Liu Jia-sheng, Huang Xian-wu, Zhu Can-yan, L Wan-li. Image Encryption Algorithm Based on m-Sequence Transform and Chaos Map[J]. Journal of Electronics & Information Technology, 2007, 29(6): 1476-1479. doi: 10.3724/SP.J.1146.2005.01414
Citation:
Liu Jia-sheng, Huang Xian-wu, Zhu Can-yan, L Wan-li. Image Encryption Algorithm Based on m-Sequence Transform and Chaos Map[J]. Journal of Electronics & Information Technology, 2007, 29(6): 1476-1479. doi: 10.3724/SP.J.1146.2005.01414
Liu Jia-sheng, Huang Xian-wu, Zhu Can-yan, L Wan-li. Image Encryption Algorithm Based on m-Sequence Transform and Chaos Map[J]. Journal of Electronics & Information Technology, 2007, 29(6): 1476-1479. doi: 10.3724/SP.J.1146.2005.01414
Citation:
Liu Jia-sheng, Huang Xian-wu, Zhu Can-yan, L Wan-li. Image Encryption Algorithm Based on m-Sequence Transform and Chaos Map[J]. Journal of Electronics & Information Technology, 2007, 29(6): 1476-1479. doi: 10.3724/SP.J.1146.2005.01414
Based on the ergodicity of the shifters (except for all zero-states) in m-sequence generator, in this paper a new m-sequence transform method is first proposed to apply to image position permutation. Combining this method with chaotic map, a novel image encryption approach is presented, and some simulating results are shown in this paper. Comparing with the existing encryption methods, the approach is not only of the characteristics of chaotic map with initial value sensitivity, parameter sensitivity and random sensitivity, but also of more larger secret key space. Thus the approach is more security than other encryption methods.
Kumsawat P, Attkitmongcol K, Srikaew A, and Sujitjorn S. Wavelet-based image watermarking using the genetic algorithm. Knowledge-based intelligent information and engineering systems. 8th International Conference, KES 2004. Proceedings (Lecture Notes in Artificial Intelligence Vol.3215), 2004, Vol.3: 643-649.[2]Bao P and Ma Xiaohu. Image adaptive watermarking using wavelet domain singular value decomposition[J].IEEE Trans. on Circuits and Systems for Video Technology.2005, 15(1):96-102[3]Chen Guan-rong, Mao Yao-bin, and Chui Charles K. A symmetric image encryption scheme based on 3D chaotic cat maps[J].Chaos, Solitons and Fractals.2004, 21(3):749-761[4]Zhang Lin-hua, Liao Xiao-feng, and Wang Xue-bing. An image encryption approach based on chaotic maps[J].Chaos, Solitons and Fractals.2005, 24(3):759-765[5]邹建成,齐东旭,熊昌镇. 基于面包师变换的数字图像加密. 北方工业大学学报, 2003, 15(1): 6-10.[6]甘小莺,孙诗瑛,宋文涛. 基于伪随机序列的视频图像加密新算法. 数据采集与处理, 2002, 17(3): 248-251.[7]唐秋玲,覃团发,陈光旨. 混沌图像加密. 广西大学学报, 1999, 24(1): 61-64.[8]樊昌信,张甫翊等编. 通信原理. 北京: 国防工业出版社, 2001年5月第5版: 326-336.