Search

Article

x

留言板

尊敬的读者、作者、审稿人, 关于本刊的投稿、审稿、编辑和出版的任何问题, 您可以本页添加留言。我们将尽快给您答复。谢谢您的支持!

姓名
邮箱
手机号码
标题
留言内容
验证码

Color image degradation algorithms based on Z-matrix map and selective encryption

Zhao Liang Liao Xiao-Feng Xiang Tao Xiao Di

Color image degradation algorithms based on Z-matrix map and selective encryption

Zhao Liang, Liao Xiao-Feng, Xiang Tao, Xiao Di
PDF
Get Citation
  • With the development of information technology and network, multimedia protection has become a major concern, in which images are the important research objects. Especially, the image degradation is one of basic fields. This paper introduces a three-dimensional Z-matrix map which can be used for encryption, and shows its satisfactory property. Then, two color image degradation algorithms based on different templates for selective encryption are proposed. Finally, the performance and security of them are analyzed. Simulation results indicate the reliability of these schemes.
    • Funds:
    [1]

    [1]Zhang C T, Su Y T, Zhang J 2006 Digital Image Compression Code (Tsinghua University Press) p1 (in Chinese)[张春田、 苏育挺、 张静 2006 数字图像压缩编码(清华大学出版社)第1页]

    [2]

    [2]Chen G R, Mao Y B, Chui C K 2004 Chaos Soliton Fract. 21 749

    [3]

    [3]Guan Z H, Huang F J, Guan W J 2005 Phys. Lett. A 346 153

    [4]

    [4]Lian S G, Sun J S, Wang Z Q 2005 Chaos Soliton Fract. 26 117

    [5]

    [5]Sun F Y, Liu S T, Lü Z W 2007 Chin. Phys. 16 3616

    [6]

    [6]Zhang X H, Yang Y T 2007 Acta Electron. Sin. 1 34 (in Chinese)[张宪海、杨永田 2007 电子学报 1 34]

    [7]

    [7]Wu X Y, Liu H M, Huang J W 2007 Acta Auto. Sin. 2 145 (in Chinese)[吴晓云、 刘红梅、 黄继武 2007 自动化学报 2 145]

    [8]

    [8]Gao L J, Yang X P, Li Z L, Wang X L, Zhai H C, Wang M W. 2009 Acta Phys. Sin. 58 1053 (in Chinese)[高丽娟、杨晓苹、 李智磊、 王晓雷、 翟宏琛、 王明伟 2009 物理学报 58 1053]

    [9]

    [9]Raphael C W 2008 Phan. Pattern Recognition 41 3493

    [10]

    [10]Wang X Y, Xu Z H, Yang H Y 2009 Exper. Sy. Ap. 36 9056

    [11]

    [11]Droogenbroeck M V, Benedett R 2002 proceedings of ACIVS 2002 90

    [12]

    [12]Qi D X, Zou J C, Han X Y 2000 Sci. China E (China) 43 304

    [13]

    [13]Gu Q P 2002 J. Jianghan University(Natura1 Science) 19 28 (in Chinese)[辜青萍 2002 江汉大学学报(自然科学版) 19 28]

    [14]

    [14]Xing F C 2003 J. the CUN(Natural Sciences Edition) 12 207[邢富冲 2003 中央民族大学学报(自然科学版) 12 207]

    [15]

    [15]Zou J C, Tie X J 2001 J. North China University Technol. 1 10 (in Chinese)[邹建成、 铁小匀 2000 北方工业大学学报 1 10]

    [16]

    [16]Jiao H L, Chen G 2003 Journal of Software 14 864 (in Chinese)[焦华龙、 陈刚 2003 软件学报 14 864]

    [17]

    [17]Davis L S, Rosenfeld A 1978 IEEE Trans. Systems, Man and Cybernetics SMC-7 705710

    [18]

    [18]Lee J S 1980 IEEE Trans. on Pattern Analysis and Machine Intelligence 4 286

    [19]

    [19]Zhang Y W 1980 Wiener and Kalman Filtering Theory Introduction (Pearson Education Press) p1 (in Chinese)[张有为 1980 维纳与卡尔曼滤波理论导论(人民教育出版社) 第1页]

    [20]

    [20]Gonzalez R C, Woods R E 2002 Digital Image Processing(Second Edition) Pearson Education Asia. p88

    [21]

    [21]Qi X J, Qi J 2007 Signal Proc. 87 1264

  • [1]

    [1]Zhang C T, Su Y T, Zhang J 2006 Digital Image Compression Code (Tsinghua University Press) p1 (in Chinese)[张春田、 苏育挺、 张静 2006 数字图像压缩编码(清华大学出版社)第1页]

    [2]

    [2]Chen G R, Mao Y B, Chui C K 2004 Chaos Soliton Fract. 21 749

    [3]

    [3]Guan Z H, Huang F J, Guan W J 2005 Phys. Lett. A 346 153

    [4]

    [4]Lian S G, Sun J S, Wang Z Q 2005 Chaos Soliton Fract. 26 117

    [5]

    [5]Sun F Y, Liu S T, Lü Z W 2007 Chin. Phys. 16 3616

    [6]

    [6]Zhang X H, Yang Y T 2007 Acta Electron. Sin. 1 34 (in Chinese)[张宪海、杨永田 2007 电子学报 1 34]

    [7]

    [7]Wu X Y, Liu H M, Huang J W 2007 Acta Auto. Sin. 2 145 (in Chinese)[吴晓云、 刘红梅、 黄继武 2007 自动化学报 2 145]

    [8]

    [8]Gao L J, Yang X P, Li Z L, Wang X L, Zhai H C, Wang M W. 2009 Acta Phys. Sin. 58 1053 (in Chinese)[高丽娟、杨晓苹、 李智磊、 王晓雷、 翟宏琛、 王明伟 2009 物理学报 58 1053]

    [9]

    [9]Raphael C W 2008 Phan. Pattern Recognition 41 3493

    [10]

    [10]Wang X Y, Xu Z H, Yang H Y 2009 Exper. Sy. Ap. 36 9056

    [11]

    [11]Droogenbroeck M V, Benedett R 2002 proceedings of ACIVS 2002 90

    [12]

    [12]Qi D X, Zou J C, Han X Y 2000 Sci. China E (China) 43 304

    [13]

    [13]Gu Q P 2002 J. Jianghan University(Natura1 Science) 19 28 (in Chinese)[辜青萍 2002 江汉大学学报(自然科学版) 19 28]

    [14]

    [14]Xing F C 2003 J. the CUN(Natural Sciences Edition) 12 207[邢富冲 2003 中央民族大学学报(自然科学版) 12 207]

    [15]

    [15]Zou J C, Tie X J 2001 J. North China University Technol. 1 10 (in Chinese)[邹建成、 铁小匀 2000 北方工业大学学报 1 10]

    [16]

    [16]Jiao H L, Chen G 2003 Journal of Software 14 864 (in Chinese)[焦华龙、 陈刚 2003 软件学报 14 864]

    [17]

    [17]Davis L S, Rosenfeld A 1978 IEEE Trans. Systems, Man and Cybernetics SMC-7 705710

    [18]

    [18]Lee J S 1980 IEEE Trans. on Pattern Analysis and Machine Intelligence 4 286

    [19]

    [19]Zhang Y W 1980 Wiener and Kalman Filtering Theory Introduction (Pearson Education Press) p1 (in Chinese)[张有为 1980 维纳与卡尔曼滤波理论导论(人民教育出版社) 第1页]

    [20]

    [20]Gonzalez R C, Woods R E 2002 Digital Image Processing(Second Edition) Pearson Education Asia. p88

    [21]

    [21]Qi X J, Qi J 2007 Signal Proc. 87 1264

  • [1] Xiao Di, Xie Yi-Jun. A joint compression and encryption scheme for color JPEG image. Acta Physica Sinica, 2013, 62(24): 240508. doi: 10.7498/aps.62.240508
    [2] Xie Kun, Feng Zheng-Jin, Lei Min. A study of a kind of hyper chaotic cryptosystem security. Acta Physica Sinica, 2005, 54(3): 1267-1272. doi: 10.7498/aps.54.1267
    [3] Lin Shu-Qing, Jiang Ning, Wang Chao, Hu Shao-Hua, Li Gui-Lan, Xue Chen-Peng, Liu Yu-Qian, Qiu Kun. A three-dimensional encryption orthogonal frequency division multiplexing passive optical network based on dynamic chaos-iteration. Acta Physica Sinica, 2018, 67(2): 028401. doi: 10.7498/aps.67.20171246
    [4] Wang Xiao-Lai, Zhai Hong-Chen, Wang Ming-Wei, Yang Xiao-Ping, Gao Li-Juan. Single-channel encryption of color image based on double-phase encoding. Acta Physica Sinica, 2009, 58(3): 1662-1667. doi: 10.7498/aps.58.1662
    [5] Li Zhi-Lei, Wang Xiao-Lei, Zhai Hong-Chen, Wang Ming-Wei, Gao Li-Juan, Yang Xiao-Ping. A method of color image single-channel encryption. Acta Physica Sinica, 2009, 58(2): 1053-1056. doi: 10.7498/aps.58.1053
    [6] Xi Si-Xing, Yu Na-Na, Wang Xiao-Lei, Zhu Qiao-Fen, Dong Zhao, Wang Wei, Liu Xiu-Hong, Wang Hua-Ying. Color image encryption method based on computer generated hologram and θ modulation. Acta Physica Sinica, 2019, 68(11): 110502. doi: 10.7498/aps.68.20182264
    [7] Jin Jian-Xiu, Qiu Shui-Sheng. Cascaded image encryption systems based on physical chaos. Acta Physica Sinica, 2010, 59(2): 792-800. doi: 10.7498/aps.59.792
    [8] Wang Jing, Jiang Guo-Ping. Cryptanalysis of a hyper-chaotic image encryption algorithm and its improved version. Acta Physica Sinica, 2011, 60(6): 060503. doi: 10.7498/aps.60.060503
    [9] Zhu Cong-Xu, Sun Ke-Hui. Cryptanalysis and improvement of a class of hyperchaos based image encryption algorithms. Acta Physica Sinica, 2012, 61(12): 120503. doi: 10.7498/aps.61.120503
    [10] Shi Hang, Wang Li-Dan. Multi-process image encryption scheme based on compressed sensing and multi-dimensional chaotic system. Acta Physica Sinica, 2019, 68(20): 200501. doi: 10.7498/aps.68.20190553
  • Citation:
Metrics
  • Abstract views:  3652
  • PDF Downloads:  1499
  • Cited By: 0
Publishing process
  • Received Date:  08 April 2009
  • Accepted Date:  14 July 2009
  • Published Online:  15 March 2010

Color image degradation algorithms based on Z-matrix map and selective encryption

  • 1. 重庆大学计算机学院,重庆 400044

Abstract: With the development of information technology and network, multimedia protection has become a major concern, in which images are the important research objects. Especially, the image degradation is one of basic fields. This paper introduces a three-dimensional Z-matrix map which can be used for encryption, and shows its satisfactory property. Then, two color image degradation algorithms based on different templates for selective encryption are proposed. Finally, the performance and security of them are analyzed. Simulation results indicate the reliability of these schemes.

Reference (21)

Catalog

    /

    返回文章
    返回