<listing id="l9bhj"><var id="l9bhj"></var></listing>
<var id="l9bhj"><strike id="l9bhj"></strike></var>
<menuitem id="l9bhj"></menuitem>
<cite id="l9bhj"><strike id="l9bhj"></strike></cite>
<cite id="l9bhj"><strike id="l9bhj"></strike></cite>
<var id="l9bhj"></var><cite id="l9bhj"><video id="l9bhj"></video></cite>
<menuitem id="l9bhj"></menuitem>
<cite id="l9bhj"><strike id="l9bhj"><listing id="l9bhj"></listing></strike></cite><cite id="l9bhj"><span id="l9bhj"><menuitem id="l9bhj"></menuitem></span></cite>
<var id="l9bhj"></var>
<var id="l9bhj"></var>
<var id="l9bhj"></var>
<var id="l9bhj"><strike id="l9bhj"></strike></var>
<ins id="l9bhj"><span id="l9bhj"></span></ins>
Volume 26 Issue 6
Aug.  2021
Turn off MathJax
Article Contents
WANG Ying, ZHENG Deling, JU Lei. Digital Image Encryption Algorithm Based on Three-Dimension Lorenz Chaos System[J]. Chinese Journal of Engineering, 2004, 26(6): 678-682. doi: 10.13374/j.issn1001-053x.2004.06.052
Citation: WANG Ying, ZHENG Deling, JU Lei. Digital Image Encryption Algorithm Based on Three-Dimension Lorenz Chaos System[J]. Chinese Journal of Engineering, 2004, 26(6): 678-682. doi: 10.13374/j.issn1001-053x.2004.06.052

Digital Image Encryption Algorithm Based on Three-Dimension Lorenz Chaos System

doi: 10.13374/j.issn1001-053x.2004.06.052
  • Received Date: 2004-01-05
    Available Online: 2021-08-17
  • The Lorenz chaos system was applied to the digital image encryption based on the thought of the higher secrecy of a three-dimension chaos system. Firstly, it carried out pretreatment to a real chaos sequence produced by the system. Secondly, the index matrix of pixel permutation was structured directly by this real chaos sequence. Finally, digital image encryption was realized in the space domain. The results of analysis and simulation show that pretreating the real chaos sequence has the stronger pseudo-random, the better autocorrelation and mutual correlation characteristic. Additionally, the bigger secret-key space of the three-dimension chaos system, the stronger the algorithm can be against decryption attack. Three outputs of the system not only can realize the parallel encryption of three or more images, but also increase the more encryption efficiency of the algorithm.

     

  • loading
  • 加載中

Catalog

    通訊作者: 陳斌, bchen63@163.com
    • 1. 

      沈陽化工大學材料科學與工程學院 沈陽 110142

    1. 本站搜索
    2. 百度學術搜索
    3. 萬方數據庫搜索
    4. CNKI搜索
    Article views (253) PDF downloads(18) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return
    久色视频