结合 Logistic 映射和直方图特征引导的非对称加密算法设计
DOI:
作者:
作者单位:

作者简介:

通讯作者:

基金项目:


Design of Asymmetric Encryption Algorithm Combining Logistic Mapping and Histogram Feature Guidance
Author:
Affiliation:

Fund Project:

  • 摘要
  • |
  • 图/表
  • |
  • 访问统计
  • |
  • 参考文献
  • |
  • 相似文献
  • |
  • 引证文献
  • |
  • 资源附件
    摘要:

    :目的 针对传统图像加密算法运算量大、速度慢且需要设计大量密钥的问题,提出结合 Logistic 映射和直方 图特征引导的非对称加密方案。 方法 在加密过程中提取直方图的峰值点和谷值点作为加密私钥,并利用 Logistic 映射生成两个混沌序列,分别指导图像像素的灰度加密和置乱加密。 灰度加密的同时进行了像素的向后扩散;置 乱加密时,先根据尺寸密钥对图像进行分块处理,然后将每个块的内部像素进行水平或垂直平移。 结果 对多张灰 度图像和彩色图像进行加密和解密测试,并从各种经典攻击角度验证方案的安全性,发现该方案对图像内容加密 效果良好,并完整保留了图像的质量和视觉效果。 此外,相比于其他对比算法,用该方案加密后的图像熵值更接近 8。 结论 该方案通过引入非线性混沌运算,并利用图像自身信息作为密钥,在实现简易运算的同时,不仅增加了加 密算法的复杂性,也使得私钥在加密过程就完成了自动设计,避免了人为设计私钥的过程,显著提高了加密效率。 关键词:图像加密;混沌序列;Logistic 映射;直方图特征

    Abstract:

    Objective To address the issues of high computational complexity slow speed and the requirement for a large number of keys in traditional image encryption algorithms an asymmetric encryption scheme guided by the combination of Logistic mapping and histogram features is proposed. Methods During the encryption process peak and valley points from the image histogram were extracted to serve as private keys. Two chaotic sequences were generated using Logistic mapping to guide the grayscale encryption and scrambling encryption of image pixels respectively. Pixel backward diffusion was performed concurrently with the grayscale encryption. During scrambling encryption the image was first divided into blocks according to the size key and then the internal pixels of each block were translated horizontally or vertically. Results Encryption and decryption tests were carried out on multiple grayscale and color images. The security of the scheme was verified from various classic attack perspectives. It was found that the scheme had a good encryption effect on image content and fully preserved the quality and visual effects of the images. Additionally compared with other comparison algorithms the entropy value of the images encrypted by this scheme was closer to 8. Conclusion By incorporating nonlinear chaotic operations and utilizing the image?? s inherent information as keys this scheme not only simplifies the computational process and increases the complexity of the encryption algorithm but also automates the private key design during encryption thereby eliminating the need for manual key design. This approach significantly enhances encryption efficiency.

    参考文献
    相似文献
    引证文献
引用本文

李豪杰,李 梦,许晓曾.结合 Logistic 映射和直方图特征引导的非对称加密算法设计[J].重庆工商大学学报(自然科学版),2026,43(1):39-46
LI Haojie, LI Meng, XU Xiaozeng. Design of Asymmetric Encryption Algorithm Combining Logistic Mapping and Histogram Feature Guidance[J]. Journal of Chongqing Technology and Business University(Natural Science Edition),2026,43(1):39-46

复制
分享
文章指标
  • 点击次数:
  • 下载次数:
历史
  • 收稿日期:
  • 最后修改日期:
  • 录用日期:
  • 在线发布日期: 2026-03-09
×
2025年《中国学术期刊影响因子年报》发布