CN111147688B - Color image encryption method based on stereo scrambling model and chaos - Google Patents
Color image encryption method based on stereo scrambling model and chaos Download PDFInfo
- Publication number
- CN111147688B CN111147688B CN202010008597.XA CN202010008597A CN111147688B CN 111147688 B CN111147688 B CN 111147688B CN 202010008597 A CN202010008597 A CN 202010008597A CN 111147688 B CN111147688 B CN 111147688B
- Authority
- CN
- China
- Prior art keywords
- scrambling
- dimensional
- image
- matrix
- cell array
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/44—Secrecy systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/001—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals
Abstract
A color image encryption method based on a stereo scrambling model and chaos belongs to the field of information encryption. At present, multimedia technology is rapidly developed, and people can contact a large amount of image information everywhere. In order to protect the security of the image contents, the invention establishes a three-dimensional scrambling model suitable for color images on the basis of two-dimensional Zigzag transformation. In order to improve the safety and efficiency of the encryption method, a color image encryption method based on a three-dimensional scrambling model and chaos is designed. The method utilizes the stereo scrambling model to improve the performance of the encryption method. Experiments show that: the method has good encryption effect, large key space and strong key sensitivity, and can realize high-efficiency and safe network transmission of the color image.
Description
Technical Field
The invention relates to an information encryption technology, in particular to a color image encryption method.
Background
Under the environment of the rapid development of multimedia technology, in the fields of military affairs, commerce, daily life and the like, people can contact with a large amount of image information everywhere, and an image encryption technology is brought forward in order to protect the information of the images from being stolen. Because of the large amount of color image information and the wide application range, the security of the color image content is receiving attention of researchers. Although various encryption methods are available at present, the problems of low efficiency, poor security and the like still exist.
On the basis of two-dimensional Zigzag transformation, a three-dimensional scrambling model for color images is established. In order to improve the safety and efficiency of the encryption method, a color image encryption method based on a three-dimensional scrambling model and chaos is designed. The method utilizes the three-dimensional scrambling model to carry out scrambling operation, and improves the efficiency and the safety of the encryption method.
Disclosure of Invention
The purpose of the invention is as follows: aiming at the problems of weak security or low encryption efficiency and the like of the existing color image encryption method, the color image encryption method based on the stereo scrambling model and chaos is provided.
The technical scheme of the invention is as follows: in order to realize the purpose, the adopted technical scheme is a color image encryption method based on a three-dimensional scrambling model and chaos; let the sender be Alice and the receiver be Bob.
The following details of Alice's encryption steps:
step 1: establishing a three-dimensional original matrix: let the original image bem×nIn a color imageA 1Define a size ofm×nX 3 matrixOThe elements of which are in the interval [1, 3 ]mn]All of the integers of (1); order toa=m/4,b=n/4, mixingOIs equally divided into16 pieces with the size ofa×bX 3 three-dimensional matrix, and sequentially converting the three-dimensional matrices into one in the order of left to right, top to bottom and front to backa×bX 48 three-dimensional matrixO 1;
Step 2: two-dimensional Zigzag transform:O 1can be regarded as being composed of 48a×bIs defined as a two-dimensional matrix ofP 1, P 2, …, P i , …, P 48,P i Referred to as a page; using two-dimensional Zigzag transform pairsP i Page scrambling is carried out to obtain a scrambling result as a cellular arrayQ i ,i=1, 2, …, 48, each having a lengtht=a+b-1; by usingQ 1, Q 2, …, Q 48Form a circuit 48tCell array ofQ(ii) a Using two-dimensional Zigzag transform pairsQScrambling the cell array to obtain the cell array as the scrambling resultR;
And step 3: generating an index matrix: in a certain order, willRConversion of medium element value tom×nX 3 three-dimensional index matrixI;
And 4, step 4: image stereo scrambling: will be selected fromOToIIs called a stereo scrambling model; applying the model to the original imageA 1The scrambled image is availableA 2;
And 5: chaotic scrambling: generating a length ofmOf the chaotic sequenceX 1={x 1 i And a length ofnOf the chaotic sequenceY 1={y 1 j And (4) calculating:
x 2 i =mod[floor(x 1 i ×1016), m-1]+1, i=1, 2, …, m, (1)
y 2 j =mod[floor(y 1 j ×1016), n-1]+1, j=1, 2, …, n, (2)
wherein the content of the first and second substances,floor() Is a function of the rounding-off of the integer,mod() Is a function of a modulo operation,x 1 i ∈X 1,y 1 j ∈Y 1(ii) a Order toX 2={x 2 i },Y 2={y 2 j }; then toA 2To (1) aiThe row pixels are made to have a length ofx 2 i The cyclic shift of (a) is performed,i=1, 2, …, mobtaining a scrambled imageA 3(ii) a To pairA 3To (1) ajThe column is made to lengthy 2 j The cyclic shift of (a) is performed,j=1, 2, …, nobtaining a scrambled imageA 4;
Step 6: image diffusion: generating a size of 3 using one-dimensional Logistic mappingmnOf the chaotic sequenceLAnd converting it intom×nX 3 matrixB(ii) a And (3) calculating:
A 5= A 4⊕B, (3)
wherein ≧ represents an exclusive or operation; obtaining an encrypted imageA 5。
Further, in the step 2, the page scrambling means that each page is scrambled by using the element as a scrambling unitP i (i=1, 2, …, 48) carrying out two-dimensional Zigzag transformation, and obtaining a cell array as a transformation resultQ i The elements thereof correspond toP i All element sets on the right diagonal of the middle diagonal, i.e., the elements in each imaginary ellipse in the following formula;P i andQ i the data structure and the conversion relationship are specifically as follows:
further, in the step 2, scrambling of the cell array means toQ i The middle element is a scrambling unit, pairQIs carried out once 48 is preparedtThe two-dimensional Zigzag transform of the cell array is performed, and the transform result is the cell arrayR,Q i AndRthe data structure and the conversion relationship are specifically as follows:
further, in step 5, the Logistic mapping adopted is:
x n +1=ux n (1- x n ),
wherein the content of the first and second substances,x n the value range of (1) is (0),uhas a value range of [3.5699456, 4]。
In the decryption process, the same chaotic sequence is used for encrypting imagesA 5Carrying out decryption operation to recover the original image; the decryption process of Bob is the reverse of Alice's encryption.
Has the advantages that: the invention provides a color image encryption method based on a stereo scrambling model and chaos, aiming at the problems of low efficiency, weak safety and the like of the existing color image encryption method. The main contributions are: (1) establishing a three-dimensional scrambling model suitable for a color image on the basis of two-dimensional Zigzag transformation; (2) the method utilizes the good scrambling effect of the three-dimensional scrambling model, and effectively improves the safety and efficiency of the encryption method; (3) the method utilizes the randomness and the complexity of chaos and improves the encryption effect of the image. Therefore, the method can realize safe and efficient network transmission of the color images.
Drawings
FIG. 1: a color image encryption flow chart based on a stereo scrambling model and chaos;
FIG. 2: an original image;
FIG. 3: stereoscopically scrambling the image;
FIG. 4: chaotically scrambling an image;
FIG. 5: the image is encrypted.
Detailed Description
The following detailed description of the embodiments of the present invention is provided in connection with the accompanying drawings and examples.
Fig. 1 is an encryption flow diagram of the method.
The programming software used was Matlab R2018b, and the Lena color image of size 512 × 512 shown in fig. 2 was selected as the original image. With the method, the detailed process of Alice encrypting the original image is described as follows.
Step 1-4: after the stereo scrambling model is established according to the above rule, the original image map 2 is mapped and transformed correspondingly to obtain a scrambled image, as shown in fig. 3.
And 5: chaotic scrambling: using initial valuesu 1=3.81415, x 1=0.100001 iteration 511 times generating row sequence with length 512, and rounding to obtainX 2,X 2={x 2 i }; using initial valuesu 2=3.89437, x 2=0.100012 iteration 511 times, column sequence with length 512 is generated, and rounding operation is performed, so that the length is obtainedY 2,Y 2={y 2 j }. To the second of FIG. 4iThe row pixels are made to have a length ofx 2 i The cyclic shift of (a) is performed,i=1, 2, …, 512, obtaining scrambled imagesA 3(ii) a To pairA 3To (1) ajThe column is made to lengthy 2 j The cyclic shift of (a) is performed,j=1, 2, …, 512, resulting in a scrambled image, as shown in fig. 4.
Step 6: image diffusion: using initial valuesu 3=3.89728, x 3=0.207936 chaotic sequence of length 786432, round and convert to chaotic matrix of size 512 × 512 × 3B. Using the pair of formula (3)BAnd performing exclusive or operation with fig. 4 to obtain an encrypted image, as shown in fig. 5.
In the decryption process, the same index matrix, chaotic sequence and chaotic matrix are generated, and corresponding decryption operation is performed on the encrypted image to obtain a corresponding decrypted image, which is as shown in fig. 2.
Claims (3)
1. The color image encryption method based on the stereo scrambling model and chaos is characterized in that the encryption process comprises the following steps:
step 1: establishing a three-dimensional original matrix: let the original image bem×nIn a color imageA 1Define a size ofm×nX 3 matrixOThe elements of which are in the interval [1, 3 ]mn]All of the integers in (1); order toa=m/4,b=n/4, mixingOAre equally divided into 16 parts with the size ofa×bX 3 three-dimensional matrix, and sequentially converting the three-dimensional matrices into one in the order of left to right, top to bottom and front to backa×bX 48 three-dimensional matrixO 1;
Step 2: two-dimensional Zigzag transform:O 1can be regarded as being composed of 48a×bIs defined as a two-dimensional matrix ofP 1, P 2, …, P i , …, P 48,P i Referred to as a page; using two-dimensional Zigzag transform pairsP i Page scrambling is carried out to obtain a scrambling result as a cellular arrayQ i ,i=1, 2, …, 48, per cell arrayQ i Are all composed ofP i All elements on the right diagonal with an inclination angle of 45 deg. are formed due toa×bA matrix of size hasa+b1 right diagonal, thereforeQ i All lengths aret=a+b-1; by usingQ 1, Q 2, …, Q 48Form a circuit 48tCell array ofQ(ii) a Using two-dimensional Zigzag transform pairsQScrambling the cell array to obtain the cell array as the scrambling resultR;
And step 3: generating an index matrix: in a certain order, willRConversion of medium element value tom×nX 3 three-dimensional index matrixI;
And 4, step 4: image stereo scrambling: to be established fromOToIIs called a stereo scrambling model; applying the model to the original imageA 1Thus, a scrambled image can be obtainedA 2;
And 5: chaotic scrambling: generating a length ofmOf the chaotic sequenceX 1={x 1 k And a length ofnOf the chaotic sequenceY 1={y 1 j And (4) calculating:
x 2 k =mod[floor(x 1 k ×1016), m-1]+1,k=1, 2, …, m, (1)
y 2 j =mod[floor(y 1 j ×1016), n-1]+1,j=1, 2, …, n, (2)
wherein the content of the first and second substances,floor() Is a function of the rounding-off of the integer,mod() Is a function of a modulo operation,x 1 k ∈X 1andy 1 j ∈Y 1(ii) a Order toX 2={x 2 k },Y 2={y 2 j }; then, toA 2To (1) akThe row pixels are made to have a length ofx 2 k The cyclic shift of (a) is performed,k=1, 2, …, mobtaining a scrambled imageA 3(ii) a To pairA 3To (1) ajThe column is made to lengthy 2 j The cyclic shift of (a) is performed,j=1, 2, …, nobtaining a scrambled imageA 4;
Step 6: image diffusion: generating a size of 3 using one-dimensional Logistic mappingmnOf the chaotic sequenceLAnd converting it intom×nX 3 matrixB(ii) a And (3) calculating:
A 5= A 4⊕B, (3)
wherein ≧ represents an exclusive or operation; obtaining an encrypted imageA 5。
2. The method of claim 1, wherein: in step 2, page scrambling means: using elements as scrambling units, for each pageP i ,i=1, 2, …, 48, performing two-dimensional Zigzag transformation, and obtaining a cell array as a transformation resultQ i The elements thereof correspond toP i All element sets on the right diagonal of the middle graph, i.e., the elements in each dashed ellipse in the lower graph;P i andQ i the data structure and the conversion relationship are specifically as follows:
3. the method of claim 1, wherein: in step 2, cell array random finger: to be provided withQ i The middle element is a scrambling unit, pairQIs carried out once 48 is preparedtThe two-dimensional Zigzag transform of the cell array is performed, and the transform result is the cell arrayR,Q i AndRthe data structure and the conversion relationship are specifically as follows:
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010008597.XA CN111147688B (en) | 2020-01-06 | 2020-01-06 | Color image encryption method based on stereo scrambling model and chaos |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010008597.XA CN111147688B (en) | 2020-01-06 | 2020-01-06 | Color image encryption method based on stereo scrambling model and chaos |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111147688A CN111147688A (en) | 2020-05-12 |
CN111147688B true CN111147688B (en) | 2021-08-06 |
Family
ID=70523768
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010008597.XA Active CN111147688B (en) | 2020-01-06 | 2020-01-06 | Color image encryption method based on stereo scrambling model and chaos |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111147688B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111865553B (en) * | 2020-06-05 | 2021-10-15 | 中国矿业大学 | Multi-audio encryption method based on chaos and Zigzag transformation |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7031494B2 (en) * | 2002-06-24 | 2006-04-18 | Eastman Kodak Company | Method for securely transacting a transaction based on a transaction document |
CN1194530C (en) * | 2003-05-10 | 2005-03-23 | 合肥工业大学 | Image waterprint method for copyright protection |
US9092872B2 (en) * | 2010-10-11 | 2015-07-28 | Graphic Security Systems Corporation | System and method for creating an animation from a plurality of latent images encoded into a visible image |
CN102982499B (en) * | 2012-09-28 | 2015-10-07 | 河南大学 | Based on color image encryption and the decryption method of multi-fractional order chaos system |
US20160234009A1 (en) * | 2015-02-08 | 2016-08-11 | Wenhua Li | Chaotic Baseband Modulation Hopping Based Post-Quantum Physical-Layer Encryption |
CN109241755B (en) * | 2018-08-17 | 2021-10-22 | 中国矿业大学 | Image encryption method based on three-dimensional scrambling model and chaos |
CN109150492B (en) * | 2018-08-17 | 2021-09-21 | 中国矿业大学 | Multi-image encryption method based on three-dimensional scrambling model and chaos |
CN109360141B (en) * | 2018-09-11 | 2022-10-11 | 河南大学 | Image encryption method based on compressed sensing and three-dimensional cat mapping |
-
2020
- 2020-01-06 CN CN202010008597.XA patent/CN111147688B/en active Active
Also Published As
Publication number | Publication date |
---|---|
CN111147688A (en) | 2020-05-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109241755B (en) | Image encryption method based on three-dimensional scrambling model and chaos | |
CN109150492B (en) | Multi-image encryption method based on three-dimensional scrambling model and chaos | |
Lin et al. | An image encryption scheme based on Lorenz hyperchaotic system and RSA algorithm | |
CN111031193B (en) | Image encryption method based on three-dimensional composite scrambling model and chaos | |
CN103226802B (en) | Based on the medical image share method of chaos encryption | |
Huang et al. | Meaningful image encryption algorithm based on compressive sensing and integer wavelet transform | |
CN107659751B (en) | Multi-image encryption method based on DNA coding and chaos | |
Sha et al. | A chaotic image encryption scheme based on genetic central dogma and KMP method | |
CN111080506B (en) | Multi-image encryption method based on bit plane and chaos | |
Soleymani et al. | A novel public key image encryption based on elliptic curves over prime group field | |
CN103903215A (en) | Multi-image encryption method based on chaos and FrFT domain phase retrieval process | |
CN106709854A (en) | Cat mapping and chaos based image information fusion and encryption method | |
Feng et al. | Cryptanalzing a novel hyper-chaotic image encryption scheme based on pixel-level filtering and DNA-level diffusion | |
CN111147688B (en) | Color image encryption method based on stereo scrambling model and chaos | |
CN1881874A (en) | Public key cipher encrypting and decrypting method based on nerval network chaotic attractor | |
Chen et al. | Chaotic Multiple-Image Encryption Algorithm Based on Block Scrambling and Dynamic DNA Coding | |
CN111263026B (en) | Multi-image encryption method based on stereo scrambling model and fractional Fourier transform | |
CN111682932A (en) | Single-round image encryption method based on mixed chaotic mapping | |
CN113099069B (en) | Multi-image encryption method based on three-dimensional spiral model | |
CN111682931B (en) | Chaos-based multi-audio high-dimensional encryption method | |
Thomas et al. | Securing grayscale image using improved Arnold transform and ElGamal encryption | |
Mahlburg | An overview of braid group cryptography | |
CN113114870B (en) | Multi-image encryption method based on three-dimensional Zigzag model | |
CN111865553A (en) | Multi-audio encryption method based on chaos and Zigzag transformation | |
CN111127292A (en) | Multi-image encryption method based on stereo scrambling model and fractional Fourier transform |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |