[1]李珊珊,周怡彤,张红丽,等.基于离散余弦变换的图像加密效果评估方法[J].计算机技术与发展,2020,30(05):99-102.[doi:10. 3969 / j. issn. 1673-629X. 2020. 05. 019]
 LI Shan-shan,ZHOU Yi-tong,ZHANG Hong-li,et al.A Novel Image Encryption Performance Evaluation Based on Discrete Cosine Transform[J].COMPUTER TECHNOLOGY AND DEVELOPMENT,2020,30(05):99-102.[doi:10. 3969 / j. issn. 1673-629X. 2020. 05. 019]
点击复制

基于离散余弦变换的图像加密效果评估方法()
分享到:

《计算机技术与发展》[ISSN:1006-6977/CN:61-1281/TN]

卷:
30
期数:
2020年05期
页码:
99-102
栏目:
安全与防范
出版日期:
2020-05-10

文章信息/Info

Title:
A Novel Image Encryption Performance Evaluation Based on Discrete Cosine Transform
文章编号:
1673-629X(2020)05-0099-04
作者:
李珊珊周怡彤张红丽孙伟阳
长安大学 信息工程学院,陕西 西安 710064
Author(s):
LI Shan-shanZHOU Yi-tongZHANG Hong-liSUN Wei-yang
School of Information Engineering,Chang’an University,Xi’an 710064,China
关键词:
离散余弦变换加密方法评估图像加密信息熵置乱度
Keywords:
discrete cosine transformencryption performance evaluationimage encryptionShannon entropyscrambling degree
分类号:
TP301
DOI:
10. 3969 / j. issn. 1673-629X. 2020. 05. 019
摘要:
不动点比,图像相似度等是传统的图像加密效果评估方法,传统方法具有局限性和不准确性。 文中提出一种基于离散余弦变换的图像加密效果评估方法,利用离散余弦变换(DCT) 把图像从时域变换到频域,同时分析图像的能量分布状况,以此评估图像的加密效果;计算明文图像和密文图像的频谱系数差值,用该差值构造差值系数矩阵,最后计算图像信息熵,通过熵值大小判断图像加密效果,得到新的图像加密效果评估方法。 通过不同图像加密方法对同一图像进行加密,用新方法进行加密评估;对同一图像分别采用新的加密评估方法与传统方法进行评估,比较评估结果准确性等实验,验证了新方法的有效性。 提出的加密评估方法改善了传统加密评估方法的局限性,提高了评估准确性,评估结果也与人眼观察效果基本一致。
Abstract:
Traditional image encryption performance evaluation methods,such as fixed point ratio and image similarity,have limitations and inaccuracy. A novel image encryption performance evaluation has been presented. The discrete cosine transform (DCT) is used to transform the image from time domain to frequency domain,and the energy distribution of the image is analyzed to evaluate the image encryption effect. The DCT coefficient difference between plain-text and cipher-text image is calculated to construct the difference coefficient matrix. Then the information entropy is employed to measure the encryption performance. The same image is encrypted by different image encryption methods,and the novel method is used for encryption evaluation. The effectiveness of the novel method is verified by comparing the accuracy of the new method with that of the traditional method. The proposed encryption evaluation method improves the limitation of the traditional encryption evaluation method and the accuracy of the evaluation,and the evaluation results are basically consistent with the observation effect of human eyes.

相似文献/References:

[1]吴柯.图像版权保护与认证的双水印算法[J].计算机技术与发展,2009,(09):136.
 WU Ke.Dual Watermarking Algorithm of Image Copyright Protection and Authentication[J].COMPUTER TECHNOLOGY AND DEVELOPMENT,2009,(05):136.
[2]张伟 陈新龙 詹斌.基于DCT的图像水印算法研究与实现[J].计算机技术与发展,2009,(09):157.
 ZHANG Wei,CHEN Xin-long,ZHAN Bin.Research and Implementation of Blind Watermarking Algorithm of Images Based on DCT[J].COMPUTER TECHNOLOGY AND DEVELOPMENT,2009,(05):157.
[3]鞠汶奇 肖创柏 邬鹏.基于超长指令字的定点DCT算法研究[J].计算机技术与发展,2008,(01):101.
 JU Wen-qi,XIAO Chuang-bai,WU Peng.Research of Fixed - Point DCT Algorithm Based on VLIW Architecture[J].COMPUTER TECHNOLOGY AND DEVELOPMENT,2008,(05):101.
[4]武杰 陶亮 王华彬 姜雪.基于DST的实值离散Gabor变换[J].计算机技术与发展,2008,(05):118.
 WU Jie,TAO Liang,WANG Hua-bin,et al.DST- Based Real- Valued Discrete Gabor Transform[J].COMPUTER TECHNOLOGY AND DEVELOPMENT,2008,(05):118.
[5]罗开仲 黄士坦 杨华民.DCT算法及其与小波编码在图像处理中的比较[J].计算机技术与发展,2006,(09):79.
 LUO Kai-zhong,HUANG Shi-tan,YANG Hua-min.DCT Arithmetic and Its Comparison with Wavelet Transform Coding in Image Manipulation[J].COMPUTER TECHNOLOGY AND DEVELOPMENT,2006,(05):79.
[6]谢丁峰 夏新军.数字视频录像机的研究与设计[J].计算机技术与发展,2010,(09):246.
 XIE Ding-feng,XIA Xin-jun.Research and Design of Digital Video Record[J].COMPUTER TECHNOLOGY AND DEVELOPMENT,2010,(05):246.
[7]陆鹏 汤进 罗斌.基于Windows Mobile平台图像认证系统设计实现[J].计算机技术与发展,2010,(11):87.
 LU Peng,TANG Jin,LUO Bin.Image Authentication System Design and Implementation Based on Windows Mobile[J].COMPUTER TECHNOLOGY AND DEVELOPMENT,2010,(05):87.
[8]谢丁峰 夏新军.基于H.264的视频监控系统关键代码实现与优化[J].计算机技术与发展,2010,(12):57.
 XIE Ding-feng,XIA Xin-jun.Implementation and Optimization on Critical Code of H.264-Based Video Surveillance System[J].COMPUTER TECHNOLOGY AND DEVELOPMENT,2010,(05):57.
[9]杜肖山 廖述剑.一种DWT与DCT相结合的图像水印算法[J].计算机技术与发展,2011,(01):147.
 DU Xiao-shan,LIAO Shu-jian.A Novel Image Watermarking Algorithm Based on DWT and DCT[J].COMPUTER TECHNOLOGY AND DEVELOPMENT,2011,(05):147.
[10]马媛媛 杨峰 信科 焦方超.基于DCT的JPEG图像压缩的研究[J].计算机技术与发展,2011,(08):133.
 MA Yuan-yuan,YANG Feng,XIN Ke,et al.Research of JPEG Image Compression Based on DCT[J].COMPUTER TECHNOLOGY AND DEVELOPMENT,2011,(05):133.

更新日期/Last Update: 2020-05-10