本文已被:浏览 1943次 下载 3295次
Received:November 24, 2009 Revised:December 26, 2009
Received:November 24, 2009 Revised:December 26, 2009
中文摘要: 为了实现图像安全,快速加密,利用了图像像素可以插入到相邻像素之间以及拉伸折叠的思想设计了一种基于三维坐标的图像加密算法。算法首先将二维十进制矩阵转化为三维二进制矩阵,再根据图像像素可以插入到相邻像素之间,即左映射或者右映射,和拉伸方法,把三维矩阵转化为二维二进制矩阵。然后用置乱算法把二维二进制矩阵进行置乱,接着根据折叠方法把二维二进制矩阵转化为三维二进制矩阵,最后再把三维二进制矩阵转化为二维十进制矩阵以达到加密的效果。实验表明,该算法是一个安全有效的加密算法,加密本身还可以改变图像的像素值。
Abstract:To make the image secure and encryption faster, this paper proposes a simple three-dimensional chaotic mapping based on the idea that the image’s pixels can insert the adjoining pixels and the thought of stretching and folding the image. First of all, the algorithm changes the two-dimensional decimal matrix into a three-dimensional binary matrix. Second, based on the thought that the image’s pixels can insert the adjoining pixels, that is left mapping or right mapping, and the thought of stretching and folding the image, it changes the three-dimensional binary matrix into two-dimensional binary matrix. Third, the compound chaotic algorithm is used to scramble the decimal matrix, and the folding algorithm is used to change the two-dimensional binary matrix into threedimensional binary matrix. At last, it changes the three-dimensional binary matrix into a two-dimensional decimal matrix, and the decimal matrix is the encryption image. Experiments show that the image encryption is rapid and highly secure, and it can change the value of pixels element.
keywords: chaotic mapping compound encryption fold
文章编号: 中图分类号: 文献标志码:
基金项目:
Author Name | Affiliation |
NONG Sheng-Gong | 桂林电子科技大学 计算机与控制学院 广西 桂林541004 |
ZHOU Man-Yuan |
Author Name | Affiliation |
NONG Sheng-Gong | 桂林电子科技大学 计算机与控制学院 广西 桂林541004 |
ZHOU Man-Yuan |
引用文本:
农盛功,周满元.基于三维空间的图像加密算法①.计算机系统应用,2010,19(8):87-91
NONG Sheng-Gong,ZHOU Man-Yuan.Image Encryption Based on Three-Dimensional Space.COMPUTER SYSTEMS APPLICATIONS,2010,19(8):87-91
农盛功,周满元.基于三维空间的图像加密算法①.计算机系统应用,2010,19(8):87-91
NONG Sheng-Gong,ZHOU Man-Yuan.Image Encryption Based on Three-Dimensional Space.COMPUTER SYSTEMS APPLICATIONS,2010,19(8):87-91