Advanced Search
Volume 29 Issue 6
Jan.  2011
Turn off MathJax
Article Contents
Liu Jia-sheng, Huang Xian-wu, Zhu Can-yan, L Wan-li. Image Encryption Algorithm Based on m-Sequence Transform and Chaos Map[J]. Journal of Electronics & Information Technology, 2007, 29(6): 1476-1479. doi: 10.3724/SP.J.1146.2005.01414
Citation: Liu Jia-sheng, Huang Xian-wu, Zhu Can-yan, L Wan-li. Image Encryption Algorithm Based on m-Sequence Transform and Chaos Map[J]. Journal of Electronics & Information Technology, 2007, 29(6): 1476-1479. doi: 10.3724/SP.J.1146.2005.01414

Image Encryption Algorithm Based on m-Sequence Transform and Chaos Map

doi: 10.3724/SP.J.1146.2005.01414
  • Received Date: 2005-11-07
  • Rev Recd Date: 2006-05-15
  • Publish Date: 2007-06-19
  • Based on the ergodicity of the shifters (except for all zero-states) in m-sequence generator, in this paper a new m-sequence transform method is first proposed to apply to image position permutation. Combining this method with chaotic map, a novel image encryption approach is presented, and some simulating results are shown in this paper. Comparing with the existing encryption methods, the approach is not only of the characteristics of chaotic map with initial value sensitivity, parameter sensitivity and random sensitivity, but also of more larger secret key space. Thus the approach is more security than other encryption methods.
  • loading
  • Kumsawat P, Attkitmongcol K, Srikaew A, and Sujitjorn S. Wavelet-based image watermarking using the genetic algorithm. Knowledge-based intelligent information and engineering systems. 8th International Conference, KES 2004. Proceedings (Lecture Notes in Artificial Intelligence Vol.3215), 2004, Vol.3: 643-649.[2]Bao P and Ma Xiaohu. Image adaptive watermarking using wavelet domain singular value decomposition[J].IEEE Trans. on Circuits and Systems for Video Technology.2005, 15(1):96-102[3]Chen Guan-rong, Mao Yao-bin, and Chui Charles K. A symmetric image encryption scheme based on 3D chaotic cat maps[J].Chaos, Solitons and Fractals.2004, 21(3):749-761[4]Zhang Lin-hua, Liao Xiao-feng, and Wang Xue-bing. An image encryption approach based on chaotic maps[J].Chaos, Solitons and Fractals.2005, 24(3):759-765[5]邹建成,齐东旭,熊昌镇. 基于面包师变换的数字图像加密. 北方工业大学学报, 2003, 15(1): 6-10.[6]甘小莺,孙诗瑛,宋文涛. 基于伪随机序列的视频图像加密新算法. 数据采集与处理, 2002, 17(3): 248-251.[7]唐秋玲,覃团发,陈光旨. 混沌图像加密. 广西大学学报, 1999, 24(1): 61-64.[8]樊昌信,张甫翊等编. 通信原理. 北京: 国防工业出版社, 2001年5月第5版: 326-336.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (3390) PDF downloads(955) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return