Advanced Search
Volume 32 Issue 8
Sep.  2010
Turn off MathJax
Article Contents
Zhou Qing, Hu Yue, Liao Xiao-Feng. Analysis of the Diffusion Property of Image Encryption Algorithm in Block-and-Permutation Mode and Its Implementation[J]. Journal of Electronics & Information Technology, 2010, 32(8): 2015-2018. doi: 10.3724/SP.J.1146.2009.01071
Citation: Zhou Qing, Hu Yue, Liao Xiao-Feng. Analysis of the Diffusion Property of Image Encryption Algorithm in Block-and-Permutation Mode and Its Implementation[J]. Journal of Electronics & Information Technology, 2010, 32(8): 2015-2018. doi: 10.3724/SP.J.1146.2009.01071

Analysis of the Diffusion Property of Image Encryption Algorithm in Block-and-Permutation Mode and Its Implementation

doi: 10.3724/SP.J.1146.2009.01071
  • Received Date: 2009-08-10
  • Rev Recd Date: 2009-12-01
  • Publish Date: 2010-08-19
  • The diffusion property of image encryption algorithms in block-and-permutation mode is investigated, where two new conceptions, the optimal diffusion and collision-free permutation are put forward. An image encryption algorithm in block-and-permutation mode fulfills the requirement of optimal diffusion when the global diffusion is achieved within the ideally least round, which is feasible if and only if the permutation is collision-free. Further more, a permutation algorithm based on quadtree structure is proposed, which is proved to fulfill the requirement of the optimal diffusein.
  • loading
  • Chen L and Zhao D. Image encryption with fractionalwavelet packet method, Optik, 2008, 119(6): 286-291.[2]周庆,胡月,廖晓峰. 一类二值图像快速加密算法的压缩性能分析[J].电子与信息学报.2009, 31(8):2015-2018浏览[3]Cheng H and Li X. Partial encryption of compressed imagesand videos[J].IEEE Transactions on Signal Processing.2000,48(8):2439-2451[4]Bose R and Pathak S. A novel compression and encryptionscheme using variable model arithmetic coding and coupledchaotic system. IEEE Transactions on Circuits and SystemsI, 2006, 53(4): 848-857.[5]Podesser M, Schmidt H, and Uhl A. Selective bitplaneencryption for secure transmission of image data in mobileenvironments. Fifth IEEE Nordic signal processingsymposium, Tromso-Trondheim, Norway, 2002.[6]李昌刚,韩正之,张浩然. 一种基于随机密钥及类标准映射的图像加密算法. 计算机学报,2003, 26(4): 465-470.Li C G, Han Z Z, and Zhang H R. An image encryptionalgorithm based on random key and quasi-standard map.Chinese Journal of Computers, 2003, 26(4): 465-470.[7]Tong X J and Cui M G. Image encryption scheme based on3D baker with dynamical compound chaotic sequence ciphergenerator[J].Signal Processing.2009, 89(4):480-491[8]刘家胜,黄贤武,朱灿焰,吕皖丽. 基于m 序列变换和混沌映射的图像加密算法[J].电子与信息学报.2007, 29(6):1476-1479浏览[9]Maniccam S and Bourbakis N. Image and video encryptionusing SCAN patterns[J].Pattern Recognition.2004, 37(4):725-737[10]Chen G, Zhao X Y, and Li J L. A self-adaptive algorithm onimage encryption[J].Journal of Software.2005, 16(11):1975-1982[11]林秋华,党杰,殷福亮. 盲源分离图像加密的相关运算解密法.通信学报,2008, 29(1): 109-114.Lin Q H, Dang J, and Yin F L. Correlation calculationdecrypting for BSS-based image cryptosystem. Journal onCommunications, 2008, 29(1): 109-114.[12]Zhou Q, Wong K W, Liao X F, Xiang T, and Hu Y. Parallelimage encryption algorithm based on discretized chaotic map[J].Chaos, Solitons and Fractals.2008, 38(4):1081-1092[13]Li S, Li C, Lo K, and Chen G. Cryptanalyzing an encryptionscheme based on blind source separation[J].IEEE Transactionson Circuits and Systems.2008, 55(4):1055-1063
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (3659) PDF downloads(624) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return