Image encryption based on chaotic modulation of wavelet coefficients

被引:8
作者
He, Xiping [1 ]
Zhang, Qionghua [2 ]
机构
[1] Chongqing Technol & Business Univ, Coll Comp Sci & Informat Engn, Chongqing 400067, Peoples R China
[2] Chongqing Technol & Business Univ, Chongqing 400067, Peoples R China
来源
CISP 2008: FIRST INTERNATIONAL CONGRESS ON IMAGE AND SIGNAL PROCESSING, VOL 1, PROCEEDINGS | 2008年
关键词
image; encryption; wavelet coefficient; chaotic modulation;
D O I
10.1109/CISP.2008.222
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper is aimed at the image encryption scheme applicable to JPEG2000 codec. Firstly, two chaotic maps are suggested and their statistic characteristics are also analyzed Secondly, to accomplish a controllable visual effect of encrypted image, a visual quality control model is presented, and on the basis of which, a chaotic image encryption scheme is constructed by chaotically modulating the randomly selected approximate coefficients at the coarsest level in wavelet domain. Then, the security and efficiency of the algorithm are analyzed. Finally, the experiment results illustrate that the proposed algorithms are credible, secure, efficient, and practical for JPSEC.
引用
收藏
页码:622 / +
页数:2
相关论文
共 11 条
[1]   A symmetric image encryption scheme based on 3D chaotic cat maps [J].
Chen, GR ;
Mao, YB ;
Chui, CK .
CHAOS SOLITONS & FRACTALS, 2004, 21 (03) :749-761
[2]   JPSEC for secure imaging in JPEG 2000 [J].
Dufaux, F ;
Wee, SJ ;
Apostolopoulos, JG ;
Ebrahimi, T .
APPLICATIONS OF DIGITAL IMAGE PROCESSING XXVII, PTS 1AND 2, 2004, 5558 :319-330
[3]  
He XP, 2006, LECT NOTES ARTIF INT, V4062, P671
[4]  
*ISO IEC, 2000, 154441 ISOIEC 1
[5]   Security analysis of a chaos-based image encryption algorithm [J].
Lian, SG ;
Sun, JS ;
Wang, ZQ .
PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2005, 351 (2-4) :645-661
[6]  
Lian SG, 2004, FOURTH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY, PROCEEDINGS, P78
[7]   Use of chaotic dynamical systems in cryptography [J].
Schmitz, R .
JOURNAL OF THE FRANKLIN INSTITUTE-ENGINEERING AND APPLIED MATHEMATICS, 2001, 338 (04) :429-441
[8]   Chaos-based cryptograph incorporated with S-box algebraic operation [J].
Tang, GN ;
Wang, SH ;
Lü, HP ;
Hu, G .
PHYSICS LETTERS A, 2003, 318 (4-5) :388-398
[9]  
WATANABE O, 2004, 2004 INT C IM PROC C, V5, P3435
[10]  
WU YD, 2004, 2004 INT C IM PORC C, V5, P3439