-
With the development of information technology and network, multimedia protection has become a major concern, in which images are the important research objects. Especially, the image degradation is one of basic fields. This paper introduces a three-dimensional Z-matrix map which can be used for encryption, and shows its satisfactory property. Then, two color image degradation algorithms based on different templates for selective encryption are proposed. Finally, the performance and security of them are analyzed. Simulation results indicate the reliability of these schemes.
-
Keywords:
- Z-matrix /
- selective encryption /
- chaotic encryption /
- color image degradation
[1] [1]Zhang C T, Su Y T, Zhang J 2006 Digital Image Compression Code (Tsinghua University Press) p1 (in Chinese)[张春田、 苏育挺、 张静 2006 数字图像压缩编码(清华大学出版社)第1页]
[2] [2]Chen G R, Mao Y B, Chui C K 2004 Chaos Soliton Fract. 21 749
[3] [3]Guan Z H, Huang F J, Guan W J 2005 Phys. Lett. A 346 153
[4] [4]Lian S G, Sun J S, Wang Z Q 2005 Chaos Soliton Fract. 26 117
[5] [5]Sun F Y, Liu S T, Lü Z W 2007 Chin. Phys. 16 3616
[6] [6]Zhang X H, Yang Y T 2007 Acta Electron. Sin. 1 34 (in Chinese)[张宪海、杨永田 2007 电子学报 1 34]
[7] [7]Wu X Y, Liu H M, Huang J W 2007 Acta Auto. Sin. 2 145 (in Chinese)[吴晓云、 刘红梅、 黄继武 2007 自动化学报 2 145]
[8] [8]Gao L J, Yang X P, Li Z L, Wang X L, Zhai H C, Wang M W. 2009 Acta Phys. Sin. 58 1053 (in Chinese)[高丽娟、杨晓苹、 李智磊、 王晓雷、 翟宏琛、 王明伟 2009 58 1053]
[9] [9]Raphael C W 2008 Phan. Pattern Recognition 41 3493
[10] [10]Wang X Y, Xu Z H, Yang H Y 2009 Exper. Sy. Ap. 36 9056
[11] [11]Droogenbroeck M V, Benedett R 2002 proceedings of ACIVS 2002 90
[12] [12]Qi D X, Zou J C, Han X Y 2000 Sci. China E (China) 43 304
[13] [13]Gu Q P 2002 J. Jianghan University(Natura1 Science) 19 28 (in Chinese)[辜青萍 2002 江汉大学学报(自然科学版) 19 28]
[14] [14]Xing F C 2003 J. the CUN(Natural Sciences Edition) 12 207[邢富冲 2003 中央民族大学学报(自然科学版) 12 207]
[15] [15]Zou J C, Tie X J 2001 J. North China University Technol. 1 10 (in Chinese)[邹建成、 铁小匀 2000 北方工业大学学报 1 10]
[16] [16]Jiao H L, Chen G 2003 Journal of Software 14 864 (in Chinese)[焦华龙、 陈刚 2003 软件学报 14 864]
[17] [17]Davis L S, Rosenfeld A 1978 IEEE Trans. Systems, Man and Cybernetics SMC-7 705710
[18] [18]Lee J S 1980 IEEE Trans. on Pattern Analysis and Machine Intelligence 4 286
[19] [19]Zhang Y W 1980 Wiener and Kalman Filtering Theory Introduction (Pearson Education Press) p1 (in Chinese)[张有为 1980 维纳与卡尔曼滤波理论导论(人民教育出版社) 第1页]
[20] [20]Gonzalez R C, Woods R E 2002 Digital Image Processing(Second Edition) Pearson Education Asia. p88
[21] [21]Qi X J, Qi J 2007 Signal Proc. 87 1264
-
[1] [1]Zhang C T, Su Y T, Zhang J 2006 Digital Image Compression Code (Tsinghua University Press) p1 (in Chinese)[张春田、 苏育挺、 张静 2006 数字图像压缩编码(清华大学出版社)第1页]
[2] [2]Chen G R, Mao Y B, Chui C K 2004 Chaos Soliton Fract. 21 749
[3] [3]Guan Z H, Huang F J, Guan W J 2005 Phys. Lett. A 346 153
[4] [4]Lian S G, Sun J S, Wang Z Q 2005 Chaos Soliton Fract. 26 117
[5] [5]Sun F Y, Liu S T, Lü Z W 2007 Chin. Phys. 16 3616
[6] [6]Zhang X H, Yang Y T 2007 Acta Electron. Sin. 1 34 (in Chinese)[张宪海、杨永田 2007 电子学报 1 34]
[7] [7]Wu X Y, Liu H M, Huang J W 2007 Acta Auto. Sin. 2 145 (in Chinese)[吴晓云、 刘红梅、 黄继武 2007 自动化学报 2 145]
[8] [8]Gao L J, Yang X P, Li Z L, Wang X L, Zhai H C, Wang M W. 2009 Acta Phys. Sin. 58 1053 (in Chinese)[高丽娟、杨晓苹、 李智磊、 王晓雷、 翟宏琛、 王明伟 2009 58 1053]
[9] [9]Raphael C W 2008 Phan. Pattern Recognition 41 3493
[10] [10]Wang X Y, Xu Z H, Yang H Y 2009 Exper. Sy. Ap. 36 9056
[11] [11]Droogenbroeck M V, Benedett R 2002 proceedings of ACIVS 2002 90
[12] [12]Qi D X, Zou J C, Han X Y 2000 Sci. China E (China) 43 304
[13] [13]Gu Q P 2002 J. Jianghan University(Natura1 Science) 19 28 (in Chinese)[辜青萍 2002 江汉大学学报(自然科学版) 19 28]
[14] [14]Xing F C 2003 J. the CUN(Natural Sciences Edition) 12 207[邢富冲 2003 中央民族大学学报(自然科学版) 12 207]
[15] [15]Zou J C, Tie X J 2001 J. North China University Technol. 1 10 (in Chinese)[邹建成、 铁小匀 2000 北方工业大学学报 1 10]
[16] [16]Jiao H L, Chen G 2003 Journal of Software 14 864 (in Chinese)[焦华龙、 陈刚 2003 软件学报 14 864]
[17] [17]Davis L S, Rosenfeld A 1978 IEEE Trans. Systems, Man and Cybernetics SMC-7 705710
[18] [18]Lee J S 1980 IEEE Trans. on Pattern Analysis and Machine Intelligence 4 286
[19] [19]Zhang Y W 1980 Wiener and Kalman Filtering Theory Introduction (Pearson Education Press) p1 (in Chinese)[张有为 1980 维纳与卡尔曼滤波理论导论(人民教育出版社) 第1页]
[20] [20]Gonzalez R C, Woods R E 2002 Digital Image Processing(Second Edition) Pearson Education Asia. p88
[21] [21]Qi X J, Qi J 2007 Signal Proc. 87 1264
计量
- 文章访问数: 9427
- PDF下载量: 1530
- 被引次数: 0