{"title":"基于TD-RECS混沌系统的防止剪切攻击的数字图像加密算法","authors":"Qi-nan Liao","doi":"10.1109/NCIS.2011.88","DOIUrl":null,"url":null,"abstract":"In order to protect digital image's information and renew the image that is attacked by shearing, this paper presents a novel image encryption algorithm based on Tangent-Delay Ellipse Reflecting Cavity map System (TD-ERCS) chaos sequences. One of the TD-ERCS is used to shift the image's pixel position, another is used to alter the pixel value, so that the image will be scrambled and encrypted. While doing the decryption, a method, which is based on the neighboring pixels characteristic, is provided to recover the sheared image. Theoretical analysis and experimental results show that the algorithm has a large space of keys, a good encryption and decryption effects, a better security performance to statistical analysis and a strong ability against shearing.","PeriodicalId":215517,"journal":{"name":"2011 International Conference on Network Computing and Information Security","volume":"80 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"TD-RECS Chaotic System Based Digital Image Encryption Algorithm Protecting from Shearing Attack\",\"authors\":\"Qi-nan Liao\",\"doi\":\"10.1109/NCIS.2011.88\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In order to protect digital image's information and renew the image that is attacked by shearing, this paper presents a novel image encryption algorithm based on Tangent-Delay Ellipse Reflecting Cavity map System (TD-ERCS) chaos sequences. One of the TD-ERCS is used to shift the image's pixel position, another is used to alter the pixel value, so that the image will be scrambled and encrypted. While doing the decryption, a method, which is based on the neighboring pixels characteristic, is provided to recover the sheared image. Theoretical analysis and experimental results show that the algorithm has a large space of keys, a good encryption and decryption effects, a better security performance to statistical analysis and a strong ability against shearing.\",\"PeriodicalId\":215517,\"journal\":{\"name\":\"2011 International Conference on Network Computing and Information Security\",\"volume\":\"80 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-05-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2011 International Conference on Network Computing and Information Security\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/NCIS.2011.88\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 International Conference on Network Computing and Information Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NCIS.2011.88","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
TD-RECS Chaotic System Based Digital Image Encryption Algorithm Protecting from Shearing Attack
In order to protect digital image's information and renew the image that is attacked by shearing, this paper presents a novel image encryption algorithm based on Tangent-Delay Ellipse Reflecting Cavity map System (TD-ERCS) chaos sequences. One of the TD-ERCS is used to shift the image's pixel position, another is used to alter the pixel value, so that the image will be scrambled and encrypted. While doing the decryption, a method, which is based on the neighboring pixels characteristic, is provided to recover the sheared image. Theoretical analysis and experimental results show that the algorithm has a large space of keys, a good encryption and decryption effects, a better security performance to statistical analysis and a strong ability against shearing.