详细信息

超混沌系统的函数投影同步在图像加密中的应用     被引量:7

Application for Function Projection Synchronization of the Hyper-chaotic System in Image Encryption

文献类型:期刊文献

中文题名:超混沌系统的函数投影同步在图像加密中的应用

英文题名:Application for Function Projection Synchronization of the Hyper-chaotic System in Image Encryption

作者:李德奎[1]

第一作者:李德奎

机构:[1]甘肃中医药大学理科教学部

第一机构:甘肃中医药大学定西校区

年份:2019

卷号:45

期号:1

起止页码:24

中文期刊名:北京工业大学学报

外文期刊名:Journal of Beijing University of Technology

收录:CSTPCD;;Scopus;北大核心:【北大核心2017】;CSCD:【CSCD_E2019_2020】;

基金:甘肃省高等学校科研项目(2017A-155);甘肃省自然科学基金资助项目(1610RJZA080)

语种:中文

中文关键词:超混沌系统;状态观测器;函数投影同步;混沌时间序列;加取模像素扩散算法;加密和解密

外文关键词:hyper-chaotic system;state observer;function projective synchronization;chaotic time series;pixel diffusion algorithm;encryption and decryption

摘要:针对加密灰度图像安全级别低的问题,提出基于超混沌系统及其状态观测器实现函数投影同步的混沌时间序列,应用加取模像素扩散算法对灰度图像进行加密和解密.首先,利用超混沌系统的状态输出向量,构造其状态观测器系统,根据控制理论方法,给出超混沌系统及其状态观测器实现函数投影同步的充分条件;然后,基于函数投影同步的混沌时间序列,利用加取模像素扩散算法得到灰度图像的加密图像和解密图像.理论分析和数值仿真表明,构造的状态观测器系统是正确的,得出的函数投影同步的充分条件是有效的,密文图像分布与均匀分布没有显著差异.同时算法对密钥具有高度敏感性,有很强的抵御攻击的能力和精准的解密效果.
To solve the problem of low security level of encrypted gray image, based on chaotic time series from functional projective synchronization of the hyper-chaotic system and its state observer, the “add modulus pixel diffusion algorithm"was used to encrypt and decrypt gray image. The state observer of the hyper-chaotic system was constructed. First, the state observer of the hyper-chaotic system was conducted by using the state output vector of the hyper-chaotic system, and according to control theory method, the sufficient condition of function projective synchronization was given for the hyper-chaotic system and the state observer. Then, based on chaotic time series of functional projective synchronization, encrypted and decrypted images of gray image were obtained by using the “add modulus pixel diffusion algorithm". Theoretical analysis and numerical simulation show the constructed state observer is correct, the sufficient condition of functional projection synchronization is effective, and there is no significant difference between the encrypted image distribution and the uniform distribution. At the same time, the algorithm is highly sensitive to the key, and has strong ability to resisting attack and has accurate decryption effect.

参考文献:

正在载入数据...

版权所有©甘肃中医药大学 重庆维普资讯有限公司 渝B2-20050021-8 
渝公网安备 50019002500408号 违法和不良信息举报中心