Skip to main content
Top
Published in: Cluster Computing 3/2019

14-03-2018

Research on the application of LDPC code in chaotic sequence image encryption

Authors: Zhong-xun Wang, Yang Lou, Wen-qi Wang, Min Zhang, Xiao-lin Li

Published in: Cluster Computing | Special Issue 3/2019

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Low density parity check code (LDPC) is a linear block code whose performance is close to Shannon’s limit. Compared with other decoding algorithms, it has low decoding complexity and flexible structure. So it becomes people’s research hotspots. In recent years, LDPC code codec algorithm has been improved, and is widely used in deep space communications, optical fiber communications, mobile communications and underwater and other fields. Using chaotic sequence single-layer mapping plus pixel scrambling can complete chaotic image encryption, because some chaotic sequence is poor robust, in the process of channel transmission, it is difficult to ensure that the information can be destroyed after the attack In this paper, LDPC codes are introduced, and in the chaotic image encryption, block coding is used to form error protection to improve the stability of the image transmission process and improve the transmission quality.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Chaudhary, R., Singh, P., Agarwal, A.: A security solution for the transmission of confidential data and efficient file authentication based on DES, AES, DSS and RSA. Int. J. Innov. Technol. Explor. Eng. 1(3), 5–11 (2012) Chaudhary, R., Singh, P., Agarwal, A.: A security solution for the transmission of confidential data and efficient file authentication based on DES, AES, DSS and RSA. Int. J. Innov. Technol. Explor. Eng. 1(3), 5–11 (2012)
2.
go back to reference Mackay, D.J.C.: Good error-correcting codes based on very sparse matrices. IEEE Trans. Inform. Theory 45(2), 399–431 (1999)MathSciNetCrossRef Mackay, D.J.C.: Good error-correcting codes based on very sparse matrices. IEEE Trans. Inform. Theory 45(2), 399–431 (1999)MathSciNetCrossRef
3.
go back to reference Tang, T.: Application research of information hiding technology based on LDPC codes. Dissertation, Yantai University, Yantai (2015) Tang, T.: Application research of information hiding technology based on LDPC codes. Dissertation, Yantai University, Yantai (2015)
4.
go back to reference Moon, T.K.: Error Correction Coding: Mathematical Methods and Algorithms. Wiley-Interscience, New York (2005)CrossRef Moon, T.K.: Error Correction Coding: Mathematical Methods and Algorithms. Wiley-Interscience, New York (2005)CrossRef
5.
go back to reference Wang, H.X.: Research and improvement of LDPC coding algorithm. Dissertation, Beijing Jiaotong University, Beijing (2009). Wang, H.X.: Research and improvement of LDPC coding algorithm. Dissertation, Beijing Jiaotong University, Beijing (2009).
6.
go back to reference Ausloos, M., Dirickx, M.: The Logistic Map and the Route to Chaos, vol. 264, pp. 222–225. Springer, Berlin (2006) Ausloos, M., Dirickx, M.: The Logistic Map and the Route to Chaos, vol. 264, pp. 222–225. Springer, Berlin (2006)
7.
8.
go back to reference Xiao, H., Banihashemi, A.H.: Improved progressive-edge-growth (PEG) construction of irregular LDPC codes. Commun. Lett. IEEE 8(12), 715–717 (2004)CrossRef Xiao, H., Banihashemi, A.H.: Improved progressive-edge-growth (PEG) construction of irregular LDPC codes. Commun. Lett. IEEE 8(12), 715–717 (2004)CrossRef
9.
go back to reference Chen, Z.H.: Application of irregular LDPC code in digital watermarking. Comput. Eng. Appl. (2010) Chen, Z.H.: Application of irregular LDPC code in digital watermarking. Comput. Eng. Appl. (2010)
10.
go back to reference Shen, S.J., Shi-Feng, O.U., Wei, J., et al.: Study of digital image watermark application based on LDPC code technology. China Integr. Circ. (2016). Shen, S.J., Shi-Feng, O.U., Wei, J., et al.: Study of digital image watermark application based on LDPC code technology. China Integr. Circ. (2016).
11.
go back to reference Sibel, J.C., Reynal, S., Declercq, D.: Evidence of chaos in the belief propagation for LDPC codes. Proceedings 1, 3–18 (2013) Sibel, J.C., Reynal, S., Declercq, D.: Evidence of chaos in the belief propagation for LDPC codes. Proceedings 1, 3–18 (2013)
13.
go back to reference Dmitriev, A.A., Dmitriev, A.S., Andreyev, Y.V., et al.: Evaluation of the number of keys in a chaotic cryptographic method. Underst. Complex Syst. 3, 171–181 (2013)CrossRef Dmitriev, A.A., Dmitriev, A.S., Andreyev, Y.V., et al.: Evaluation of the number of keys in a chaotic cryptographic method. Underst. Complex Syst. 3, 171–181 (2013)CrossRef
14.
go back to reference Zhou, L.H., Feng, Z.J.: A new idea of using one-dimensional PWL map in digital secure communications-dual-resolution approach. IEEE Trans. Circ. Syst. II Analog Digit. Signal Process. 47(10), 1107–1111 (2005)CrossRef Zhou, L.H., Feng, Z.J.: A new idea of using one-dimensional PWL map in digital secure communications-dual-resolution approach. IEEE Trans. Circ. Syst. II Analog Digit. Signal Process. 47(10), 1107–1111 (2005)CrossRef
15.
go back to reference Xing, Y.W., Xiao, J.W.: Design of chaotic pseudo-random bit generator and its application in steram-cipher cryptogtaphy. Int. J. Modern Phys. C 19(05), 813–820 (2008)CrossRef Xing, Y.W., Xiao, J.W.: Design of chaotic pseudo-random bit generator and its application in steram-cipher cryptogtaphy. Int. J. Modern Phys. C 19(05), 813–820 (2008)CrossRef
16.
go back to reference Liu, Z., Xu, L., Liu, T., et al.: Color image encryption by using Arnold transform and color-blend operation in discrete cosine transform domains. Opt. Commun. 284(1), 123–128 (2011)CrossRef Liu, Z., Xu, L., Liu, T., et al.: Color image encryption by using Arnold transform and color-blend operation in discrete cosine transform domains. Opt. Commun. 284(1), 123–128 (2011)CrossRef
17.
go back to reference Liu, P.: Research on compilation algorithm of LDPC codes and its application in CMMB system. Dissertation, Jilin University, Changchun (2014) Liu, P.: Research on compilation algorithm of LDPC codes and its application in CMMB system. Dissertation, Jilin University, Changchun (2014)
18.
go back to reference Yang, X., Xu, Q., Zhuang, Y.: The application of chaos in sequence cipher system. J. Changzhou Inst. Technol. Z1, 43–45 (2013) Yang, X., Xu, Q., Zhuang, Y.: The application of chaos in sequence cipher system. J. Changzhou Inst. Technol. Z1, 43–45 (2013)
19.
go back to reference Sheng, L., Sun, K., Li, C.: Discrete chaotic system and its performance study of elliptical reflection cavity based on shear delay. J. Phys. 53(9), 2871–2876 (2004) Sheng, L., Sun, K., Li, C.: Discrete chaotic system and its performance study of elliptical reflection cavity based on shear delay. J. Phys. 53(9), 2871–2876 (2004)
20.
go back to reference Sun, K., Liu, W., Zhang, T.: The implementation of a chaotic encryption algorithm. Comput. Appl. 23(1), 15–17 (2003) Sun, K., Liu, W., Zhang, T.: The implementation of a chaotic encryption algorithm. Comput. Appl. 23(1), 15–17 (2003)
21.
go back to reference Chen, Z., Liang, Z.: Application of irregular LDPC codes in digital watermarking. Comput. Eng. Appl. 46(8), 103–105 (2010) Chen, Z., Liang, Z.: Application of irregular LDPC codes in digital watermarking. Comput. Eng. Appl. 46(8), 103–105 (2010)
Metadata
Title
Research on the application of LDPC code in chaotic sequence image encryption
Authors
Zhong-xun Wang
Yang Lou
Wen-qi Wang
Min Zhang
Xiao-lin Li
Publication date
14-03-2018
Publisher
Springer US
Published in
Cluster Computing / Issue Special Issue 3/2019
Print ISSN: 1386-7857
Electronic ISSN: 1573-7543
DOI
https://doi.org/10.1007/s10586-018-2134-y

Other articles of this Special Issue 3/2019

Cluster Computing 3/2019 Go to the issue

Premium Partner