Yuanyuan Sun, Rui Kong, Xing-yuan Wang, Lian-cheng Bi
{"title":"一种基于Mandelbrot集的图像加密算法","authors":"Yuanyuan Sun, Rui Kong, Xing-yuan Wang, Lian-cheng Bi","doi":"10.1109/IWCFTA.2010.70","DOIUrl":null,"url":null,"abstract":"As an important field in information security, image encryption algorithm has been a research focus. At the same time there are few works on fractal set as the encryption key among various encryption algorithms. In the paper, Mandelbrot set (abbreviated as M set) and the Hilbert transformation are utilized to generate the random key. Since M set can be iterated from only a few parameters, it can reduce the storage space greatly. In addition, the infinite boundaries of the M set and the Hilbert transformation enhance the randomness of the key. Experimental results show that even the slight disturbance of the parameters can change the key dramatically. Moreover, the algorithm needs small space for key storage and the real-time encryption can be achieved.","PeriodicalId":157339,"journal":{"name":"2010 International Workshop on Chaos-Fractal Theories and Applications","volume":"13 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"17","resultStr":"{\"title\":\"An Image Encryption Algorithm Utilizing Mandelbrot Set\",\"authors\":\"Yuanyuan Sun, Rui Kong, Xing-yuan Wang, Lian-cheng Bi\",\"doi\":\"10.1109/IWCFTA.2010.70\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"As an important field in information security, image encryption algorithm has been a research focus. At the same time there are few works on fractal set as the encryption key among various encryption algorithms. In the paper, Mandelbrot set (abbreviated as M set) and the Hilbert transformation are utilized to generate the random key. Since M set can be iterated from only a few parameters, it can reduce the storage space greatly. In addition, the infinite boundaries of the M set and the Hilbert transformation enhance the randomness of the key. Experimental results show that even the slight disturbance of the parameters can change the key dramatically. Moreover, the algorithm needs small space for key storage and the real-time encryption can be achieved.\",\"PeriodicalId\":157339,\"journal\":{\"name\":\"2010 International Workshop on Chaos-Fractal Theories and Applications\",\"volume\":\"13 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2010-10-29\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"17\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2010 International Workshop on Chaos-Fractal Theories and Applications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IWCFTA.2010.70\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 International Workshop on Chaos-Fractal Theories and Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IWCFTA.2010.70","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An Image Encryption Algorithm Utilizing Mandelbrot Set
As an important field in information security, image encryption algorithm has been a research focus. At the same time there are few works on fractal set as the encryption key among various encryption algorithms. In the paper, Mandelbrot set (abbreviated as M set) and the Hilbert transformation are utilized to generate the random key. Since M set can be iterated from only a few parameters, it can reduce the storage space greatly. In addition, the infinite boundaries of the M set and the Hilbert transformation enhance the randomness of the key. Experimental results show that even the slight disturbance of the parameters can change the key dramatically. Moreover, the algorithm needs small space for key storage and the real-time encryption can be achieved.