Analysis of Image Encryption Algorithm Based on Chaotic Signal

Article Preview

Abstract:

This paper, based on the characteristics of the chaotic dynamics system, by analyzing the characteristics of many chaotic dynamics model in image encryption and screening studies such as comparison (computer simulation experiment), combined with some specific practices of modern encryption system, regards the chaotic signal as the carrier hiding image information, for the purpose of image encryption. It regards chaotic system as a pseudo-random sequence generator, uses the way of compounding multiple chaos, combined with image replacement technology, designs image encryption algorithm of practical value and completes the development of the experimental system of image encryption

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 756-759)

Pages:

2024-2029

Citation:

Online since:

September 2013

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Feng Dengguo.The Domestic and Overseas Research Status and Development Trend of Cryptography [J].Journal on Communications.2002,23(5):18~26.

Google Scholar

[2] Feng Yunbo, Xia Guang-sheng.Information Security Technology Development Status [J]. Computer Security.2002,2:11~15.

Google Scholar

[3] Zhao Jin, Fang Jinqing.Research Progress in the Application of Modern Information Security and Chaotic Secure Communication [J].Progress in Physics.2003, 23(2):212~255.

Google Scholar

[4] Chen Ting, Jiang Guoping, Quan Anjing.The Discussion of Digital Image Encryption Technology [J].Journal of Information Security and Confidentiality of Communication.2005, (01).

Google Scholar

[5] Wang Dongmei, Huang Lin, Wang Jinrong.Magic Square Transformation Encrypted Digital Hologram [J].Journal of Zhejiang University of Technology.2007,(01).

Google Scholar

[6] Zhang Lianjun.Analysis of Image Chaotic Encryption Technology [J].Modern Intelligence. 2005,(01).

Google Scholar