Your browser doesn't support javascript.
loading
Chaotic image encryption based on running-key related to plaintext.
Guanghui, Cao; Kai, Hu; Yizhi, Zhang; Jun, Zhou; Xing, Zhang.
Afiliación
  • Guanghui C; Electronic & Information Engineering College, Liaoning University of Technology, Jinzhou 121001, China ; School of Computer Science and Technology, Beihang University, Beijing 100191, China.
  • Kai H; School of Computer Science and Technology, Beihang University, Beijing 100191, China.
  • Yizhi Z; Electronic & Information Engineering College, Liaoning University of Technology, Jinzhou 121001, China.
  • Jun Z; Electronic & Information Engineering College, Liaoning University of Technology, Jinzhou 121001, China.
  • Xing Z; Electronic & Information Engineering College, Liaoning University of Technology, Jinzhou 121001, China.
ScientificWorldJournal ; 2014: 490179, 2014.
Article en En | MEDLINE | ID: mdl-24711727
ABSTRACT
In the field of chaotic image encryption, the algorithm based on correlating key with plaintext has become a new developing direction. However, for this kind of algorithm, some shortcomings in resistance to reconstruction attack, efficient utilization of chaotic resource, and reducing dynamical degradation of digital chaos are found. In order to solve these problems and further enhance the security of encryption algorithm, based on disturbance and feedback mechanism, we present a new image encryption scheme. In the running-key generation stage, by successively disturbing chaotic stream with cipher-text, the relation of running-key to plaintext is established, reconstruction attack is avoided, effective use of chaotic resource is guaranteed, and dynamical degradation of digital chaos is minimized. In the image encryption stage, by introducing random-feedback mechanism, the difficulty of breaking this scheme is increased. Comparing with the-state-of-the-art algorithms, our scheme exhibits good properties such as large key space, long key period, and extreme sensitivity to the initial key and plaintext. Therefore, it can resist brute-force, reconstruction attack, and differential attack.
Asunto(s)

Texto completo: 1 Colección: 01-internacional Base de datos: MEDLINE Asunto principal: Algoritmos / Procesamiento de Imagen Asistido por Computador Idioma: En Revista: ScientificWorldJournal Asunto de la revista: MEDICINA Año: 2014 Tipo del documento: Article País de afiliación: China

Texto completo: 1 Colección: 01-internacional Base de datos: MEDLINE Asunto principal: Algoritmos / Procesamiento de Imagen Asistido por Computador Idioma: En Revista: ScientificWorldJournal Asunto de la revista: MEDICINA Año: 2014 Tipo del documento: Article País de afiliación: China