| 引用本文: | 李豪杰1,2,李 梦1,2,许晓曾1.结合 Logistic 映射和直方图特征引导的非对称加密算法设计(J/M/D/N,J:杂志,M:书,D:论文,N:报纸).期刊名称,2026,43(1):39-46 |
| CHEN X. Adap tive slidingmode contr ol for discrete2ti me multi2inputmulti2 out put systems[ J ]. Aut omatica, 2006, 42(6): 4272-435 |
|
| 摘要: |
| :目的 针对传统图像加密算法运算量大、速度慢且需要设计大量密钥的问题,提出结合 Logistic 映射和直方
图特征引导的非对称加密方案。 方法 在加密过程中提取直方图的峰值点和谷值点作为加密私钥,并利用 Logistic
映射生成两个混沌序列,分别指导图像像素的灰度加密和置乱加密。 灰度加密的同时进行了像素的向后扩散;置
乱加密时,先根据尺寸密钥对图像进行分块处理,然后将每个块的内部像素进行水平或垂直平移。 结果 对多张灰
度图像和彩色图像进行加密和解密测试,并从各种经典攻击角度验证方案的安全性,发现该方案对图像内容加密
效果良好,并完整保留了图像的质量和视觉效果。 此外,相比于其他对比算法,用该方案加密后的图像熵值更接近
8。 结论 该方案通过引入非线性混沌运算,并利用图像自身信息作为密钥,在实现简易运算的同时,不仅增加了加
密算法的复杂性,也使得私钥在加密过程就完成了自动设计,避免了人为设计私钥的过程,显著提高了加密效率。
关键词:图像加密;混沌序列;Logistic 映射;直方图特征 |
| 关键词: 图像加密 混沌序列 Logistic 映射 直方图特征 |
| DOI: |
| 分类号: |
| 基金项目: |
|
| Design of Asymmetric Encryption Algorithm Combining Logistic Mapping and Histogram Feature Guidance |
|
LI Haojie1 2, LI Meng1 2, XU Xiaozeng1
|
|
1. School of Mathematics and Statistics Chongqing Technology and Business University Chongqing 400067 China
2. Chongqing Key Laboratory of Statistical Intelligent Computing and Monitoring Chongqing 400067 China
|
| Abstract: |
| Objective To address the issues of high computational complexity slow speed and the requirement for a large
number of keys in traditional image encryption algorithms an asymmetric encryption scheme guided by the combination of
Logistic mapping and histogram features is proposed. Methods During the encryption process peak and valley points
from the image histogram were extracted to serve as private keys. Two chaotic sequences were generated using Logistic
mapping to guide the grayscale encryption and scrambling encryption of image pixels respectively. Pixel backward
diffusion was performed concurrently with the grayscale encryption. During scrambling encryption the image was first
divided into blocks according to the size key and then the internal pixels of each block were translated horizontally or
vertically. Results Encryption and decryption tests were carried out on multiple grayscale and color images. The security
of the scheme was verified from various classic attack perspectives. It was found that the scheme had a good encryption
effect on image content and fully preserved the quality and visual effects of the images. Additionally compared with other
comparison algorithms the entropy value of the images encrypted by this scheme was closer to 8. Conclusion By
incorporating nonlinear chaotic operations and utilizing the image?? s inherent information as keys this scheme not only simplifies the computational process and increases the complexity of the encryption algorithm but also automates the
private key design during encryption thereby eliminating the need for manual key design. This approach significantly
enhances encryption efficiency. |
| Key words: image encryption chaotic sequence Logistic mapping histogram feature |