DOI QR코드

DOI QR Code

Research on the Image Encryption Method using a Linear-structure Chaos System

선형구조 혼돈계를 이용한 이미지 암호와 방법 연구

  • 조창호 (배재대학교 물리융합 전기공학과) ;
  • 임거수 (배재대학교 물리융합 전기공학과)
  • Received : 2011.11.30
  • Accepted : 2011.12.08
  • Published : 2011.12.30

Abstract

With the rapid growth of digital communication and the internet, the importance of conducting research on data encryption methods is increasing. Some of the pertinent researches that have been conducted so far introduced data encryption methods using chaos systems, and numerous researches are currently being conducted on such methods. The signals produced by the chaos systems are called "determined noise," and if this is applied to data encryption, very effective results can be obtained. Using the Henon map, the relationship between the non-linearity of the chaos system and the strength of encryption was analyzed, and a linear-structure chaos system that uses non-linearity as a variable for encryption strength was constructed. Using the constructed chaos system, an image was encrypted and decoded, and the correlation coefficient of the linear-structure chaos system's performance was calculated and then analyzed.

Keywords

References

  1. J. -C. Yen and J. -I. Guo, "A New chaotic key-based design for image encryption and decryption," ISACS 2000, Vol 4, 2000.
  2. H. E. Ahmed, H. M. Kalash, and O. S. Farag Allah, "An Efficient Chaos-Based Feed backs Stream Cipher for Image Encryption and Decryption," Information, Vol. 31. 2007.
  3. F. Fu, Z. Zhang, Y. Chen, and X. Wang, "An Improved Chaos-Based Image Encryption Scheme," LNCS 4487, 2007.
  4. S. BanerJee, G. Ghosh, A. Ray and A. Roy Chowdhury, "Synchronization between two difference time-delayed systems and image encryption," EPL, Vol. 81, 2008.
  5. 문희태, "카오스와 비선형동역학", 서울대학교 출판부, 2007.
  6. 김명훈, "혼돈 진자의 동기화 분석," 서강대학교 대학원, 2000.
  7. 임거수, 김홍섭, "잡음으로 동기화된 혼돈신호를 이용한 이미지 암호화 방법," 한국컴퓨터정보학회논문집, 제13권, 제5호, 2008, pp. 155-162.
  8. 임거수, "다중변수 혼돈계를 이용한 이미지 암호화 방법의 설계 및 구현," 정보보안논문지, Vol.8, No. 3, 2008, pp. 57-64.
  9. 임거수, "혼돈신호에 따른 암호화 정도 분석," 한국정보기술학회 논문지, 제7권, 제6호, 2009. pp. 167-171.
  10. 김홍섭, 임거수, "혼돈신호의 동기화를 이용한 근거리 전자액자 설계," 한국컴퓨터정보학회논문집, 제16권, 제2호, 2011, pp. 201-206.
  11. 노시춘, "네트워크보안 인프라의 차단구조 설계방법," 디지털산업정보학회 논문지, 제2권, 제2호, 2006.
  12. 박영호, "352-비트 암호 알고리즘의 하드웨어 설계," 디지털산업정보학회 논문지, 제5권, 제1호, 2009.