IF 3 ) Pub Date : 2020-01-02 , DOI: 10.1007/s11276-019-02223-z
Chuying Yu , Xiaowei Li , Shaoyuan Xu , Jianzhong Li

Based on computer generated hologram (CGH) and multiple chaotic systems, a novel image encryption scheme is presented, in which shuffling the positions and changing the values of image pixels are combined to confuse the relationship between the ciphertext and the original image. In the encryption process, the complex distribution is permuted by use of the designed scrambling algorithm which is based on Chen’s chaotic system and logistic maps firstly. Subsequently, the Burch’s coding method is used to fabricate the CGH as the encrypted image. Finally, the pixel values of the encrypted CGH are changed by sine map to withstand statistical analysis attacks. Simulation results demonstrate that the proposed method has high security level and certain robustness against statistical analysis attacks, data loss, noise disturbance and differential attack.



中文翻译:

具有多个混沌系统的计算机生成的基于全息图的图像密码系统

基于计算机生成全息图(CGH)和多混沌系统,提出了一种新颖的图像加密方案,该方案将位置打乱和改变图像像素值相结合,混淆了密文和原始图像之间的关系。在加密过程中,首先使用基于陈氏混沌系统和逻辑映射设计的加扰算法对复数分布进行置换。随后,Burch 编码方法被用来制作 CGH 作为加密图像。最后,通过正弦图改变加密后的 CGH 的像素值,以抵御统计分析攻击。仿真结果表明,该方法具有较高的安全等级,对统计分析攻击、数据丢失、噪声干扰和差分攻击具有一定的鲁棒性。

更新日期:2020-01-02
down
wechat
bug