<listing id="l9bhj"><var id="l9bhj"></var></listing>
<var id="l9bhj"><strike id="l9bhj"></strike></var>
<menuitem id="l9bhj"></menuitem>
<cite id="l9bhj"><strike id="l9bhj"></strike></cite>
<cite id="l9bhj"><strike id="l9bhj"></strike></cite>
<var id="l9bhj"></var><cite id="l9bhj"><video id="l9bhj"></video></cite>
<menuitem id="l9bhj"></menuitem>
<cite id="l9bhj"><strike id="l9bhj"><listing id="l9bhj"></listing></strike></cite><cite id="l9bhj"><span id="l9bhj"><menuitem id="l9bhj"></menuitem></span></cite>
<var id="l9bhj"></var>
<var id="l9bhj"></var>
<var id="l9bhj"></var>
<var id="l9bhj"><strike id="l9bhj"></strike></var>
<ins id="l9bhj"><span id="l9bhj"></span></ins>
Volume 34 Issue 4
Jul.  2021
Turn off MathJax
Article Contents
XU Gang, ZHANG Ya-dong, ZHANG Xin-xiang, ZHANG Xiao-jian. Digital image encryption algorithm based on an alternating iterative chaotic system[J]. Chinese Journal of Engineering, 2012, 34(4): 464-470. doi: 10.13374/j.issn1001-053x.2012.04.015
Citation: XU Gang, ZHANG Ya-dong, ZHANG Xin-xiang, ZHANG Xiao-jian. Digital image encryption algorithm based on an alternating iterative chaotic system[J]. Chinese Journal of Engineering, 2012, 34(4): 464-470. doi: 10.13374/j.issn1001-053x.2012.04.015

Digital image encryption algorithm based on an alternating iterative chaotic system

doi: 10.13374/j.issn1001-053x.2012.04.015
  • Received Date: 2011-02-20
    Available Online: 2021-07-30
  • A block image encryption algorithm with a 256 bit key was designed based on a logistic map and a spatiotemporal chaotic system.The algorithm encrypts a block of original image into a block of cipher image with the same length of 256 bit.An auxiliary key brought in and iterations designed in the algorithm are sensitive to the original image and secret keys.An alternating iterative chaotic system and an Arnold map disturb pixel values and shuffle the positions of pixels.The results of computer simulation and cryptanalysis show that the algorithm is characteristic of excellent sensitivity to the original image and keys,large secret key space and high expansibility.The algorithm also has excellent effective encryption and strong anti-attacking performance.It is indicated that the algorithm is suitable for security communication.

     

  • loading
  • 加載中

Catalog

    通訊作者: 陳斌, bchen63@163.com
    • 1. 

      沈陽化工大學材料科學與工程學院 沈陽 110142

    1. 本站搜索
    2. 百度學術搜索
    3. 萬方數據庫搜索
    4. CNKI搜索
    Article views (196) PDF downloads(5) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return
    久色视频