首页> 外文期刊>International Journal of Information and Communication Technology >Secure image encryption scheme based on polar decomposition and chaotic map
【24h】

Secure image encryption scheme based on polar decomposition and chaotic map

机译:基于极性分解和混沌映射的安全图像加密方案

获取原文
获取原文并翻译 | 示例
           

摘要

Security is an important issue in image storage and communication, encryption is one of the most common ways to ensure security. Recently, many schemes based on chaotic map have been proposed, but most of this method suffers from small key space, which makes them vulnerable to brute forces attacks. In this study, we design a highly robust novel symmetric image encryption scheme which offer good confusion and diffusion qualities, and a large key space to ensure popular security factor and to overcome the weaknesses of the state of the art encryption schemes. In the security analysis section, we prove that our scheme can resist most known attacks, such as cipher image only attack, known and chosen plain image attacks, differential and exhaustive attacks. It is shown in this paper that the use of polar decomposition with chaotic map can gives a fast and secures encryption.
机译:安全性是图像存储和通信中的重要问题,加密是确保安全性最常见的方法之一。 最近,已经提出了许多基于混沌图的方案,但大多数方法都遭受了小的关键空间,这使得它们易于蛮力攻击。 在这项研究中,我们设计了一种高强度的新颖对称图像加密方案,其提供了良好的混乱和扩散品质,以及一种大的关键空间,以确保流行的安全系数,并克服现有技术的漏电方案的弱点。 在安全分析部分中,我们证明我们的方案可以抵抗最着名的攻击,例如密码映像攻击,已知和选择普通图像攻击,差异和详尽的攻击。 在本文中示出了利用混沌图的使用极性分解可以提供快速并确保加密。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号