Jiancheng Zou, Changzhen Xiong, Dongxu Qi, R. Ward
{"title":"混沌映射在图像加密中的应用","authors":"Jiancheng Zou, Changzhen Xiong, Dongxu Qi, R. Ward","doi":"10.1109/NEWCAS.2005.1496703","DOIUrl":null,"url":null,"abstract":"A new encryption algorithm based on chaotic map without transcendental knowledge of orbit distributing is proposed. The algorithm reduces iterative number and makes full use of chaotic property of map. The segmentation mechanism of 2D generalized baker transformation is used to enhance the key space and security of algorithm. The security analysis of the algorithm is given. The experiments show that the algorithm has the characteristic of sensitive to initial condition, high key space and pixel distributing uniformity.","PeriodicalId":131387,"journal":{"name":"The 3rd International IEEE-NEWCAS Conference, 2005.","volume":"128 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2005-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"19","resultStr":"{\"title\":\"The application of chaotic maps in image encryption\",\"authors\":\"Jiancheng Zou, Changzhen Xiong, Dongxu Qi, R. Ward\",\"doi\":\"10.1109/NEWCAS.2005.1496703\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"A new encryption algorithm based on chaotic map without transcendental knowledge of orbit distributing is proposed. The algorithm reduces iterative number and makes full use of chaotic property of map. The segmentation mechanism of 2D generalized baker transformation is used to enhance the key space and security of algorithm. The security analysis of the algorithm is given. The experiments show that the algorithm has the characteristic of sensitive to initial condition, high key space and pixel distributing uniformity.\",\"PeriodicalId\":131387,\"journal\":{\"name\":\"The 3rd International IEEE-NEWCAS Conference, 2005.\",\"volume\":\"128 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2005-06-19\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"19\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"The 3rd International IEEE-NEWCAS Conference, 2005.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/NEWCAS.2005.1496703\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"The 3rd International IEEE-NEWCAS Conference, 2005.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NEWCAS.2005.1496703","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The application of chaotic maps in image encryption
A new encryption algorithm based on chaotic map without transcendental knowledge of orbit distributing is proposed. The algorithm reduces iterative number and makes full use of chaotic property of map. The segmentation mechanism of 2D generalized baker transformation is used to enhance the key space and security of algorithm. The security analysis of the algorithm is given. The experiments show that the algorithm has the characteristic of sensitive to initial condition, high key space and pixel distributing uniformity.