Full-Text Search:
Home|Journal Papers|About CNKI|User Service|FAQ|Contact Us|中文
《Journal of Southeast University (Natural Science Edition)》 2003-S1
Add to Favorite Get Latest Update

Applications of standard map and its 3-D extention in multimedia encryption

Lian Shiguo Wang Zhiquan (Department of Automation, Nanjing University of Science and Technology, Nanjing 210094, China)  
Based on the features of initial value sensitivity, parameter sensitivity, ergodicity and random similarity, chaotic maps are now widely used in information encryption. The encryption method combining discretized 2 D chaotic maps with spreading functions has faster encryption speed than traditional algorithms. Compared to Baker map and Cat map, Standard map has larger key space, which makes it more suitable for information encryption. In this paper, Standard map is extended to 3 D space and a multimedia encryption scheme based on it is proposed. What's more, the parameter sensitivity of Standard map is analyzed, and the methods to select suitable spreading function and loop times are also proposed. Experiments show that, the algorithm is of high security and is faster than DES, which makes it suitable for multimedia encryption such as image, video, multispectral image and so on.
【Fund】: 博士点基金资助项目 ( 2 0 0 2 0 2 880 2 5 );; 江苏省自然科学基金资助项目 (BK2 0 0 10 5 4)
【CateGory Index】: TP309.7
Download(CAJ format) Download(PDF format)
CAJViewer7.0 supports all the CNKI file formats; AdobeReader only supports the PDF format.
Chinese Journal Full-text Database 5 Hits
1 Wen Xiaodong Huang Ronghuai Hu Gang Ye Weiping Gi Duoying (Information Science College, Beijing Normal University, 100875, Beijing, China);AN ACTUALIZATION OF SPATIOTEMPORAL CHAOS CRYPTOGRAPHY SPEECH COMMUNICATION MEETING SYSTEM[J];Journal of Beijing Normal University(Natural Science);2005-02
2 GAO Jie1,2,YUAN Jia-bin2,XU Tao2,QI Yan-ke1(1.Department of Computer Science and Application,Zhengzhou Institute of Aeronautical Industry Management,Zhengzhou Henan 450015,China;2.College of Information Science and Technology,Nanjing University of Aeronautics and Astronautics,Nanjing Jiangsu 210016,China);New chaotic image encryption algorithm based on hybrid feedback[J];Journal of Computer Applications;2008-02
3 YIN De-hui(1,3), TANG Yan2, LI Bing-fa3(1. Department of Computer Science, Yibin University, Sichuan Yibin 644007, China;2. Sichuan Radio & TV University, Chengdu 610073, China;3. College of Computer Science, Sichuan University, Chengdu 610064, China);Study on Image Hashing Based on Hashingand Grey Degree Spreading Algorithm[J];Journal of Sichuan University (Natural Science Edition);2005-02
4 XIE Jianquan1, 2 (1Hunan Finance and Economics College, Changsha 410205, China; 2Information Engineering College, Central South University, Changsha 410083, China);A Survey of the Research on Multimedia Data Encryption[J];China Information Security;2007-02
5 LIU Jia-sheng1,2,HUANG Xian-wu1,ZHU Can-yan1,WANG Jia-jun1(1 School of Electronics & Information Engineering,Soochow University,Suzhou 215021,China)(2 School of Computer Science & Technology,Anhui University,Hefei 230039,China);Study on Image Encryption Algorithm Based on Modulo Map and Chaos Map[J];Microelectronics & Computer;2006-12
Chinese Journal Full-text Database 10 Hits
1 Qi Dongxu(CAD Research Center, North China Univ. of Tech, 100041, Beijing, China);Matrix Transformation and its Applications to Image Hiding[J];JOURNAL OF NORTH CHINA UNIVERSITY OF TECHNOLOGY;1999-01
2 Ding Wei 1) Yan Weiqi 1) Qi Dongxu 1,2) (1)CAD Laboratory, Institute of Computing Technology, Chinese Academy of Sciences,100080,Beijing 2)CAD Research Center, North China Univ. of Tech., 100041,Beijing, China);Digital Image Scrambling and Digital Watermarking Technology Based on Conway's Game[J];JOURNAL OF NORTH CHINA UNIVERSITY OF TECHNOLOGY;2000-01
3 Zou Jiancheng Tie Xiaoyun(College of Fund. Sci., North China Univ. of Tech., 100041, Beijing, China);Arnold Transformation of Digital Image with Two Dimensions and its Periodicity[J];JOURNAL OF NORTH CHINA UNIVERSITY OF TECHNOLOGY;2000-01
4 Yan Weiqi 1) Zou Jiancheng 2) Qi Dongxu 3) (1)Beijing Hanwang Group, 100080, Beijing,China 2)College of Fund. Sci., North China Univ. of Tech., 100041, Beijing, China 3)CAD Research Center, North China Univ. of Tech., 100041, Beijing,;A Novel Digital Image Scrambling Method[J];Journal of North China University of Technology;2002-01
5 Zou Jiancheng 1) Qi Dongxu 1,2) Xiong Changzhen 1) ( 1)College of Sciences, CAD Research Center, North China Univ. of Tech., 100041, Beijing, China, 2)Macau Univ. of Science and Technology);Digital Image Encryption Based on Baker Transformation[J];Journal of North China University of Technology;2003-01
6 Xiong Changzhen Zou Jiangcheng (CAD Center, North China Univ. of Tech. , 100041, Beijing, China);K-th System Baker Transformation and Its Application in Digital Image Encryption[J];Journal of North China University of Technology;2004-01
7 Li Nan Shang Yanhong Zou Jiancheng (CAD Research Center, North China Univ. of Tech., 100041 ,Beijing, China);An Audio Scrambling Method Based on Fibonacci Transformation[J];Journal of North China University of Technology;2004-03
8 Zhong Wenqi 1) Liu Xue 1) Shang Yanhong 1) Zou Jiancheng 2) (1)CAD Research Center, North China Univ. of Tech., 100041, Beijing, China 2) College of Basic Sciences, North China Univ. of Tech., 100041, Beijing, China);An Improved Method of Digital Image Encryption Based on DES[J];Journal of North China University of Technology;2005-01
9 WANG Ting, ZHENG Deling, JU LeiInformation Engineering School, University of Science and Technology Beijing, Beijing 100083, ChinaDepartment of Automation, College of Science and Technology Heilongjiang, Harbin 150027, China;Digital Image Encryption Algorithm Based on Three-Dimension Lorenz Chaos System[J];Journal of University of Science and Technology Beijing;2004-06
10 ZHENG Fan,TIAN Xiao-jian,FAN Wen-hua,LI Xue-yan,GAO Bo(College of Electronic Science and Engineering,Jilin University,Changchun 130012,China);Image Encryption Based on Henon Map[J];Journal of Beijing University of Posts and Telecommunications;2008-01
【Secondary References】
Chinese Journal Full-text Database 10 Hits
1 Xu Xiaoyun,Yu Simin,Xu Liguo(College of Automation,Guangdong University of Technology,Guangzhou 510006,China);Chaotic Digital Image Encryption and its Hardware Implementation Based on DSP Technology[J];Electronic Science and Technology;2011-03
2 WANG Haike (Journal of Zhengzhou University,Zhengzhou 450001,China);AES Encryption Algorithm Based on Chaotic Sequence[J];Journal of Henan Institute of Engineering(Natural Science Edition);2010-02
3 HU Rong,WANG Ling,LUO Zhu-wei College of Electrical and Information Engineering,Hunan University,Changsha 410082,China;Wavelet domain image encryption realization based on modulo[J];Computer Engineering and Applications;2009-08
4 ZHAO Liang,LIAO Xiao-feng,XIANG Tao,XIAO Di(College of Computer Science,Chongqing University,Chongqing 400044,China);Security and efficiency improvement for image encryption algorithm based on high-dimension chaotic system[J];Journal of Computer Applications;2009-07
5 XIAO Di1,2,ZHAO Qiu-le2(1.College of Computer,Chongqing University,Chongqing 400044,China;2.College of Mechanical Engineering,Chongqing University,Chongqing 400044,China);Cryptanalysis of an image scrambling algorithm based on Logistic chaotic sequence[J];Journal of Computer Applications;2010-07
6 LI En,WU Min,XIONG Yong-hua(School of Information Science & Engineering,Central South University,Changsha 410083,China);Design and application of encryption algorithm based on double chaos map[J];Application Research of Computers;2009-04
7 LI Meng-ting, ZHAO Ze-mao (College of Communication Engineering, Hangzhou Dianzi University, Hangzhou 310018, China);New method to generate chaotic pseudo-random sequence[J];Application Research of Computers;2011-01
8 Tian Liping (Department of Scientific, Shaoguan University, Shaoguan 512005, Guangdong, China);SECURITY COMMUNICATION OF TRUE-COLOR DIGITAL IMAGE BASED ON CHAOTIC MAPS[J];Computer Applications and Software;2007-05
9 CAO Guang-hui, E Xu, GU Xin-cai, QUAN Qiang (Electron & Information Engineering College, Liaoning University of Technology, Jinzhou 121001, China);Research on Image Encryption Algorithm in Time Domain[J];Journal of Liaoning University of Technology(Natural Science Edition);2009-06
10 LI Meng-ting,ZHAO Ze-mao(School of Communication Engineering,Hangzhou Dianzi University,Hangzhou 310018,China);A Pseudo-Random Sequence Generating Method Based on Linear Congruence Comparators and Chaotic Systems[J];Computer Engineering & Science;2011-08
China Proceedings of conference Full-text Database 3 Hits
1 Wang Zheng~1 Zhu Xing-dong~(1,2) Huang Kui~1 (1.Qingdao Branch of Naval Aeronautical Engineering Academy,Shandong,Qingdao,266041;) (2.The Academy of Armored Force Engineering,Beijing,100072);Encryption and Simulation for Digital Image Based on Chaotic Maps[A];[C];2008
2 Jun SHI1,Baoxu LIU2 1Technology Center,Beijing State Secrecy Bureau,Beijing,China 2Computering Center,Institute of High Energy Physics,Beijing,China;Research and Implementation of Data Transmission Scheme Based on Chaotic Secret Communication Technology[A];[C];2010
3 Xu E 1,2,Liangshan Shao2,Guanghui Cao 1,Yongchang Ren 3,Tao Qu 1 1Electronic & Information Engineering College,Liaoning University of Technology,Jinzhou 121001,P.R China 2School of Resources and Environment Engineering,Liaoning Technical University,Fuxin 123000,P.R.China 3College of Information Science and Engineering,Bohai University,Jinzhou 121013,China;A New Method of Information Encryption[A];[C];2009
©2006 Tsinghua Tongfang Knowledge Network Technology Co., Ltd.(Beijing)(TTKN) All rights reserved