CN104574259B - Image encryption method based on chaos system Yu insertion-case-deleted models - Google Patents

Image encryption method based on chaos system Yu insertion-case-deleted models Download PDF

Info

Publication number
CN104574259B
CN104574259B CN201510009578.8A CN201510009578A CN104574259B CN 104574259 B CN104574259 B CN 104574259B CN 201510009578 A CN201510009578 A CN 201510009578A CN 104574259 B CN104574259 B CN 104574259B
Authority
CN
China
Prior art keywords
dna
sequence
chaos
matrix
image
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201510009578.8A
Other languages
Chinese (zh)
Other versions
CN104574259A (en
Inventor
周昌军
牛红叶
王宾
张强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Dalian University
Original Assignee
Dalian University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Dalian University filed Critical Dalian University
Priority to CN201510009578.8A priority Critical patent/CN104574259B/en
Publication of CN104574259A publication Critical patent/CN104574259A/en
Application granted granted Critical
Publication of CN104574259B publication Critical patent/CN104574259B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)
  • Compression Or Coding Systems Of Tv Signals (AREA)

Abstract

The present invention relates to image encryption field, a kind of image encryption method based on chaos system with insertion-case-deleted models is devised.Hamming distance, the inverse distance of Hamming and Hamming are mended distance and are incorporated into during the generation of chaos system initial value by this method;In addition, this method uses the position of insertion-case-deleted models scramble image pixel value in encrypted image and decrypted image;Finally, the xor operation of DNA sequence dna is applied to the pixel value of diffusion image.Can be drawn from analog result and safety analysis, this method has a good cipher round results, and can the person of resisting an invasion various attacks.The problem of present invention is solved emphatically is that the basic thought of insertion-case-deleted models during DNA is calculated is applied in image encryption.

Description

Image encryption method based on chaos system Yu insertion-case-deleted models
Technical field
The present invention relates to chaos system and insertion-case-deleted models, specifically be with chaos system and insertion-deletion mould Original image is encrypted type, and it belongs to image encryption field.
Background technology
In recent years, digital picture is widely applied in network transmission as a kind of information carrier by people.However, due to The opening and the sharing of information of network, attacker is easy to intercept and capture these information, is that this people takes a series of measures Ensure the security of image transmitting, wherein image encryption is a kind of most effective way.Image information is because of its redundancy and number The features such as according to being two dimension, traditional text encryption method such as DES, AES, IDEA etc. have not been suitable for the encryption to image. Therefore the image encryption technology based on modern password system, the image encryption technology based on matrixing, the image based on chaos Encryption technology, the image encryption technology based on secret sharing and the image encryption technology based on frequency domain occur in succession.But, with The fast development of parallel computer, cloud computing and quantum computer, the security facing stern challenge of these methods.
Chaos system has a, ergodic sensitive to initial value, the characteristic such as movement locus is random, and and traditional cryptography There is natural contact, therefore the image encryption technology based on chaos is once favored by scholar, while also generating substantial amounts of Chaos Encryption Technology.But, less key space, slower enciphering rate and relatively low security are still based on chaos Image encryption technology development bottleneck.It is the technology that latest development is got up that DNA, which is calculated in field of cryptography, 1994, Adleman demonstrates a kind of Proof of Concept method that DNA is applied to solve to 7 Hamilton path problems.In addition, DNA Computation capability and high storage density with height are calculated, the image encryption skill based on chaos system can be just made up The shortcoming of art, therefore, chaos system is calculated to be combined by researchers with DNA proposes many AESs.Although some bases Improve the security in image transmitting process to a certain extent in above-mentioned encryption method, but the concern of these algorithms only It is the basic series of operations such as DNA sequence dna plus computing, XOR, without considering the concrete model in biochemical reaction.It is raw The DNA computation models changed in reaction include splice model, sticker model, DNA-EC, insertion-case-deleted models and most Small computation model etc., we, which can contemplate, is incorporated into the basic thought of these models in image encryption, produces good encryption Effect.
Insertion-case-deleted models are incorporated into the ciphering process of image herein.The mechanism of insertion-case-deleted models is: In one single-stranded DNA sequence dna, by biology enzyme and heating with annealing etc. biological operation technology, insertion section of DNA fragment or Person deletes one section of single-stranded DNA fragmentation.Concrete operation step is as described below.
Deletion action:Assuming that the value on array the i-th -1, i, i+1 position is respectively subsequence u, y, v, it is intended in the array The middle subsequence y deleted on i-th of position, its method and step is as follows:
1. this array is put into a test tube N, to adding single-stranded DNA sequence in test tube NIt is x benefit Sequence;
2. annealing operation is implemented to test tube N, thenWith u,Combined with v, andIt is folded;
3. adding DNA fragmentation and relevant polymerase in test tube N, PCR amplifications are implemented, complete double-strand can be obtained DNA molecular;
4. execution is unwind, obtain two it is single-stranded, wherein one is DNA sequence dna after deleting subsequence y.
Insertion operation:Assuming that the value on array the i-th -1, i, i+1 position is respectively subsequence u, y, v, it is intended in the array In i-th of position on intron sequences y, its method and step is as follows:
1. this array is put into a test tube N, to adding single-stranded DNA sequence in test tube N
2. annealing operation is implemented to test tube N, thenWith u,Combined with v, andIt is folded;
3. using inscribe restriction enzyme is adjusted, the double-strand in test tube N is cut off;
4. adding DNA fragmentation and relevant polymerase in test tube N, PCR amplifications are implemented, complete double-strand can be obtained DNA molecular;
4. execution is unwind, obtain two it is single-stranded, wherein one is DNA sequence dna after intron sequences y.
The content of the invention
, will it is an object of the invention to propose a kind of image encryption method based on chaos system and insertion-case-deleted models Chaos system and insertion-case-deleted models are combined the location of pixels of scramble image so that cipher round results are good, so as to The attack of anti-invader.The technical solution adopted in the present invention is:Image based on chaos system and insertion-case-deleted models adds Insertion-case-deleted models in decryption method, its chaos sequence and biochemical reaction for producing chaotic maps are combined;It is right first Original image carries out DNA encoding, and the DNA sequence dna that the chaos sequence scramble produced is obtained by encoding then is mapped using Lorenz, Then insertion-case-deleted models scramble DNA sequence dna again is used, finally the chaos sequence produced is mapped to obtaining using Lorenz DNA sequence dna matrix be diffused operation, finally to sequence matrix decoding obtain encrypted image;It is comprised the following steps that:
S1, using DNA encoding rule original image is carried out to encode and obtain DNA sequence dna matrix;
S2, utilize Lorenz chaotic maps produce chaos sequence (x, y, z)
Give arbitrary initial value x0,y0,z0, the Hamming distance of the DNA sequence dna matrix obtained in calculation procedure S1, Hamming Inverse distance and Hamming mend distance, and are the decimal between 0-1 by its value, by obtained new Hamming distance, Hamming against distance With Hamming mend distance respectively with x0,y0,z0It is added, obtains new initial value x1,y1,z1;Three are produced then in conjunction with systematic parameter Chaos sequence (x, y, z);
S3, the value with the DNA sequence dna matrix in chaos sequence (x, y) scramble step S1
Chaos sequence (x, y) is rounded downwards, with the value of the sequence scramble DNA sequence dna matrix newly obtained;
S4, the value with the DNA sequence dna matrix in chaos sequence (x, z) and insertion-case-deleted models again scramble S3;
Detailed process is:The DNA sequence dna matrix in step S3 is divided into two parts above and below size identical first;Then it is right This two parts carries out identical and operated as follows:Arranged using the one of DNA sequence dna matrix as a subsequence, obtain one and sequence square The equal-sized one-dimension array of number of arrays;One is produced between array size identical 0 and 1 using Lorenz chaotic maps Chaos sequence;If the value of i-th of position of chaos sequence is less than 0.5, using deletion action the element on i-th of position of array Delete, and the element of deletion is inserted into using insertion operation the end of remaining array;Otherwise without any operation;Last handle Two parts are merged into a sequence matrix, and operation is completed.
S5, the value of the DNA sequence dna matrix obtained with chaos sequence (y, z) and XOR to step S4 are diffused behaviour Make.
Matrix sequence is divided into size identical block first, then chaos sequence (y, z) rounded downwards, finally with reference to different Or the value of DNA sequence dna matrix is spread in computing by block;
S6, the size identical merged block obtained in step S5 obtained into a DNA sequence dna matrix, decoding it to obtain To encrypted image.
The present invention has advantages below compared with prior art:
1st, the basic thought of insertion-deletion system in biochemical reaction is incorporated into encryption system, formation insert-is deleted Except model.One kind in DNA computation models due to insertion-deletion system, thus insertion-deletion system have it is huge and Row computing capability and high storage density, so as to insert-case-deleted models also have the above characteristic, use this model realization figure The encryption of picture has higher encryption efficiency.
2nd, the present invention not only allows for chaotic maps to characteristics such as initial value sensitivities, but also should by insertion-case-deleted models In ciphering process, the good characteristic of effect insertion-case-deleted models and chaotic maps can make our AES effective The person of resisting an invasion attack;It ensure that safety of the digital picture in transmission is high.
Brief description of the drawings
8 kinds of codings of Fig. 1 DNA sequence dnas, decoding mapping ruler;
The xor operation of Fig. 2 DNA sequence dnas;
Fig. 3 original images;
Fig. 4 encrypted images;
Fig. 5 decrypted images;
The grey level histogram of Fig. 6 original images;
The grey level histogram of Fig. 7 encrypted images;
The correlation of Fig. 8 original image horizontal directions;
The correlation of Fig. 9 encrypted image horizontal directions;
The structure diagram of Figure 10 present invention.
Embodiment
The invention will be further described below in conjunction with the accompanying drawings.
Detailed step is as follows:
Step 1:DNA encoding (see accompanying drawing 1) is carried out using the 2nd kind of coding rule to original image (see accompanying drawing 3);
Step 2:The Hamming distance of matrix sequence after calculation code, Hamming are mended distance against distance and Hamming, and will obtained Value into the decimal between 0-1;By the value newly obtained respectively with x0,y0,z0It is added, obtains new initial value x1,y1,z1; Under conditions of new initial value and systematic parameter, three chaos sequences x, y, z are produced;
Step 3:Chaos sequence (x, y) is rounded downwards, with the DNA sequence dna matrix in obtained new sequence scramble step S1 Value;
Step 4:Application of the insertion-case-deleted models in ciphering process and chaos sequence (y, z) are combined in displacement S3 The value of DNA sequence dna matrix;
Step 5:The matrix sequence obtained in step 4 is divided into the block that size is 4 × 4;Downwards round chaos sequence (x, Z), the value of DNA sequence dna matrix is spread by block with the XOR (see accompanying drawing 2) of obtained new sequence and DNA sequence dna;
Step 6:By the merged block obtained in step 5 into a new sequence matrix, then rule is decoded with the 3rd DNA (see accompanying drawing 1) is decoded to this matrix sequence, you can obtain encrypted image.
Embodiment 1
Embodiments of the invention are implemented lower premised on technical solution of the present invention, give detailed implementation Mode and specific operating process, but protection scope of the present invention is not limited to following embodiments.
Step 1:Size is changed into a binary matrix for the original-gray image of (m, n);According to DNA sequence encoding The 2nd rule binary matrix is encoded, can obtain size is (the DNA sequence dna matrix D A of m, n × 4);
Step 2:Give arbitrary initial value x0,y0,z0, then by it respectively with being converted to the Hamming of the decimal between 0-1 The inverse distance of distance, Hamming, Hamming benefit distance are added and obtain new initial value x1,y1,z1, in x1,y1,z1With systematic parameter σ, ρ, β Under conditions of, produce three chaos sequence x=(x using Lorenz chaotic maps1,x2,...,x4n), y=(y1,y2,..., y4n), z=(z1,z2,...,z4n)。
Step 3:Downward floor operation is done to chaos sequence (x, y), formula is as follows:
Wherein x (i) is the value of i-th of position in chaos sequence x, and y (j) is the value of j-th of position in chaos sequence y, and m is The number of chaos sequence x intermediate values, n is the number of chaos sequence y intermediate values;Sequence (x, y) the scramble DA produced more than, obtains sequence Column matrix CA.Formula is as follows:
Step 4:According to application of the insertion-case-deleted models in ciphering process and chaos sequence (x, z) to obtained square Battle array sequence C A operate obtaining sequence matrix NA;
Step 5:Sequence matrix NA is divided into equal block bR { i, j }, i=1,2 ..., m/4, j=1,2 ..., n, its In the size of each block be 4 × 4;
Sequence (y, z) is rounded downwards in the way of step 3, new sequence (y, z) is obtained;With reference to DNA XORs, press According to below equation xor operation is carried out by corresponding piece.
BR (i, j) ← bR (i, j) XORbR (y (i), z (j)) i=1,2 ..., m/4j=1,2 ..., n
Step 6:Recombinate these blocks bR { i, j } and can obtain a DNA matrix sequences HA;Using the 3rd kind of coding rule to HA Decoding, can obtain a binary matrix, as encrypted image.
Because as σ=10, ρ=8/3, β=28, chaos system enters chaos state and can produce three chaos sequences, Therefore σ=10, ρ=8/3, β=28 are taken herein.Take x simultaneously0=2, y0=3, z0=4 and Hamming distance is combined, Hamming is against distance Distance, which is mended, with Hamming produces new initial value x1,y1,z1.Under the above key, system emulation result such as accompanying drawing 4- accompanying drawings 9 It is shown.
Summary is described, and this AES is using chaos system to initial value sensitivity and DNA computation model highly-parallel meters The features such as calculation ability, chaos system and insertion-case-deleted models are implemented in combination with to the encryption to digital picture.The algorithm for encryption is imitated Fruit is good, while experiment simulation and analog result show that this method can resist statistical attack, differential attack and exhaustive attack Deng, it is adaptable to the protection of image in image transmitting process.
The foregoing is intended to be a preferred embodiment of the present invention, but protection scope of the present invention is not limited thereto, Any one skilled in the art in the technical scope of present disclosure, technique according to the invention scheme and its Design should all be covered within the scope of the present invention with equivalent or change.

Claims (2)

1. the image encryption method based on chaos system with insertion-case-deleted models, it is characterised in that:It produces chaotic maps Chaos sequence and biochemical reaction in insertion-case-deleted models be combined;It carries out DNA encoding to original image first, then The DNA sequence dna that the chaos sequence scramble produced is obtained by encoding is mapped using Lorenz, it is then another with insertion-case-deleted models Secondary scramble DNA sequence dna, finally maps the chaos sequence produced using Lorenz and is diffused behaviour to obtained DNA sequence dna matrix Make, encrypted image finally is obtained to sequence matrix decoding;Encryption method is comprised the following steps that:
S1, using DNA encoding rule original image is carried out to encode and obtain DNA sequence dna matrix;
S2, utilize Lorenz chaotic maps produce chaos sequence (x, y, z)
Give arbitrary initial value x0,y0,z0, the Hamming distance of the DNA sequence dna matrix obtained in calculation procedure S1, Hamming it is inverse away from With a distance from being mended with Hamming, and the decimal being converted between 0-1, by obtained new Hamming distance, Hamming against distance and the Chinese Visible subsidy distance respectively with x0,y0,z0It is added, obtains new initial value x1,y1,z1;Three chaos are produced then in conjunction with systematic parameter Sequence (x, y, z);
S3, the value with the DNA sequence dna matrix in chaos sequence (x, y) scramble step S1;
Chaos sequence (x, y) is rounded downwards, with the value of the sequence scramble DNA sequence dna matrix newly obtained;
S4, the value with chaos sequence (x, z) and insertion-case-deleted models scramble DNA sequence dna matrix again;
S5, the value of the DNA sequence dna matrix obtained with chaos sequence (y, z) and XOR to step S4 are diffused operation;
Matrix sequence is divided into size identical block first, then chaos sequence (y, z) rounded downwards, XOR is finally combined and transports Calculate the value that DNA sequence dna matrix is spread by block;
S6, the size identical merged block obtained in step S5 obtained into a DNA sequence dna matrix, decoding it can be added Close image.
2. the image encryption method according to claim 1 based on chaos system with insertion-case-deleted models, its feature exists In:The process of the step S4 is as follows:The DNA sequence dna matrix obtained in step S3 is divided into above and below size identical two first Point;Then identical is carried out to this two parts to operate as follows:Arranged using the one of DNA sequence dna matrix as a subsequence, obtain one The individual and equal-sized one-dimension array of sequence matrix columns;One and array size identical are produced using Lorenz chaotic maps Chaos sequence between 0 and 1;If the value of i-th of position of chaos sequence is less than 0.5, using deletion action array i-th The element put is deleted, and the element of deletion is inserted into using insertion operation the end of remaining array;Otherwise without any Operation;Two parts are finally merged into a sequence matrix, operation is completed.
CN201510009578.8A 2015-01-08 2015-01-08 Image encryption method based on chaos system Yu insertion-case-deleted models Expired - Fee Related CN104574259B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510009578.8A CN104574259B (en) 2015-01-08 2015-01-08 Image encryption method based on chaos system Yu insertion-case-deleted models

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510009578.8A CN104574259B (en) 2015-01-08 2015-01-08 Image encryption method based on chaos system Yu insertion-case-deleted models

Publications (2)

Publication Number Publication Date
CN104574259A CN104574259A (en) 2015-04-29
CN104574259B true CN104574259B (en) 2017-07-11

Family

ID=53090247

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510009578.8A Expired - Fee Related CN104574259B (en) 2015-01-08 2015-01-08 Image encryption method based on chaos system Yu insertion-case-deleted models

Country Status (1)

Country Link
CN (1) CN104574259B (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105046636B (en) * 2015-07-13 2017-05-03 郑州轻工业学院 Digital image encryption method based on chaotic system and nucleotide sequence database
CN105119717A (en) * 2015-07-21 2015-12-02 郑州轻工业学院 DNA coding based encryption system and encryption method
CN105678677B (en) * 2016-01-06 2018-11-02 大连大学 Image encryption method based on hash function and insertion-case-deleted models
CN106651735A (en) * 2016-09-08 2017-05-10 广东工业大学 Chaos theory-based digital image parallel encryption method
CN106530197A (en) * 2016-10-12 2017-03-22 广东工业大学 Image encryption method based on Kent mapping and generalized Gray codes
CN107437266A (en) * 2017-07-11 2017-12-05 大连大学 Image encryption method based on chaos system Yu DNA chain displacement model
CN107992948B (en) * 2017-10-30 2021-10-19 东北林业大学 Quantum image encryption algorithm based on chaotic system and DNA dynamic coding

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101702240A (en) * 2009-11-26 2010-05-05 大连大学 Image encryption method based on DNA sub-sequence operation
CN101706947A (en) * 2009-11-26 2010-05-12 大连大学 Image fusion encryption method based on DNA sequences and multiple chaotic mappings
CN103167213A (en) * 2013-02-07 2013-06-19 东北大学 Digital image encryption method based on Cat mapping and hyper-chaos Lorenz system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101702240A (en) * 2009-11-26 2010-05-05 大连大学 Image encryption method based on DNA sub-sequence operation
CN101706947A (en) * 2009-11-26 2010-05-12 大连大学 Image fusion encryption method based on DNA sequences and multiple chaotic mappings
CN103167213A (en) * 2013-02-07 2013-06-19 东北大学 Digital image encryption method based on Cat mapping and hyper-chaos Lorenz system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
A novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic system;Qiang Zhang 等;《Optik》;20130207;第124卷(第18期);第3596-3600页 *
DNA计算机原理、进展及难点(Ⅳ):论DNA计算机模型;许进 等;《计算机学报》;20070630;第30卷(第06期);第881-893页 *

Also Published As

Publication number Publication date
CN104574259A (en) 2015-04-29

Similar Documents

Publication Publication Date Title
CN104574259B (en) Image encryption method based on chaos system Yu insertion-case-deleted models
CN105046636B (en) Digital image encryption method based on chaotic system and nucleotide sequence database
CN108365947B (en) A kind of image encryption method based on Feistel network Yu dynamic DNA encoding
Wang et al. A novel chaotic algorithm for image encryption utilizing one-time pad based on pixel level and DNA level
CN108366181B (en) A kind of image encryption method based on hyperchaotic system and multistage scramble
CN109376540B (en) Image encryption method based on Duffing mapping and genetic operation
Liu et al. Color image encryption algorithm based on DNA coding and double chaos system
Niu et al. An image encryption approach based on chaotic maps and genetic operations
Zhang et al. A new image encryption algorithm based on non-adjacent coupled map lattices
CN105046161B (en) Color image encrypting method based on DNA dynamic codings
Liu et al. Color image encryption using three-dimensional sine ICMIC modulation map and DNA sequence operations
Zhang et al. Image encryption algorithm based on DNA encoding and chaotic maps
CN104766264B (en) A kind of piecemeal two tier adaptive diffusion image encryption method
CN107590842B (en) Image encryption method and device based on pixel and DNA cross dynamic chaotic password
CN107437266A (en) Image encryption method based on chaos system Yu DNA chain displacement model
CN107220923B (en) Digital picture feedback encryption method based on image network
CN106997606B (en) A kind of image encryption method based on hyperchaotic system Projective Synchronization
CN101702240A (en) Image encryption method based on DNA sub-sequence operation
CN106780282B (en) Resume image based on piecemeal DNA encoding and uniform scramble
CN104766350B (en) Image encryption method based on splice model and hyperchaotic system
CN107094072A (en) A kind of mixed chaos encryption method based on general Henon Map
Hamad Novel Implementation of an Extended 8x8 Playfair Cipher Using Interweaving on DNA-encoded Data.
CN107451948A (en) Image Encrypt and Decrypt method and system based on chaos and DNA dynamic plane computings
Alam et al. Universal playfair cipher using MXN matrix
CN112202545A (en) Image encryption method based on Y-type filling curve and variable-step Joseph traversal

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20170711

CF01 Termination of patent right due to non-payment of annual fee