广西师范大学学报(自然科学版) ›› 2019, Vol. 37 ›› Issue (3): 60-70.doi: 10.16088/j.issn.1001-6600.2019.03.007

• • 上一篇    下一篇

图像并行加密算法在手持设备上的应用研究

周戎龙,罗玉玲*,闭金杰,岑明灿,丘森辉,廖志贤   

  1. 广西师范大学电子工程学院,广西桂林541004
  • 出版日期:2019-07-12 发布日期:2019-07-12
  • 通讯作者: 罗玉玲(1984—),女,湖北武汉人,广西师范大学副教授。E-mail: yuling0616@mailbox.gxnu.edu.cn
  • 基金资助:
    国家自然科学基金(61603104);广西自然科学基金(2017GXNSFAA198180,2015GXNSFFBA139256,2016GX NSFCA380017);广西研究生教育创新计划项目(YCSZ2017005);广西无线宽带通信与信号处理重点实验室2017年主任基金

Applications of Image Parallel Encryption Algorithm in Handheld Devices

ZHOU Ronglong,LUO Yuling*,BI Jinjie,CEN Mingcan,QIU Senhui,LIAO Zhixian   

  1. College of Electronic Engineering, Guangxi Normal University, Guilin Guangxi 541004,China
  • Online:2019-07-12 Published:2019-07-12

摘要: 本文针对一些传统图像串行加密算法安全性能低、加密时间长的缺陷,提出一种新型的图像并行加密算法。首先,将明文图像的初始信息设定为并行量化方案的输入信号,生成量化小数;然后设计基于混沌系统的混沌置乱和扩散矩阵,通过混淆与扩散结构对图像数据进行并行加密;最后通过Metal并行框架在iOS手持设备的GPU上进行了算法的验证与实现。测试结果表明该方案能够有效提高图像加密效率,且具有高度的明文敏感性,适合于图像数据的安全实时通信,也为通过GPU并行处理图像数据提供了新的方案。

关键词: 图像信息安全, iOS手持设备, GPU, 安全性

Abstract: This paper proposes a new image parallel encryption algorithm aiming at the defects of some traditional image serial encryption algorithms, such as low security and long encryption time. First, the initial information of the plain image is set as an input signal of a parallel quantization scheme to generate a quantized decimal. Then the chaotic scrambling and diffusion matrix based on the chaotic system is designed, and the image data is encrypted in parallel by the confusion and diffusion structure. The algorithm is verified and implemented on the GPU of the iOS handheld device through the Metal parallel framework. The test results show that the scheme can effectively improves the image encryption efficiency, and has a high degree of sensitivity to the plaintext, which is suitable for the secure real-time communication of image data, and provides a new scheme for parallel processing of image data through the GPU.

Key words: image information security, iOS handheld devices, GPU, security

中图分类号: 

  • TP183
[1] CHEN Junxin,ZHU Ziliang,FU Chong,et al.An efficient image encryption scheme using lookup table-based confusion and diffusion[J].Nonlinear Dynamics,2015,81(3):1151-1166.DOI:10.1007/s11071-015-2057-6.
[2] WANG Xingyuan,ZHANG Huili.A color image encryption with heterogeneous bit-permutation and correlated chaos[J]. Optics Communications,2015,342:51-60.DOI:10.1016/j.optcom.2014.12.043.
[3] BLAKLEY G R,BOROSH I.Rivest-Shamir-Adleman public key cryptosystems do not always conceal messages[J]. Computers and Mathematics with Applications,1979,5(3):169-178.DOI:10.1016/0898-1221(79)90039-7.
[4] YE Guodong,HUANG Xiaoling,ZHANG L Y,et al.A self-cited pixel summation based image encryption algorithm[J]. Chinese Physics B,2017,26(1):010501.DOI:10.1088/1674-1056/26/1/010501.
[5] HUANG R,RHEE K H,UCHIDA S.A parallel image encryption method based on compressive sensing[J].Multimedia Tools and Applications,2014,72(1):71-93.DOI:10.1007/s11042-012-1337-0.
[6] ENAYATIFAR R,ABDULLAH A H,ISNIN I F.Chaos-based image encryption using a hybrid genetic algorithm and a DNA sequence[J].Optics and Lasers in Engineering,2014,56:83-93.DOI:10.1016/j.optlaseng.2013.12.003.
[7] WANG Xingyuan,LIU Chuanming,XU Dahai,et al.Image encryption scheme using chaos and simulated annealing algorithm[J].Nonlinear Dynamics,2016,84(3):1417-1429.DOI:10.1007/s11071-015-2579-y.
[8] XIE K,WU P,YANG S.GPU and CPU cooperation parallel visualisation for large seismic data[J].Electronics Letters, 2010,46(17):1196-1197.DOI:10.1049/el.2010.1242.
[9] LEE J,YI F,SAIFULLAH R,et al.Graphics processing unit-accelerated double random phase encoding for fast image encryption[J].Optical Engineering,2014,53(11):112308.DOI:10.1117/1.OE.53.11.112308.
[10]LUO Yuling,ZHOU Ronglong,LIU Junxiu,et al.An efficient and self-adapting colour-image encryption algorithm based on chaos and interactions among multiple layers[J].Multimedia Tools and Applications,2018,77(20):26191-26217.DOI: 10.1007/s11042-018-5844-5.
[11]LUO Yuling,ZHOU Ronglong,LIU Junxiu,et al.A novel image encryption scheme based on Kepler’s third law and random Hadamard transform[J].Chinese Physics B,2017,26(12):120504.DOI:10.1088/1674-1056/26/12/120504.
[12]SAIKUMAR N,KRISHNAN R B,MEGANATHAN S,et al.An encryption approach for security enhancement in images using key based partitioning technique[C]//2016 International Conference on Circuit,Power and Computing Technologies.Piscataway,NJ:IEEE Press,2016:1-4.DOI:10.1109/ICCPCT.2016.7530327.
[13]ZHOU Guomin,ZHANG Daxing,LIU Yanjian,et al.A novel image encryption algorithm based on chaos and Line map[J].Neurocomputing,2015,169:150-157.DOI:10.1016/j.neucom.2014.11.095.
[14]WANG Xingyuan,WANG Qian.A fast image encryption algorithm based on only blocks in cipher text[J].Chinese Physics B,2014,23(3):030503.DOI:10.1088/1674-1056/23/3/030503.
[15]WANG Xingyuan,ZHAO Jianfeng,LIU Hongjun.A new image encryption algorithm based on chaos[J].Optics Communications,2012,285(5):562-566.DOI:10.1016/j.optcom.2011.10.098.
[16]WU Jiahui,LIAO Xiaofeng,YANG Bo.Color image encryption based on chaotic systems and elliptic curve ElGamal scheme[J].Signal Processing,2017,141:109-124.DOI:10.1016/j.sigpro.2017.04.006.
[1] 覃章荣, 张超英, 丘滨, 李圆圆, 莫刘刘. 基于CUDA的格子Boltzmann数值模拟加速实现[J]. 广西师范大学学报(自然科学版), 2012, 30(4): 18-24.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] 孟春梅, 陆世银, 梁永红, 莫肖敏, 李卫东, 黄远洁, 成晓静, 苏志恒, 郑华. 岩黄连总碱诱导肝星状细胞凋亡和自噬的电镜实验研究[J]. 广西师范大学学报(自然科学版), 2018, 36(3): 76 -79 .
[2] 包金萍, 郑连斌, 宇克莉, 宋雪, 田金源, 董文静. 大凉山彝族成人皮褶厚度特征[J]. 广西师范大学学报(自然科学版), 2018, 36(3): 107 -112 .
[3] 林永生, 裴建国, 邹胜章, 杜毓超, 卢丽. 清江下游红层岩溶及其水化学特征[J]. 广西师范大学学报(自然科学版), 2018, 36(3): 113 -120 .
[4] 张茹, 张蓓, 任鸿瑞. 山西轩岗矿区耕地流失时空特征及其影响因子研究[J]. 广西师范大学学报(自然科学版), 2018, 36(3): 121 -132 .
[5] 李贤江, 石淑芹, 蔡为民, 曹玉青. 基于CA-Markov模型的天津滨海新区土地利用变化模拟[J]. 广西师范大学学报(自然科学版), 2018, 36(3): 133 -143 .
[6] 王梦飞, 黄松. 广西西江经济带的城市旅游经济空间关联研究[J]. 广西师范大学学报(自然科学版), 2018, 36(3): 144 -150 .
[7] 刘国伦, 宋树祥, 岑明灿, 李桂琴, 谢丽娜. 带宽可调带阻滤波器的设计[J]. 广西师范大学学报(自然科学版), 2018, 36(3): 1 -8 .
[8] 滕志军, 吕金玲, 郭力文, 许媛媛. 基于改进粒子群算法的无线传感器网络覆盖策略[J]. 广西师范大学学报(自然科学版), 2018, 36(3): 9 -16 .
[9] 刘铭, 张双全, 何禹德. 基于改进SOM神经网络的异网电信用户细分研究[J]. 广西师范大学学报(自然科学版), 2018, 36(3): 17 -24 .
[10] 黄开娇, 肖飞雁. 具有Beddington-DeAngelis型功能性反应的随机捕食—被捕食系统[J]. 广西师范大学学报(自然科学版), 2018, 36(3): 32 -40 .
版权所有 © 广西师范大学学报(自然科学版)编辑部
地址:广西桂林市三里店育才路15号 邮编:541004
电话:0773-5857325 E-mail: gxsdzkb@mailbox.gxnu.edu.cn
本系统由北京玛格泰克科技发展有限公司设计开发