文件名称:zishiyingjiami
介绍说明--下载内容均来自于网络,请自行研究使用
为了提高图像加密算法的鲁棒性,提出了一种新的自适应图像加密算法。首先,把任意大小的灰度或彩
色图像分成2 × 2 子块 然后,用左上角子块的像素灰度值和Chebyshev 混沌映射构造与右上角子块等大的矩阵,用该
矩阵对右上角子块进行像素灰度值替换 最后,按顺时针对每个子块进行加密,直到左上角子块加密完毕。该算法不
依赖于图像的大小,而且适用于灰度图像和彩色图像,因而有很强的鲁棒性。同时灰度值扩散机制的引入使得该算
法具有良好的扩散性和扰乱性。-This paper presented a new self-adaptive image encryption algorithm so as to improve its robustness. Under
this algorithm, a gray image or color image was divided into 2 × 2 size blocks. A corresponding size of matrix in the top right
corner was created by the pixel gray-scale value of the top left corner under Chebyshev mapping. The gray-scale value of the
top right corner block was then replaced by the matrix created before. The remaining blocks were encrypted in the same
manner in clockwise until the top left corner block was finally encrypted. This algorithm is not restricted to the size of image
and it is suitable to gray images and color images, which leads to better robustness. Meanwhile, the introduction of gray-scale
value diffusion system equips this algorithm with powerful function of diffusion and disturbance.
色图像分成2 × 2 子块 然后,用左上角子块的像素灰度值和Chebyshev 混沌映射构造与右上角子块等大的矩阵,用该
矩阵对右上角子块进行像素灰度值替换 最后,按顺时针对每个子块进行加密,直到左上角子块加密完毕。该算法不
依赖于图像的大小,而且适用于灰度图像和彩色图像,因而有很强的鲁棒性。同时灰度值扩散机制的引入使得该算
法具有良好的扩散性和扰乱性。-This paper presented a new self-adaptive image encryption algorithm so as to improve its robustness. Under
this algorithm, a gray image or color image was divided into 2 × 2 size blocks. A corresponding size of matrix in the top right
corner was created by the pixel gray-scale value of the top left corner under Chebyshev mapping. The gray-scale value of the
top right corner block was then replaced by the matrix created before. The remaining blocks were encrypted in the same
manner in clockwise until the top left corner block was finally encrypted. This algorithm is not restricted to the size of image
and it is suitable to gray images and color images, which leads to better robustness. Meanwhile, the introduction of gray-scale
value diffusion system equips this algorithm with powerful function of diffusion and disturbance.
(系统自动生成,下载前可以参看下载内容)
下载文件列表
自适应加密\AA.m
..........\AAA.asv
..........\AAA.m
..........\AAde.m
..........\AAmain.asv
..........\AAmain.m
..........\ABCDmain.asv
..........\ABCDmain.m
..........\ACmain.asv
..........\ACmain.m
..........\ad.asv
..........\ad.m
..........\Amain.asv
..........\BB.m
..........\BBB.m
..........\BBde.m
..........\Bmain.m
..........\CC.m
..........\CCC.asv
..........\CCC.m
..........\CCde.m
..........\ccoef.m
..........\clock.asv
..........\DD.m
..........\DDD.asv
..........\DDD.m
..........\DDde.asv
..........\DDde.m
..........\declock.asv
..........\DTU.m
..........\DTUJ.m
..........\FDC.asv
..........\FDC.m
..........\HDU.m
..........\HDUJ.m
..........\HUD.m
..........\HUDJ.m
..........\LDTRU.m
..........\LDTRUJ.m
..........\LLR.m
..........\LLRJ.m
..........\LLRRL.asv
..........\LLRRL.m
..........\LRL.m
..........\LRLJ.m
..........\LRRLL.asv
..........\LRRLL.m
..........\LTR.m
..........\LTRJ.m
..........\LUTRD.m
..........\LUTRDJ.m
..........\per.m
..........\ps.m
..........\randPair.m
..........\RDTLU.m
..........\RDTLUJ.m
..........\RKK.m
..........\RTL.m
..........\RTLJ.m
..........\RUTLD.m
..........\RUTLDJ.m
..........\SC.m
..........\testPair.asv
..........\testPair.m
..........\testper.m
..........\UTD.m
..........\UTDJ.m
..........\vper.m
自适应加密