期刊文献+

混沌权值变异的Huffman树图像加密算法 被引量:4

An Image Encryption Algorithm Using Chaos-based Weight Variation of Huffman Tree
在线阅读 下载PDF
导出
摘要 提出一种采用混沌权值变异的Huffman树的图像加密算法.此算法在熵编码过程中,以基本的Huffman树为标准,利用双耦合混沌序列1对DC系数进行树的结构未变异、路径值变异的加密;再利用双耦合混沌序列2对AC系数进行码字序号的加密.论文对算法进行了仿真,并对安全性、计算复杂度、压缩比性能进行了分析.实验结果表明,该算法基本上不影响压缩效率,且计算复杂度低、安全性高和实时性好,可用于网络上的图像服务. Using chaos-based weight variation of Huffman tree,an image/video encryption algorithm is proposed in this paper.In the process of the entropy coding,DC coefficients are encrypted by the weight variation of Huffman tree with the double Logistic chaos and AC coefficients are encrypted by the indexes of codeword.The security,complexity and compression ration of the algorithm are analyzed.Simulation results show that this algorithm has no impact on the compression efficiency and has low complexity、high security and good real-time property.Therefore,it is suitable for real-time image on the network.
作者 龙敏 谭丽
出处 《小型微型计算机系统》 CSCD 北大核心 2011年第12期2439-2443,共5页 Journal of Chinese Computer Systems
基金 国家自然科学基金项目(61001004)资助 湖南省教育厅青年项目(11B002)资助
关键词 图像加密算法 HUFFMAN树 JPEG 图像压缩 image encryption algorithm Huffman tree JPEG image compression
  • 相关文献

参考文献3

二级参考文献17

  • 1陈巧琳,廖晓峰,陈勇,周庆.改进的基于混沌序列的幻方变换图象加密[J].计算机工程与应用,2005,41(22):138-139. 被引量:17
  • 2张萌,刘忠信,孙青林,陈增强,袁著祉.基于混沌的视频压缩与加密方法研究[J].控制工程,2005,12(5):482-485. 被引量:4
  • 3Tang L.. Methods for encrypting an decrypting mpeg video data efficiently. In: Proceedings of ACM Multimedia'96, Boston United States, 1996, 219~229
  • 4Shi C.,Bhargava B.. An efficient MPEG video encryption algorithm. In: Proceedings of the 6th ACM International Multimedia Conference, Bristol, United Kingdom, 1998, 9: 381~386
  • 5Alattar A.M., Al-Regib G.I.. Improved selective encryption techniques for secure transmission of MPEG video bit-streams. In: Proceeding of ICIP, 1999, 4: 256~260
  • 6Wu Xiao-Ling, Moo Peter W.. Joint image/video compression and encryption via high-order conditional entropy coding of wavelet coefficient. In: Proceedings of IEEE International Conference on Multimedia Computing and Systems, Florence, Italy, 1999, 2: 908~912
  • 7Romeo, Romolotti G., Mattavelli M., Mlynek D.. Cryptosystem architectures for very high throughput multimedia encryption: The RPK solution. In: Proceedings of the 6th IEEE International Conference on Electronics, Circuits and Systems, Pafos, Cyprus, 1999, 261~264
  • 8Silva C.P.,Young A.M.. Introduction to chaos-based communications and signal processing. IEEE Proceedings of Aerospace, 2000, 1: 279~299
  • 9Robert Matthews. On the derivation of a "chaotic" encryption algorithm.Cryptologia. 1989, 8(1):29~41
  • 10Wheeler D.D., Matthews R.A.J. Supercomputer investigations of a chaotic encryption algorithm. Cryptologia, 1991, 15(2): 140~152

共引文献43

同被引文献31

  • 1林锋,黄可生,徐小杰,吴建培.LZW压缩算法在多通道高速数据采集系统中的实现[J].船舶工程,2011(S2):232-235. 被引量:2
  • 2SayoodK.IntroductiontoDataCompression[M].ThirdEdi-tion.北京:人民邮电出版社,2009.
  • 3Wang Aan, Zheng Xuexin, Wang Zongyue. Power analysis attacks and countermeasures on NTRU-based wireless body area networks [J]. KSII Trans on Internet and Information Systems, 2013, 7 (5) : 1094-1107.
  • 4Li Chunta, I.ee Chengchi, Weng Chiyao, et al. An extended multi- server-based user authentication and key agreement scheme with user anonymity [ J]. KSII Trans on Internet and Information Systems,2013, 7(1): 119-131.
  • 5Ullah S, Imran M, Alnuem M. A hybrid and secure priority-guaran- teed MAC protocol for wireless body area network [ J ]. International Journal of Distributed Sensor Networks, 2014, 29 (24) : 1257- 1253.
  • 6Saleem S, Ullah S, Kwak K S. A study of IEEE 802.15. 4 security framework for wireless body area networks [ J ]. Sensors, 2011, 11 (2) : 1383-1395.
  • 7Rezvani S S, Ghorashi A. A novel WBAN MAC protocol with im- proved energy consumption and data rate [ J ]. KSII Trans on Inter- net and Information Systems, 2012, 6(9) : 2302-2322.
  • 8Liu Qin, Wang Guojun, Wu Jie. Time-based proxy re-encryption scheme for secure data sharing in a cloud environment [J]. Informa- tion Sciences, 2014, 258(19):355-370.
  • 9Li Ming, Lou Wenjing, Ren Kui. Data security and privacy in wire- less body area networks [ J]. Wireless Communications, 2010, 17 (1) : 51-58.
  • 10Chen Min. NDNC-BAN: supporting rich media healthcare services via named data networking in cloud-assisted wireless body area net- works [J]. Information Sciences, 2014, 28(4) : 142-156.

引证文献4

二级引证文献23

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部