首页 | 本学科首页   官方微博 | 高级检索  
     

基于混沌系统的量子彩色图像加密算法
引用本文:张健,霍达. 基于混沌系统的量子彩色图像加密算法[J]. 西南交通大学学报, 2019, 54(2): 421-427. DOI: 10.3969/j.issn.0258-2724.20170443
作者姓名:张健  霍达
作者单位:东北林业大学信息与计算机工程学院
基金项目:中央高校基本科研业务费专项资金资助项目(2572017CB35);哈尔滨市科技创新人才研究专项资金资助项目(2017RAQXJ098)
摘    要:为了提高图像安全性,将混沌系统引入到量子图像加密领域. 首先通过Chen混沌将图像按位异或;然后将彩色图像表示为量子的叠加态,通过Logistic混沌序列产生幺正矩阵对量子图像进行置乱;再次产生一个混沌序列对每个像素的红绿蓝三基色进行随机互换,达到对量子图像加密的目的;最后,在经典计算机上进行了模拟实验,结果表明加密后图像直方图更为平滑,像素平均分布在0~255范围内,图像相邻像素相关性低,加密图像红绿蓝像素相关系数平均值分别为0.001 6、0.001 7和0.003 8,并且密钥敏感性高,能有效抵抗穷举攻击和统计攻击,算法具有良好的有效性和可行性. 

关 键 词:混沌系统   图像加密   量子信息   量子算法
收稿时间:2017-06-06

Quantum Colour Image Encryption Algorithm Based on Chaotic Systems
ZHANG Jian,HUO Da. Quantum Colour Image Encryption Algorithm Based on Chaotic Systems[J]. Journal of Southwest Jiaotong University, 2019, 54(2): 421-427. DOI: 10.3969/j.issn.0258-2724.20170443
Authors:ZHANG Jian  HUO Da
Abstract:To enhance the security of image data, the incorporation of a chaotic system with quantum image encryption was proposed. Bitwise XOR operation was performed on a test image by applying the Chen chaotic system, and the obtained colour image was expressed as a quantum superposition state. The unitary matrix generated by the logistic chaotic sequence was then employed for scrambling the quantum image. In addition, to achieve the objective of quantum image encryption, another chaotic sequence was generated for randomly interchanging the red, green, and blue colour components of each pixel in the quantum image. Results obtained from simulation experiments conducted on a classical computer demonstrate that the grey histogram of the encrypted image is smooth, and the pixel intensity range is distributed uniformly between the values of 0 to 255. The correlation between adjacent pixels is found to be low, with the correlation coefficient values being 0.001 6, 0.001 7, and 0.003 8 for the red, green, and blue channels, respectively. Furthermore, the high key sensitivity of the proposed algorithm can effectively resist high intensity, exhaustive, and statistical attacks. Hence, the proposed algorithm can feasibly provide the required security for image data. 
Keywords:
本文献已被 CNKI 等数据库收录!
点击此处可从《西南交通大学学报》浏览原始摘要信息
点击此处可从《西南交通大学学报》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号