|
|
Advanced Encryption Standard Image Encryption Algorithm Based on Hybrid Chaotic Model |
MI Zeng-zhen,ZHU Ge,ZHANG Hong-min,CONG Chao,CHENG Yao,YANG Qian |
School of Electronics Information and Automation, Chongqing University of Technology, Chongqing 400054, China |
|
|
Abstract In order to improve the safety performance of the image encryption algorithm, an advanced encryption standard encryption algorithm is proposed based on hybrid chaotic system. Logistic combined with Chebyshev chaotic sequence to produce two kinds of new chaotic sequences, the first hybrid chaotic matrix was used as the advanced encryption standard round keys for pixel scrambling and the another hybrid chaotic matrix is used as S-box for position scrambling. In addition, do shift row and mixcolumn operation will be shifted to change the pixel position and realize the dynamic transform key of advanced encryption standard image encryption. Experiment shows that the algorithm possesses the features of sensitive key dependence, good scrambling effect and efficiency.
|
Received: 15 May 2014
Published: 27 January 2016
|
|
|
|
|
[1]Fridrich J. Symmetric ciphers based on two-dimensional chaotic maps[J].International Journal of Bifurcation and Chaos,1998, 8(6): 1259-1284.
[2]Scharinger J. Fast encryption of image data using chaotic Kolmogorov flows[J].Journal of Electronic Imaging,1998, 7(2): 318-325.
[3]Bleichenbacher D. Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS# 1[C]//Advances in Cryptology—CRYPTO’98. Springer Berlin Heidelberg, 1998: 1-12.
[4]Coppersmith D. The Data Encryption Standard (DES) and its strength against attacks[J].IBM journal of research and development, 1994, 38(3): 243-250.
[5]Daemen J, Rijmen V. The Design of Rijndael: AES-The Advanced Encryption Standard (Information Security and Cryptography)[M].Berlin:Springer Science & Basiness Media, 2002.
[6]任晓霞 , 廖晓峰 , 熊永红. 基于细胞神经网络超混沌特性的图像加密新算法[J]. 计算机应用, 2011, (6):1528-1530/1535.
[7]陈在平, 蔡鹏飞, 董恩增. 基于超混沌AES图像加密算法[J]. 吉林大学学报(信息科学版), 2013, 31(2):158-164.
[8]朱和贵, 陆小军, 张祥德, 等. 基于二维 Logistic 映射和二次剩余的图像加密算法[J]. 东北大学学报 (自然科学版), 2014, 35(1): 20-23.
[9]Pareek N K, Patidar V, Sud K K. Image encryption using chaotic logistic map[J].Image and Vision Computing, 2006, 24(9): 926-934.
[10]Huang X. Image encryption algorithm using chaotic Chebyshev generator[J].Nonlinear Dynamics,2012, 67(4): 2411-2417.
[11]卜晓燕. 基于 AES 和 RSA 组合算法的软件加密系统的研究与应用[D]. 延安:延安大学, 2007.
[12]肖华勇, 李建辉, 边笛. 基于 AES 的 S 盒图像置乱算法研究[J]. 西北工业大学学报, 2008, 26(1): 74-78.
[13]米曾真,谢志江,袁晓东,等.大口径精密光学元件质量检测装置[J].计量学报,2012,33(3):1-5. |
|
|
|