A New Image Encryption Algorithm Based on the Logistic Chaotic System

被引:0
作者
Wang Feng-ying [1 ]
Cui Guo-wei [1 ]
机构
[1] Inner Mongolia Univ Sci & Technol, Dept Informat Engineer, Baotou, Peoples R China
来源
PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 9 (ICCSIT 2010) | 2010年
关键词
Chaos; Logistic map; Image encryption; security; SCHEME;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The new image encryption algorithm based on Logistic chaotic map is designed. First, after two initial values of Logistic chaotic map are pretreated, two of the modified initial values are obtained based on which two chaotic sequences are generated. Next, taking the first n-gray value of the original image in turn, pixel gray value (n is odd and even) is respectively encrypted by the chaotic sequence generated by two key. Results and analysis of experiment show that the proposed scheme has higher security.
引用
收藏
页码:192 / 194
页数:3
相关论文
共 11 条
[1]   A symmetric image encryption scheme based on 3D chaotic cat maps [J].
Chen, GR ;
Mao, YB ;
Chui, CK .
CHAOS SOLITONS & FRACTALS, 2004, 21 (03) :749-761
[2]   Image encryption for secure Internet multimedia applications [J].
Dang, PP ;
Chau, PM .
IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2000, 46 (03) :395-403
[3]  
ELFISHAWY N, 2007, INT J NETWORK SECURI, V5, P241
[4]  
[韩凤英 HAN Fengying], 2008, [中南林业科技大学学报, Journal of Central South University of Forestry & Technology], V28, P153
[5]   A modified method of a class of recently presented cryptosystems [J].
Huang, FJ ;
Guan, ZH .
CHAOS SOLITONS & FRACTALS, 2005, 23 (05) :1893-1899
[6]   Cryptanalysis of a data security protection scheme for VoIP [J].
Li, CQ ;
Li, S ;
Zhang, D ;
Chen, G .
IEE PROCEEDINGS-VISION IMAGE AND SIGNAL PROCESSING, 2006, 153 (01) :1-10
[7]  
[刘金梅 Liu Jinmei], 2007, [华南理工大学学报. 自然科学版, Journal of South China University of Technology. Natural Science Edition], V35, P1
[8]  
Peng Fei, 2005, J S CHINA U TECHNOLO, V33, P543
[9]  
[丘水生 Qin Shuisheng], 2006, [电路与系统学报, Journal of circuits and systems], V11, P98
[10]   COMMUNICATION THEORY OF SECRECY SYSTEMS [J].
SHANNON, CE .
BELL SYSTEM TECHNICAL JOURNAL, 1949, 28 (04) :656-715