基于混沌集的圖像加密算法
doi: 10.11999/JEIT190344
-
杭州電子科技大學(xué)電子信息學(xué)院 杭州 310018
An Image Encryption Algorithm Based on Chaos Set
-
School of Electronic Information, Hangzhou Dianzi University, Hangzhou 310018, China
-
摘要:
該文提出一種基于包含離散混沌系統(tǒng)、連續(xù)混沌系統(tǒng)的混沌系統(tǒng)集的混沌加密算法,該加密算法可以根據(jù)加密強(qiáng)度需求選擇不同的混沌系統(tǒng)組合,利用圖像像素的像素均值及像素坐標(biāo)值為參數(shù)控制混沌密鑰產(chǎn)生,增強(qiáng)混沌密鑰與明文數(shù)據(jù)之間的聯(lián)系。在加密基礎(chǔ)上,將密文按位切割成3個(gè)數(shù)據(jù)后偽裝隱藏在一個(gè)處理后的公開(kāi)圖像內(nèi),改變了密文外觀特性。通過(guò)對(duì)加密后的圖像進(jìn)行圖像直方圖分析、相鄰像素相關(guān)性分析及圖像信息熵分析,表明該加密算法有效,在圖像保密傳輸中具有應(yīng)用潛力。
-
關(guān)鍵詞:
- 混沌系統(tǒng) /
- 加密 /
- 圖像偽裝
Abstract:A novel image encryption algorithm is proposed based on a chaos set which consists of discrete chaotic systems and continuous chaotic systems. The chosen combination of chaotic system is dependent on the encryption intensity. The pixel mean value and pixel coordinate value of images are exploited to control the generation of key, thus enhancing the relationship between chaotic key and plain text. In addition, the octet of cipher text pixel is divided into three parts, and then hided into a processed public image, which can promote the external characteristics of cipher text. The image histogram analysis, correlation analysis, and information entropy analysis methods are adopted to identify the security performance, which indicates the effectiveness of the proposed image encryption algorithm and potential application in the image security transmission.
-
Key words:
- Chaos system /
- Encryption /
- Image hiding
-
表 1 數(shù)據(jù)隱藏方式
擴(kuò)展圖像像素值 攜帶密文圖像像素值 ${{{Q}}_{2{{i - 1,}}2{{j - 1}}}}$ ${{{Q}}_{2{{i - }}1, 2{{j - }}1}}$ ${{{Q}}_{2{{i - }}1, 2{{j}}}}$ ${Q_{2i - 1,2j}} + P_{1\;i,j}^2$ ${{{Q}}_{2{{i,}}2{{j - }}1}}$ ${Q_{2i,2j - 1}} + P_{3\;i,j}^2$ ${{{Q}}_{2{{i,}}2{{j}}}}$ ${Q_{2i - 1,2j}} + P_{2\;i,j}^2$ 下載: 導(dǎo)出CSV
表 2 圖像行列值控制選取混沌加密系統(tǒng)按行列產(chǎn)生密鑰
${\rm{mod}}\left( {i,8} \right){\simfont\text{或}}{\rm{mod}}\left( {j,8} \right)$ 1 2 3 4 5 6 7 0 選定的混沌系統(tǒng) Logistic Bernoulli Tent Hénon Chen Lorenz Lü Bao 下載: 導(dǎo)出CSV
-
?ZKAYNAK F. Brief review on application of nonlinear dynamics in image encryption[J]. Nonlinear Dynamics, 2018, 92(2): 305–313. doi: 10.1007/s11071-018-4056-x HUA Zhongyun, JIN Fan, XU Binxuan, et al. 2D logistic-sine-coupling map for image encryption[J]. Signal Processing, 2018, 149: 148–161. doi: 10.1016/j.sigpro.2018.03.010 劉冰. 基于改進(jìn)Logistic映射的二值序列置亂加密算法[J]. 西華師范大學(xué)學(xué)報(bào): 自然科學(xué)版, 2017, 38(3): 340–346. doi: 10.16246/j.issn.1673-5072.2017.03.020LIU Bing. A binary sequence scrambling encryption algorithm based on improved logistic mapping[J]. Journal of China West Normal University:Natural Sciences, 2017, 38(3): 340–346. doi: 10.16246/j.issn.1673-5072.2017.03.020 馬在光, 丘水生. 基于廣義貓映射的一種圖像加密系統(tǒng)[J]. 通信學(xué)報(bào), 2003, 24(2): 51–57. doi: 10.3321/j.issn:1000-436X.2003.02.007MA Zaiguang and QIU Shuisheng. An image cryptosystem based on general cat map[J]. Journal of Communications, 2003, 24(2): 51–57. doi: 10.3321/j.issn:1000-436X.2003.02.007 郭建勝, 金晨輝. 對(duì)基于廣義貓映射的一個(gè)圖像加密系統(tǒng)的已知圖像攻擊[J]. 通信學(xué)報(bào), 2005, 26(2): 131–135. doi: 10.3321/j.issn:1000-436X.2005.02.023GUO Jiansheng and JIN Chenhui. An attack with known image to an image cryptosystem based on general cat map[J]. Journal on Communications, 2005, 26(2): 131–135. doi: 10.3321/j.issn:1000-436X.2005.02.023 潘靈剛, 周千, 張蒙. 一種基于Logistic映射和Bernoulli移位映射的圖像加密算法[J]. 計(jì)算機(jī)與數(shù)字工程, 2016, 44(7): 1343–1345, 1382. doi: 10.3969/j.issn.1672-9722.2016.07.033PAN Linggang, ZHOU Qian, and ZHANG Meng. An image encryption algorithm based on Logistic map and Bernoulli shift map[J]. Computer &Digital Engineering, 2016, 44(7): 1343–1345, 1382. doi: 10.3969/j.issn.1672-9722.2016.07.033 趙建峰, 王淑英, 李險(xiǎn)峰, 等. 基于分?jǐn)?shù)階超混沌的新圖像加密算法[J]. 四川大學(xué)學(xué)報(bào): 自然科學(xué)版, 2014, 51(5): 958–964. doi: 10.3969/j.issn.0490-6756.2014.05.017ZHAO Jianfeng, WANG Shuying, LI Xianfeng, et al. New algorithm for image encryption based on fractional order chaotic system[J]. Journal of Sichuan University:Natural Science Edition, 2014, 51(5): 958–964. doi: 10.3969/j.issn.0490-6756.2014.05.017 李敬醫(yī), 陳炬樺. 基于3D混沌映射和細(xì)胞自動(dòng)機(jī)的圖像加密方案[J]. 計(jì)算機(jī)科學(xué), 2015, 42(7): 182–185, 203. doi: 10.11896/j.issn.1002-137X.2015.7.040LI Jingyi and CHEN Juhua. 3D chaos map and cellular automata based image encryption[J]. Computer Science, 2015, 42(7): 182–185, 203. doi: 10.11896/j.issn.1002-137X.2015.7.040 陳艷浩, 劉中艷, 周麗宴. 基于差異混合掩碼與混沌Gyrator變換的光學(xué)圖像加密算法[J]. 電子與信息學(xué)報(bào), 2019, 41(4): 888–895. doi: 10.11999/JEIT180456CHEN Yanhao, LIU Zhongyan, and ZHOU Liyan. Optical image encryption algorithm based on differential mixed mask and chaotic Gyrator transform[J]. Journal of Electronics &Information Technology, 2019, 41(4): 888–895. doi: 10.11999/JEIT180456 朱從旭, 胡玉平, 孫克輝. 基于超混沌系統(tǒng)和密文交錯(cuò)擴(kuò)散的圖像加密新算法[J]. 電子與信息學(xué)報(bào), 2012, 34(7): 1735–1743. doi: 10.3724/SP.J.1146.2011.01004ZHU Congxu, HU Yuping, and SUN Kehui. New image encryption algorithm based on hyperchaotic system and ciphertext diffusion in crisscross pattern[J]. Journal of Electronics &Information Technology, 2012, 34(7): 1735–1743. doi: 10.3724/SP.J.1146.2011.01004 鐘艷如, 劉華役, 孫希延, 等. 基于2D Chebyshev-Sine映射的圖像加密算法[J]. 浙江大學(xué)學(xué)報(bào): 理學(xué)版, 2019, 46(2): 131–141, 160. doi: 10.3785/j.issn.1008-9497.2019.02.001ZHONG Yanru, LIU Huayi, SUN Xiyan, et al. 2D Chebyshev-Sine map for image encryption[J]. Journal of Zhejiang University:Science Edition, 2019, 46(2): 131–141, 160. doi: 10.3785/j.issn.1008-9497.2019.02.001 SUN Jianglin, LIAO Xiaofeng, CHEN Xin, et al. Privacy-aware image encryption based on Logistic map and data hiding[J]. International Journal of Bifurcation and Chaos, 2017, 27(5): 1750073. doi: 10.1142/S0218127417500730 BAO Long and ZHOU Yicong. Image encryption: Generating visually meaningful encrypted images[J]. Information Sciences, 2015, 324: 197–207. doi: 10.1016/j.ins.2015.06.049 田小平, 田慧明, 吳成茂. 基于共享矩陣和混沌的圖像分存算法[J]. 西安郵電大學(xué)學(xué)報(bào), 2018, 23(2): 22–31. doi: 10.13682/j.issn.2095-6533.2018.02.005TIAN Xiaoping, TIAN Huiming, and WU Chengmao. Image sharing algorithm based on sharing matrix and chaos[J]. Journal of Xi’an University of Posts and Telecommunications, 2018, 23(2): 22–31. doi: 10.13682/j.issn.2095-6533.2018.02.005 CHEN Guanrong and UETA T. Yet another chaotic attractor[J]. International Journal of Bifurcation and Chaos, 1999, 9(6): 1465–1466. doi: 10.1142/S0218127499001024 LORENZ E N. Deterministic nonperiodic flow[J]. Journal of the Atmospheric Sciences, 1963, 20(2): 130–141. doi: 10.1175/1520-0469(1963)020<0130:DNF>2.0.CO;2 LIU Jinhu, and CHEN Guanrong. A new chaotic system and its generation[J]. International Journal of Bifurcation and Chaos, 2003, 13(1): 261–267. doi: 10.1142/s0218127403006509 BAO Bocheng, LIU Zhong, and XU Jianping. New chaotic system and its hyperchaos generation[J]. Journal of Systems Engineering and Electronics, 2009, 20(6): 1179–1187. LIN Zhuosheng, WANG Guangyi, WANG Xiaoyuan, et al. Security performance analysis of a chaotic stream cipher[J]. Nonlinear Dynamics, 2018, 94(2): 1003–1017. doi: 10.1007/s11071-018-4406-8 GAO Tiegang and CHEN Zengqiang. A new image encryption algorithm based on hyper-chaos[J]. Physics Letters A, 2008, 372(4): 394–400. doi: 10.1016/j.physleta.2007.07.040 -