信息网络安全 ›› 2014, Vol. 14 ›› Issue (11): 18-25.doi: 10.3969/j.issn.1671-1122.2014.11.003

• • 上一篇    下一篇

基于遍历矩阵和混合密钥的验证和图像空域加密技术

周晓谊, 段玉聪, 冯文龙, 李益红()   

  1. 海南大学信息科学技术学院,海南海口 570228
  • 收稿日期:2014-09-23 出版日期:2014-11-01 发布日期:2020-05-18
  • 作者简介:

    作者简介:周晓谊(1979-),女,海南,副教授,博士,主要研究方向:密码、信息隐藏等;段玉聪(1977-),男,河南,教授,博士,主要研究方向:软件工程;冯文龙(1968-),男,贵州,副教授,硕士,主要研究方向:信息网络理论与技术;李益红(1979-),男,江西,副教授,博士研究生,主要研究方向:图像处理。

  • 基金资助:
    海南省自然科学基金[613152,614226].海南省教育厅课题[Hjkj2013-14]

Authentication and Image Spatial Encryption Based on Ergodic Matrix and Hybrid Key System

ZHOU Xiao-yi, DUAN Yu-cong, FENG Wen-long, LI Yi-hong()   

  1. College of Information Science & Technology, Hainan University, Haikou Hainan 570228, China
  • Received:2014-09-23 Online:2014-11-01 Published:2020-05-18

摘要:

由于图像与人感知外部世界的基本手段相吻合,因此相关的信息量有可能涉及到个人隐私、商业利益、军事机密等,所以多媒体信息的安全问题变得越来越重要。传统的加密系统,如RSA、DES、IDEA、SAFER和FEAL等,其加密速度慢而且不能有效去除相邻像素的相关性,不适合用于图像加密。经过二十多年研究的混沌加密系统具有良好的特性适合图像加密,但大部分是基于对称加密。对称加密比非对称加密速度更快,但是对于密钥的管理制约了其广泛的使用,为了弥补这一缺陷,文章提出混合密钥机制,不仅可用于图像加密,而且可用于验证。遍历矩阵在加/解密系统中不仅作为公开密钥存在,而且是图像置乱和扩散的关键参数。实验结果表明,与现有的混沌加密系统相比,文章提出的图像加密技术彻底置乱和扩散原始图像,并且拥有至少3.08×105898个密钥的巨大空间,因此足够抵制蛮力攻击。相比于现有的混沌密码系统,文章的实验测试结果更加乐观,在C语言下,置乱和扩散阶段的执行时间相当稳定(分别是1.9~2.0毫秒和2.0~2.1毫秒)。与Yang和Ismail所提出的算法相比,根据文章中的性能评估、敏感度分析和统计分析,文章所提出的算法具有更高的安全性,并且适用于网络传输。

关键词: 混合, 遍历矩阵, 图像加密, 置乱, 扩散

Abstract:

For human being, the basic means of the perceptions of the world and the image is consistent. Therefore, the relevant information may possibly related to personal privacy, commercial interests and military secrets, so the security of multimedia information becomes more and more important. Conventional encryption systems, such as RSA, DES, IDEA, SAFER and FEAL, are not suitable for image encryption. Because of its encryption speed is slow and can not effectively remove the correlation between adjacent pixels. The chaotic encryption systems which have been studied for over twenty years have good characteristics for image encryption, but most of the systems are based on a symmetric encryption. Symmetric encryption is faster than symmetric encryption, but the key management restricts its widespread applications. In order to remedy this defect, this paper proposes a hybrid-key mechanism. It’s not only can be used for image encryption, but also can be used in verification. Ergodic matrix in the encryption / decryption system is not only to generate a public key, but also is the key parameter of image confusion and diffusion. The experimental results show that compared with the existing chaotic encryption system, the proposed image encryption technology completely shuffles and change the pixel values of the original image. More than that, it has at least a huge space of 3.08 * 105898 keys, therefore it’s enough to resist the brute force attack. Compared with the existing chaotic cipher system, the experimental results in this paper are more optimistic: coded in the C language, confusion and diffusion stage of the execution time is quite stable (respectively is between 1.9 to 2 ms and 2 to 2.1 ms). Compared with the algorithms introduced by Yang and Ismail, the proposed algorithm, according to the performance evaluation the sensitivity analysis and statistical analysis, our proposed algorithm is more secure, and is suitable for network transmission.

Key words: hybrid, ergodic matrix, image encryption, confusion, diffusion

中图分类号: