一级黄色片免费播放|中国黄色视频播放片|日本三级a|可以直接考播黄片影视免费一级毛片

高級(jí)搜索

留言板

尊敬的讀者、作者、審稿人, 關(guān)于本刊的投稿、審稿、編輯和出版的任何問(wèn)題, 您可以本頁(yè)添加留言。我們將盡快給您答復(fù)。謝謝您的支持!

姓名
郵箱
手機(jī)號(hào)碼
標(biāo)題
留言內(nèi)容
驗(yàn)證碼

基于混沌理論與DNA動(dòng)態(tài)編碼的衛(wèi)星圖像加密算法

肖嵩 陳哲 楊亞濤 馬英杰 楊騰

肖嵩, 陳哲, 楊亞濤, 馬英杰, 楊騰. 基于混沌理論與DNA動(dòng)態(tài)編碼的衛(wèi)星圖像加密算法[J]. 電子與信息學(xué)報(bào), 2024, 46(3): 1128-1137. doi: 10.11999/JEIT230203
引用本文: 肖嵩, 陳哲, 楊亞濤, 馬英杰, 楊騰. 基于混沌理論與DNA動(dòng)態(tài)編碼的衛(wèi)星圖像加密算法[J]. 電子與信息學(xué)報(bào), 2024, 46(3): 1128-1137. doi: 10.11999/JEIT230203
XIAO Song, CHEN Zhe, YANG Yatao, MA Yingjie, YANG Teng. Satellite Image Encryption Algorithm Based on Chaos Theory and DNA Dynamic Coding[J]. Journal of Electronics & Information Technology, 2024, 46(3): 1128-1137. doi: 10.11999/JEIT230203
Citation: XIAO Song, CHEN Zhe, YANG Yatao, MA Yingjie, YANG Teng. Satellite Image Encryption Algorithm Based on Chaos Theory and DNA Dynamic Coding[J]. Journal of Electronics & Information Technology, 2024, 46(3): 1128-1137. doi: 10.11999/JEIT230203

基于混沌理論與DNA動(dòng)態(tài)編碼的衛(wèi)星圖像加密算法

doi: 10.11999/JEIT230203
基金項(xiàng)目: 國(guó)家自然科學(xué)基金(62101414, 62201423),北京市自然科學(xué)基金(4232034),中國(guó)博士后科學(xué)基金(2021M702546, 2021M702548),中國(guó)博士后科學(xué)基金(2022T150508),西安市科協(xié)青年人才基金(095920221320),廣東省基礎(chǔ)與應(yīng)用基礎(chǔ)研究基金(2020A1515110856)
詳細(xì)信息
    作者簡(jiǎn)介:

    肖嵩:女,教授,研究方向?yàn)槎嗝襟w網(wǎng)絡(luò)通信、人工智能安全

    陳哲:男,碩士生,研究方向?yàn)檫b感信息安全

    楊亞濤:男,教授,研究方向?yàn)樾畔踩?、密碼系統(tǒng)與應(yīng)用、密碼協(xié)議和算法設(shè)計(jì)

    馬英杰:女,副教授,研究方向?yàn)榛煦绫C芡ㄐ?/p>

    楊騰:男,博士生,研究方向?yàn)檫b感圖像處理

    通訊作者:

    肖嵩 xiaosong@mail.xidian.edu.cn

  • 中圖分類號(hào): TN918.4; TP751.1

Satellite Image Encryption Algorithm Based on Chaos Theory and DNA Dynamic Coding

Funds: The National Natural Science Foundation of China(62101414, 62201423), Beijing Municipal Natural Science Foundation (4232034), The China Postdoctoral Science Foundation (2021M702546, 2021M702548), The China Postdoctoral Science Special Foundation (2022T150508), The Young Talent Fund of Xi'an Association for Science and Technology (095920221320), The Guangdong Basic and Applied Basic Research Foundation (2020A1515110856)
  • 摘要: 針對(duì)衛(wèi)星圖像在傳輸、存儲(chǔ)過(guò)程中涉及的信息安全問(wèn)題,該文提出一種新型的基于混沌理論與DNA動(dòng)態(tài)編碼的衛(wèi)星圖像加密算法。首先,提出一種改進(jìn)型無(wú)限折疊混沌映射,拓寬了原有無(wú)限折疊混沌映射的混沌區(qū)間。之后,結(jié)合改進(jìn)型Chebyshev混沌映射與SHA-256哈希算法,生成加密算法的密鑰流,提升算法的明文敏感性。然后,利用混沌系統(tǒng)的狀態(tài)值對(duì)Hilbert局部置亂后的像素進(jìn)行DNA編碼,實(shí)現(xiàn)DNA動(dòng)態(tài)編碼,解決了DNA編碼規(guī)則較少所帶來(lái)的容易受到暴力攻擊的弱點(diǎn)。最后,使用混沌序列完成進(jìn)一步混沌加密,從而徹底混淆原始像素信息,增加加密算法的隨機(jī)性與復(fù)雜性,得到密文圖像。實(shí)驗(yàn)結(jié)果表明,該算法具有較好的加密效果和應(yīng)對(duì)各種攻擊的能力。
  • 圖  1  分岔圖與功率譜

    圖  2  李雅普諾夫指數(shù)比較與譜熵復(fù)雜度比較

    圖  3  加密算法過(guò)程圖

    圖  4  部分衛(wèi)星圖像加密結(jié)果與直方圖信息

    圖  5  明文圖像與密文圖像在水平、垂直、對(duì)角線方向上的相鄰像素分布

    圖  6  受到不同程度裁剪攻擊的密文圖像的解密效果

    圖  7  密鑰敏感性分析

    表  1  本文算法與部分?jǐn)?shù)字圖像加密算法分析對(duì)比

    算法NPCR(%)UACI(%)信息熵密鑰空間水平方向垂直方向對(duì)角線方向
    本文算法99.610 933.468 17.997 62562–0.016 80.008 10.000 2
    文獻(xiàn)[27]99.611 933.487 47.997 922560.007 40.006 70.001 2
    文獻(xiàn)[28]99.582 733.479 17.996 722560.004 90.003 70.008 9
    文獻(xiàn)[29]99.609 633.457 47.997 322220.001 90.001 20.000 9
    下載: 導(dǎo)出CSV

    表  2  本文算法與部分衛(wèi)星圖像加密算法分析對(duì)比

    算法NPCR(%)UACI(%)信息熵密鑰空間水平方向垂直方向對(duì)角線方向
    本文算法99.608 733.462 37.997 725620.002 7–0.001 6–0.004 0
    文獻(xiàn)[2]99.608 433.457 37.997 523580.005 20.006 50.004 6
    文獻(xiàn)[3]99.620 133.486 37.997 122840.006 1–0.007 10.001 4
    下載: 導(dǎo)出CSV

    表  3  相關(guān)系數(shù)分析

    衛(wèi)星圖像明文圖像密文圖像
    水平方向垂直方向對(duì)角線方向水平方向垂直方向對(duì)角線方向
    Shidao0.990 20.987 60.977 10.019 7–0.004 8–0.003 5
    Qingdao0.986 10.989 90.974 10.010 4–0.010 8–0.016 5
    下載: 導(dǎo)出CSV

    表  4  信息熵分析

    衛(wèi)星圖像明文圖像信息熵密文圖像信息熵
    Qingdao7.106 47.999 3
    Xi'an近紅外波段6.447 77.996 9
    下載: 導(dǎo)出CSV

    表  5  視覺(jué)與無(wú)損分析

    測(cè)試圖像PSNRSSIMPSNRSSIM
    Lena8.561 10.008 91
    Shidao7.471 40.007 41
    Qingdao8.517 90.009 41
    下載: 導(dǎo)出CSV
  • [1] LIU Zhanqiang, WANG Licheng, WANG Xianmin, et al. Secure remote sensing image registration based on compressed sensing in cloud setting[J]. IEEE Access, 2019, 7: 36516–36526. doi: 10.1109/ACCESS.2019.2903826.
    [2] NAIM M, ALI PACHA A, and SERIEF C. A novel satellite image encryption algorithm based on hyperchaotic systems and Josephus problem[J]. Advances in Space Research, 2021, 67(7): 2077–2103. doi: 10.1016/j.asr.2021.01.018.
    [3] BENTOUTOU Y, BENSIKADDOUR E H, TALEB N, et al. An improved image encryption algorithm for satellite applications[J]. Advances in Space Research, 2020, 66(1): 176–192. doi: 10.1016/j.asr.2019.09.027.
    [4] CHEN Junxin, ZHU Zhiliang, FU Chong, et al. An efficient image encryption scheme using lookup table-based confusion and diffusion[J]. Nonlinear Dynamics, 2015, 81(3): 1151–1166. doi: 10.1007/s11071-015-2057-6.
    [5] HU Guiqiang, XIAO Di, WANG Yong, et al. Cryptanalysis of a chaotic image cipher using Latin square-based confusion and diffusion[J]. Nonlinear Dynamics, 2017, 88(2): 1305–1316. doi: 10.1007/s11071-016-3311-2.
    [6] MONDAL B, KUMAR P, and SINGH S. A chaotic permutation and diffusion based image encryption algorithm for secure communications[J]. Multimedia Tools and Applications, 2018, 77(23): 31177–31198. doi: 10.1007/s11042-018-6214-z.
    [7] LI Ming, ZHOU Kanglei, REN Hua, et al. Cryptanalysis of permutation–diffusion-based lightweight chaotic image encryption scheme using CPA[J]. Applied Sciences, 2019, 9(3): 494. doi: 10.3390/app9030494.
    [8] DAWAHDEH Z E, YAAKOB S N, and AZIF BIN OTHMAN R. A new image encryption technique combining elliptic curve cryptosystem with hill cipher[J]. Journal of King Saud University - Computer and Information Sciences, 2018, 30(3): 349–355. doi: 10.1016/j.jksuci.2017.06.004.
    [9] LONE P N, SINGH D, STOFFOVá V, et al. Cryptanalysis and improved image encryption scheme using elliptic curve and affine hill cipher[J]. Mathematics, 2022, 10(20): 3878. doi: 10.3390/math10203878.
    [10] ANDONO P N and SETIADI D R I M. Improved pixel and bit confusion-diffusion based on mixed chaos and hash operation for image encryption[J]. IEEE Access, 2022, 10: 115143–115156. doi: 10.1109/ACCESS.2022.3218886.
    [11] KHAIRULLAH M K, ALKAHTANI A A, BAHARUDDIN M Z B, et al. Designing 1D chaotic maps for fast chaotic image encryption[J]. Electronics, 2021, 10(17): 2116. doi: 10.3390/electronics10172116.
    [12] JIANG Donghua, LIU Lidong, ZHU Liya, et al. Adaptive embedding: A novel meaningful image encryption scheme based on parallel compressive sensing and slant transform[J]. Signal Processing, 2021, 188: 108220. doi: 10.1016/j.sigpro.2021.108220.
    [13] ZHANG Xuncai, WANG Lingfei, ZHOU Zheng, et al. A chaos-based image encryption technique utilizing Hilbert curves and H-fractals[J]. IEEE Access, 2019, 7: 74734–74746. doi: 10.1109/ACCESS.2019.2921309.
    [14] SUN Junwei, MA Yongxing, WANG Zicheng, et al. Dynamic analysis and cryptographic application of a 5D hyperbolic memristor-coupled neuron[J]. Nonlinear Dynamics, 2023, 111(9): 8751–8769. doi: 10.1007/s11071-023-08237-9.
    [15] 徐錫統(tǒng), 陳圣波, 于巖. 結(jié)合小波包變換與混沌神經(jīng)元的遙感圖像加密[J]. 遙感信息, 2021, 36(4): 76–83. doi: 10.3969/j.issn.1000-3177.2021.04.011.

    XU Xitong, CHEN Shengbo, and YU Yan. Remote sensing image encryption combining wavelet packet transform and chaotic neuron[J]. Remote Sensing Information, 2021, 36(4): 76–83. doi: 10.3969/j.issn.1000-3177.2021.04.011.
    [16] WANG Xingyuan, WANG Yu, ZHU Xiaoqiang, et al. Image encryption scheme based on chaos and DNA plane operations[J]. Multimedia Tools and Applications, 2019, 78(18): 26111–26128. doi: 10.1007/s11042-019-07794-9.
    [17] YILDIRIM M. DNA encoding for RGB image encryption with memristor based neuron model and chaos phenomenon[J]. Microelectronics Journal, 2020, 104: 104878. doi: 10.1016/j.mejo.2020.104878.
    [18] LI Xiang, WANG Leyuan, YAN Yinfa, et al. An improvement color image encryption algorithm based on DNA operations and real and complex chaotic systems[J]. Optik, 2016, 127(5): 2558–2565. doi: 10.1016/j.ijleo.2015.11.221.
    [19] CHAI Xiuli, CHEN Yiran, and BROYDE L. A novel chaos-based image encryption algorithm using DNA sequence operations[J]. Optics and Lasers in Engineering, 2017, 88: 197–213. doi: 10.1016/j.optlaseng.2016.08.009.
    [20] WANG Leimin, JIANG Shan, GE Mingfeng, et al. Finite-/fixed-time synchronization of memristor chaotic systems and image encryption application[J]. IEEE Transactions on Circuits and Systems I:Regular Papers, 2021, 68(12): 4957–4969. doi: 10.1109/TCSI.2021.3121555.
    [21] WU Jiahui, LIAO Xiaofeng, and YANG Bo. Image encryption using 2D Hénon-Sine map and DNA approach[J]. Signal Processing, 2018, 153: 11–23. doi: 10.1016/j.sigpro.2018.06.008.
    [22] WU Chenyang, SUN Kehui, and XIAO Yan. A hyperchaotic map with multi-elliptic cavities based on modulation and coupling[J]. The European Physical Journal Special Topics, 2021, 230(7): 2011–2020. doi: 10.1140/epjs/s11734-021-00126-9.
    [23] 楊宣兵. 幾類混沌系統(tǒng)特性分析、控制與圖像加密應(yīng)用研究[D]. [博士論文], 合肥工業(yè)大學(xué), 2020.

    YANG Xuanbing. Characteristics analysis and control of several chaotic systems and their application in image encryption[D]. [Ph. D. dissertation], Hefei University of Technology, 2020.
    [24] FAN Shengwen, LI Kai, ZHANG Ying, et al. A hybrid chaotic encryption scheme for wireless body area networks[J]. IEEE Access, 2020, 8: 183411–183429. doi: 10.1109/ACCESS.2020.3029263.
    [25] 蔣東華, 朱禮亞, 沈子懿, 等. 結(jié)合二維壓縮感知和混沌映射的雙圖像視覺(jué)安全加密算法[J]. 西安交通大學(xué)學(xué)報(bào), 2022, 56(2): 139–148. doi: 10.7652/xjtuxb202202015.

    JIANG Donghua, ZHU Liya, SHEN Ziyi, et al. A double image visual security encryption algorithm combining 2D compressive sensing and chaotic mapping[J]. Journal of Xi'an Jiaotong University, 2022, 56(2): 139–148. doi: 10.7652/xjtuxb202202015.
    [26] 孫克輝, 賀少波, 何毅, 等. 混沌偽隨機(jī)序列的譜熵復(fù)雜性分析[J]. 物理學(xué)報(bào), 2013, 62(1): 010501. doi: 10.7498/aps.62.010501.

    SUN Kehui, HE Shaobo, HE Yi, et al. Complexity analysis of chaotic pseudo-random sequences based on spectral entropy algorithm[J]. Acta Physica Sinica, 2013, 62(1): 010501. doi: 10.7498/aps.62.010501.
    [27] ABBASI A A, MAZINANI M, and HOSSEINI R. Chaotic evolutionary-based image encryption using RNA codons and amino acid truth table[J]. Optics & Laser Technology, 2020, 132: 106465. doi: 10.1016/j.optlastec.2020.106465.
    [28] MAHMUD M, ATTA-UR-RAHMAN, LEE M, et al. Evolutionary-based image encryption using RNA codons truth table[J]. Optics & Laser Technology, 2020, 121: 105818. doi: 10.1016/j.optlastec.2019.105818.
    [29] CAO Chun, SUN Kehui, and LIU Wenhao. A novel bit-level image encryption algorithm based on 2D-LICM hyperchaotic map[J]. Signal Processing, 2018, 143: 122–133. doi: 10.1016/j.sigpro.2017.08.020.
  • 加載中
圖(7) / 表(5)
計(jì)量
  • 文章訪問(wèn)數(shù):  544
  • HTML全文瀏覽量:  303
  • PDF下載量:  110
  • 被引次數(shù): 0
出版歷程
  • 收稿日期:  2023-03-29
  • 修回日期:  2023-09-12
  • 網(wǎng)絡(luò)出版日期:  2023-09-18
  • 刊出日期:  2024-03-27

目錄

    /

    返回文章
    返回