[1]张晓岩,王 超,孙志人,等.基于二维CA和CWQ方法的图像加密方案(英文)[J].南京师范大学学报(自然科学版),2008,31(01):1-7.
 Zhang Xiaoyan,Wang Chao,Sun Zhiren,et al.A New Image Encryption Scheme Based on Two-Dimensional CA Joint With CWQ Method[J].Journal of Nanjing Normal University(Natural Science Edition),2008,31(01):1-7.
点击复制

基于二维CA和CWQ方法的图像加密方案(英文)()
分享到:

《南京师范大学学报》(自然科学版)[ISSN:1001-4616/CN:32-1239/N]

卷:
第31卷
期数:
2008年01期
页码:
1-7
栏目:
数学
出版日期:
2008-03-30

文章信息/Info

Title:
A New Image Encryption Scheme Based on Two-Dimensional CA Joint With CWQ Method
作者:
张晓岩1 王 超2 孙志人1 张赞波3 4
1. 南京师范大学数学与计算机科学学院, 数学研究所, 江苏南京210097 )
( 2. 南开大学软件学院, 天津300071 )
( 3. 中山大学计算机科学系, 广东广州510275)
( 4. 广东轻工职业技术学院计算机工程系, 广东广州510300 )
Author(s):
Zhang Xiaoyan1 Wang Chao2 Sun Zhiren1 Zhang Zanbo34
( 1. S chool ofM ath emat ics and C om pu ter S cience, Inst itu te ofM ath emat ics, Nan j ing Norm alUn iversity, Nan jing 210097, Ch ina)
( 2. Col lege of Softw are, NankaiUn ivers ity, T ian jin 300071, Ch ina)
( 3. Departm en t of Com puter S cien ce, SunY at-sen Un iversity, Guangzhou 510275, Ch ina)
( 4. Dep artm en t of Com puter Eng ineering, Gu angdong Industry Techn icalC ollege, Guangzhou 510300, C h ina)
关键词:
图像加密 细胞自动机 四叉树结构 图论 小波
Keywords:
im age encryption cellu la r autom ata quad- tree structure g raph theory w ave let
分类号:
TP309.7
摘要:
细胞自动机简称CA,是具有离散的空间和时间特性的动力系统.在过去的10多年里,细胞自动机在密码系统和信息安全方面的应用得到了人们相当大的关注和兴趣.本文给出了一种结合格图结构摩尔邻域的二维CA方法和基于四叉树结构的CWQ方法的图像加密方案.首先,二维CA的加密方法可以比仅进行混淆作用的CWQ方法更有效地提高系统的安全性.其次,CWQ方法可以加强具有雪崩效应和扩散性质的二维CA方法的混淆性质.方案具有大密钥量且简单易行适用于数字图像加密等特点.
Abstract:
CA is the abbrev ia tion o f ce llular autom a tawh ich a re dynam ica l sy stem sw ith discrete space and tim e. Conside rable interest has been shown over the past decade in the use o f cellular au tom ata in cryptography. The a im o f th is paper is to present a new schem e fo r im age encryption, w hich com bines two-d im ensiona l CA approach w e proposed in M oore neighbo rhood on the graph structure of square lattice and CWQ m ethod based on quad- tree structure. First, the two-d im ensiona l CA encryption approach can strengthen the sy stem’ s secur ity mo re greatly than the confusion-on ly CWQ m ethod. Second, CWQ m ethod enhances the con fusion property o f the two-d im ensiona lCA appro ach wh ich satisfies avalanche e ffect and the property of diffusion. M oreov er, an importan t feature of the proposed schem e is tha t it has very larg e number of secur ity keys and simp le operations wh ich are espec ia lly useful for d ig ita l image encryption.

参考文献/References:

[ 1] Yuan C, Zhu B B, W ang Y, et a .l E fficien t and fu lly scalable encryption forMPEG- 4 FGS[ C] / / Proc IEEE Int Sympos-i um on C ircu its and Systems, 2003( 2): 620-623.
[ 2] W ee S J, Aposto lopoulos J G. Secure scab lab le stream ing enab ling transcod ingw ithout decryp tion[ C] / / Proc IEEE Int Conference on Im age Process ing, 2001( 1): 437-440.
[ 3] Tosun A S, FengW C. L ightw eigh t secur itym echanism s fo rw ire less v ideo transm ission[ C] / / Proc IEEE In t Conference on Info rma tion Techno logy: Coding and Compu ting, 2001: 157-161.
[ 4] W o lfram S. Cryptog raphyw ith cellu lar autom ata[ C] / / Advances in Crypto logy-CRYPTO 85, Lecture Notes in Com pute r Sc-i ence, 1985( 218): 429-432.
[ 5] Nandy S, Kar B K, Chaudhur i P. Theory and app lications of cellu lar autom ata in cryptography[ J]. IEEE Trans Com put, 1994, 43: 1 346-1 357.
[ 6] M iha ljev icM. Security exam ination of certa in ce llu lar autom ata based key stream gene rato r[ C] / / ISITA 96- 1996 IEEE Int Sym p In fo rm Theory and App,l 1996: 246-249.
[ 7] Chen R, LuW, La i J. Im ag e encryption using prog ressive ce llu la r autom ata substitution and SCAN[ C ] / / IEEE ISCAS, 2005( 2): 1 690-1 693.
[ 8] Chaudhuri P P, Chaudhuri D R, N andi S, et a.l Add itive Ce llu la r Autom ata: Theory and Applications[M ]. New York: IEEE Press, 1997.
[ 9] Sutner K. Additive autom a ta on graphs[ J]. Comp lex Systems, 1998, 2( 1) : 1-28.
[ 10] Shap iro JM. Embedded im age coding us ing ze ro trees o fw av elet cod ing [ J]. IEEE Transactions on Signa lProcessing, 1993, 41( 12): 3 445-3 462.
[ 11] Sa id A. A new fast and effic ient im age code based on se t pa rtition ing in h ierarch ica l trees[ J]. IEEE Transactions on C ircuits and System s forV ideo Technology, 1996( 6) : 243-250.
[ 12] L ian S, W ang Z. Com parison o f sev era lw av elet coeffic ients con fusion m ethods app lied in mu ltim ed ia encryption[ C] / / Proc Int Conference on Com puter Netwo rks andM obile Com puting, 2003: 372-376.

备注/Memo

备注/Memo:
Foundation item: Supported by the NNSF( 10671095) , Ch ina Postdoctoral Science Found at ion ( 20070421028) , J iangsu P lanned P rojects for Pos-tdoctoralR esearch Funds( 0602023C ) , Scien ce& Techn ology Innovation Fund ofN ankaiU n ivers ity ( 2006019) and the S cien tific Research Foundation of Guangdong Industry Techn ical College( 2005 - 11) .
Biography: Zhang X iaoyan, born in 1978, doctor, ma jored in graph theory. E-m ail: Royxyzhang@ gm ail. com
更新日期/Last Update: 2013-05-05