A kind of video secret communication method of multi-dimension Chaos mapping
Technical field
The present invention relates to video secret communication method, specifically a kind of video secret communication method of multi-dimension Chaos mapping.
Background technology
British mathematician Mattllews in 1989 proposes a kind of text password based on 1 dimensional Logistic Map first
Scheme.Turn into the focus of research from this chaos encryption.Chaos system is applied to image encryption, first by Fridrich in 1997
Propose, the conversion of location of pixels has been carried out using the Baker mappings and Cat mappings of two dimension, but the key of two dimension Cat mappings is empty
Between it is too small, while be confined to square sized images encrypt.Chen and Mao are on the basis of Fridrich, by two-dimentional Baker
Map and two dimension Cat mapped extensions are to three-dimensional, and be utilized respectively three-dimensional mapping and propose a quick Image Encryption Scheme.
The think of that Feng etc. is proposed after line mapping resume images using the principle that chaos is stretched and is folded and split using image
Want to propose a kind of chaotic maps resume image.Two-dimensional chaotic map is extended to three dimensions progress image and added in recent years
It is close, the 3D Baker map resume images that such as Mao et al. is proposed, the 3D Catmap resume images that Chen G are proposed.
State Intellectual Property Office disclosed Publication No. CN102831569A on December 19th, 2012, and patent name is one
The digital picture planted towards cellular service selects the patent of invention document of encryption method, the patent document:Including fraction ciphertext to be added
Selection, the determination of Image Chaos encryption key, the cryptographic operation of image and the closed quality of wavelet low frequency subband evaluate four parts;
Wherein, the determination of Image Chaos encryption key, will realize fraction wavelet transformation and chaos encryption it needs to be determined that following parameter:
(1) the control parameter α of chaos sequence, is provided by user;
(2) the yardstick β of image wavelet transform, is provided by user;
(3) the fractional order γ of fraction wavelet transformation, and meet 0<γ<2, provided by user;
(4) chaos sequence initial value X (0), its determination process is as follows:
It is m bits that step 1., which sets original image, optional 5 pixels P1, P2, P3, P4 from selected subband,
P5, the chaos sequence initial value of the subband is obtained by the pixel value of this 5 points;
Step 2. calculates the chaos sequence initial value of selected wavelet sub-band according to the following formula:
Aforementioned four parameter alpha, beta, gamma, X (0) constitutes the key of selected sub-band images encryption;
The cryptographic operation of image is as follows:Step 1. is for selected wavelet low frequency subband, if the size of the subband is N1
× N2, the series of starting values X (0) generated using this fraction wavelet low frequency subband, chaos sequence is generated according to following mapping:X
(n+1)=cos (α arccos (X (n)) (4), wherein, α is control parameter, and X (n) ∈ [- 1,1], the sequence now generated
Row are chaos, because this chaos sequence is ambipolar, according to following unipolarity sequences for converting and converting it into [0,1]
Row:The length of this sequence is taken as N1 × N2, and this N1 × N2 numerical value is converted into the chaos matrix of N1 rows N2 row, is designated as U;
Selected fraction wavelet low frequency subband is encrypted step 2., and encryption is calculated as follows:Wherein, it is
XOR operation, ValueNew (i, j), ValueOld (i, j) be respectively after the encryption of selected fraction wavelet low frequency subband with before encryption
The low frequency sub-band fraction wavelet coefficient arranged in the i-th row jth;
Step 3. is replaced with the fraction wavelet low frequency subband after encryption after the fraction wavelet low frequency subband before encryption, is carried out
Wavelet inverse transformation, obtains initial encryption image;
The initial encryption image obtained is divided into 4 width size identical subgraphs by step 4., afterwards to this 4 width subgraph
As being done according to clockwise direction after rotation processing, the image obtained is exactly final encrypted image.
The technical scheme of above-mentioned patent and the technical scheme of this patent are entirely different.
The content of the invention
It is an object of the invention to provide a kind of video secrecy of the high multi-dimension Chaos mapping of strong security, encryption reduction degree
Communication means.
To achieve the above object, the technical solution adopted in the present invention is:
A kind of video secret communication method of multi-dimension Chaos mapping, comprises the following steps:
A. the kinetics equation of 8 dimension Discrete Chaotic Maps is set up:
N in formulai(i=1,2 ..., 8)=2, A8=(Aij)8×8The building method of (i, j=1,2 ..., 8) isWherein:
Subscript sequence Oi,j, wherein i, the condition that j value should be met is
Select a kind of subscript sequence O thereini,jFor:
Oi,j=78,13,14,15,16,45,18,23,24,25,57,27,28,34,35,36,37,38,17,46,47,
48,56,26,58,67,68,12 corresponding transformation matrix A8For TijProduct, obtain
Obtaining video pixel position scrambling encryption algorithm is
The second row in formula and last column join together to represent that 8 circulate from 0 to 3 nested;
B. circulated by above-mentioned 8 from 0 to 3 nesting, cycle-index is 216, it is equal with the pixel of a two field picture, according to
Above formula, the mapping table for obtaining video pixel position scrambling encryption algorithm is as shown in the table:
Because the modulo operation in the scrambling encryption algorithm of video pixel position is the computing of mould 4, therefore each single item E in mapping table
(S can only i) have 0,1,2,3 four kind of possible value, i.e.,
E(S,i)∈{0,1,2,3}
S=0,1,2 in formula ..., 216- 1, i=1,2 ..., 8;
C. cryptographic calculation:
1. each pixel chronological order number given in two-dimensional video image:By a width size before location of pixels scrambling encryption
For 256 × 256 two-dimensional video image pixel positional representation into one-dimension array, 65536 pixels are had, to should be one-dimensional
The length of array is 65536, before location of pixels scrambling encryption, and each pixel one serial number of correspondence, serial number S is each
Arranged by the order of increase by 1 and meet 0≤S≤216- 1, S (S=0,1,2 ..., 216- 1) size is
2. the serial number after the scrambling encryption of video pixel position is built:Using in mapping table per a line corresponding 8 E (S,
I) (i=1,2 ..., 8), constructs the serial number after a video pixel position scrambling encryption, then the size for corresponding to serial number is
E (S)=E (S, α1)×214+E(S,α2)×212+E(S,α3)×210+E(S,α4)×28+
E(S,α5)×26+E(S,α6)×24+E(S,α7)×22+E(S,α8)×20
α in formulai(i=1,2 ..., 8) ∈ { 1,2 ..., 8 }, α1≠α2≠…≠αn.According to above formula, because S and E (S) is
It is man-to-man, therefore E (S) also has 65536 kinds of different values;
3. video pixel position scrambling encryption Algorithm mapping table is utilized, origin-location is mapped in place for the pixel value at S
E (S) place is set to, the ciphertext value p (k) of a two field picture is thus obtained;
D. information transmission:Server end sends the ciphertext value p (k) of a two field picture to clients by Ethernet simultaneously;
E. client carries out anti-Mapping implementation decryption using the mapping table produced in the same fashion to ciphertext value p (k).
Further, the step in the step C 3. in specific method it is as follows:
First, the two-dimensional coordinate before setting video location of pixels scrambling encryption is (x, y), the then two-dimensional coordinate before encrypting
(x, y) and one-dimension array serial number S (S=0,1,2 ..., 216- 1) relation between is
Floor represents to round downwards in formula, and mod is modular function;
Secondly, the two-dimensional coordinate after setting video location of pixels scrambling encryption is (xe,ye), then the two-dimensional coordinate after encrypting
(xe,ye) relation between one-dimension array serial number E (S) is
If the video pixel value of correspondence two-dimensional coordinate (x, y) is V (x, y) before the scrambling encryption of position, then position scramble
Correspondence two-dimensional coordinate (x after encryptione,ye) video pixel value be Ve(xe,ye), carry out the replacement operator computing shown in following formula
Ve(xe,ye)=V (x, y)
The encryption of the position scramble of video pixel is then realized, the ciphertext value p (k) of a two field picture is finally obtained.
Further, the specific decryption method in the step E is as follows:Decryption is the inverse operation of encryption, if right after decryption
The mathematic(al) representation for answering pixel order number is
D (S)=D (S, α1)×214+D(S,α2)×212+D(S,α3)×210+D(S,α4)×28+D(S,α5)×26+D(S,
α6)×24+D(S,α7)×22+D(S,α8)×20
Two-dimensional coordinate after the decryption of setting video pixel is (xd,yd), then two-dimensional coordinate (xd,yd) and one-dimension array serial number D
(S) relation is
Floor represents to round downwards in formula, and mod is modular function;
According to above formula, if correspondence two-dimensional coordinate (x after decryptiond,yd) video pixel value be Ve(xd,yd), if to realize
The decryption of video image, only need to carry out the replacement operator computing V shown in following formulad(x, y)=Ve(xd,yd), by pixel pair after encryption
The one-dimension array serial number answered be reduced into S (S=0,1,2 ..., 216- 1), realize and the decryption that reflection is penetrated is carried out to ciphertext value p (k).
Beneficial effects of the present invention:As a result of above-mentioned method, compared with congenic method, with strong security, add
The characteristics of close reduction degree is high.
Brief description of the drawings
Fig. 1 is the composition frame chart for the video secret signalling that multi-dimension Chaos map;
Fig. 2 is Client ends workflow diagram;
Fig. 3 is Server ends workflow diagram.
Embodiment
As shown in Figure 1, 2, 3, to the hardware configuration of video multi-dimension Chaos mapping encrypting:With two pieces of Super 4412 ARM
Plate sets up a Server-Client model, sets up the respective socket of Server and Client, is used as the base of intercommunication
Plinth.Image real-time acquisition, the ARM development boards of multi-dimension Chaos mapping encrypting as Client ends, by camera, V4L2 drivings,
Jpeg decompression contracting, H.264 chaos encryption, compression, trawl performance, ethernet port, eight part compositions of LCDs, pass through
Chaos encryption and H.264 compress after video data transmitted through Ethernet.The ARM development board conducts of multi-dimension Chaos mapping decryption
Server ends, the cipher-text information that responsible reception is transmitted.Ethernet port, trawl performance, H.264 decompression, chaos decryption,
The part of LCDs five is constituted, its at Client ends and Server ends, be all run on Cortex-A9 type processors it is embedding
Enter formula (SuSE) Linux OS, the function of above-mentioned corresponding part is programmed to by C++.The video exported due to USB camera
View data is the JPEG compression form after hardware encoding, therefore, it is necessary first to will carry out jpeg decompression contracting per frame jpeg image
Afterwards, corresponding RGB three primary colours video format can just be obtained.In addition, local area network communication is programmed using socket, using towards connection
, reliably Transmission Control Protocol.
Using above-mentioned hardware configuration, video secret communication, a kind of video secret communication side of multi-dimension Chaos mapping are realized
Method, comprises the following steps:
A. the kinetics equation of 8 dimension Discrete Chaotic Maps is set up:
N in formulai(i=1,2 ..., 8)=2, A8=(Aij)8×8The building method of (i, j=1,2 ..., 8) isWherein:
Subscript sequence Oi,j, wherein i, the condition that j value should be met is
Select a kind of subscript sequence O thereini,jFor:
Oi,j=78,13,14,15,16,45,18,23,24,25,57,27,28,34,35,36,37,38,17,46,47,
48,56,26,58,67,68,12 corresponding transformation matrix A8For TijProduct, obtain
Obtaining video pixel position scrambling encryption algorithm is
The second row in formula and last column join together to represent that 8 circulate from 0 to 3 nested;
B. circulated by above-mentioned 8 from 0 to 3 nesting, cycle-index is 216, it is equal with the pixel of a two field picture, according to
Above formula, the mapping table for obtaining video pixel position scrambling encryption algorithm is as shown in the table:
Because the modulo operation in the scrambling encryption algorithm of video pixel position is the computing of mould 4, therefore each single item E in mapping table
(S can only i) have 0,1,2,3 four kind of possible value, i.e.,
E(S,i)∈{0,1,2,3}
S=0,1,2 in formula ..., 216- 1, i=1,2 ..., 8;
C. cryptographic calculation:
1. each pixel chronological order number given in two-dimensional video image:By a width size before location of pixels scrambling encryption
For 256 × 256 two-dimensional video image pixel positional representation into one-dimension array, 65536 pixels are had, to should be one-dimensional
The length of array is 65536, before location of pixels scrambling encryption, and each pixel one serial number of correspondence, serial number S is each
Arranged by the order of increase by 1 and meet 0≤S≤216- 1, S (S=0,1,2 ..., 216- 1) size is
2. the serial number after the scrambling encryption of video pixel position is built:Using in mapping table per a line corresponding 8 E (S,
I) (i=1,2 ..., 8), constructs the serial number after a video pixel position scrambling encryption, then the size for corresponding to serial number is
E (S)=E (S, α1)×214+E(S,α2)×212+E(S,α3)×210+E(S,α4)×28+
E(S,α5)×26+E(S,α6)×24+E(S,α7)×22+E(S,α8)×20
α in formulai(i=1,2 ..., 8) ∈ { 1,2 ..., 8 }, α1≠α2≠…≠αn.According to above formula, because S and E (S) is
It is man-to-man, therefore E (S) also has 65536 kinds of different values;
3. video pixel position scrambling encryption Algorithm mapping table is utilized, origin-location is mapped in place for the pixel value at S
E (S) place is set to, the ciphertext value p (k) of a two field picture is thus obtained, specific method is as follows:
First, the two-dimensional coordinate before setting video location of pixels scrambling encryption is (x, y), the then two-dimensional coordinate before encrypting
(x, y) and one-dimension array serial number S (S=0,1,2 ..., 216- 1) relation between is
Floor represents to round downwards in formula, and mod is modular function;
Secondly, the two-dimensional coordinate after setting video location of pixels scrambling encryption is (xe,ye), then the two-dimensional coordinate after encrypting
(xe,ye) relation between one-dimension array serial number E (S) is
If the video pixel value of correspondence two-dimensional coordinate (x, y) is V (x, y) before the scrambling encryption of position, then position scramble
Correspondence two-dimensional coordinate (x after encryptione,ye) video pixel value be Ve(xe,ye), then, we carry out the displacement shown in following formula
Operation
Ve(xe,ye)=V (x, y)
The encryption of the position scramble of video pixel is then realized, the ciphertext value p (k) of a two field picture is finally obtained.
D. information transmission:Server end sends the ciphertext value p (k) of a two field picture to clients by Ethernet simultaneously;
E. client carries out anti-Mapping implementation decryption using the mapping table produced in the same fashion to ciphertext value p (k).
Decryption is the inverse operation of encryption, if the mathematic(al) representation of respective pixel serial number is after decryption
D (S)=D (S, α1)×214+D(S,α2)×212+D(S,α3)×210+D(S,α4)×28+
D(S,α5)×26+D(S,α6)×24+D(S,α7)×22+D(S,α8)×20
Two-dimensional coordinate after the decryption of setting video pixel is (xd,yd), then two-dimensional coordinate (xd,yd) and one-dimension array serial number D
(S) relation is
Floor represents to round downwards in formula, and mod is modular function;
According to above formula, if correspondence two-dimensional coordinate (x after decryptiond,yd) video pixel value be Ve(xd,yd), if to realize
The decryption of video image, then, we only need to carry out the replacement operator computing V shown in following formulad(x, y)=Ve(xd,yd), it will add
The corresponding one-dimension array serial number of close rear pixel be reduced into S (S=0,1,2 ..., 216- 1), realize and ciphertext value p (k) is carried out instead
The decryption of mapping.
Decryption is in two kinds of situation:Transmitting terminal is identical with the parameter and key of receiving terminal, D (S)=E (S), V (x, y)=Vd
(x, y), receiving terminal can correctly decrypt original video image;Transmitting terminal is different from the parameter and key of receiving terminal, D (S) ≠ E (S),
V(x,y)≠Vd(x, y), receiving terminal can not correctly decrypt original video image.
Notice when being realized with ARM, on the one hand, need to consider video requirement of real-time, from speed in terms of, encrypt
Algorithm can not be excessively complicated and time-consuming, and close wheel number can not be excessive.Generally in hardware experiments, it is 1 to choose encryption round number.Obtain ARM
When realizing, the conservative estimation value of key space size is
KS=(8 × 7)/2)!×8!=1.2293 × 1034。
Described above is the preferred embodiment of the present invention, can not limit the right model of the present invention with this certainly
Enclose, it is noted that for those skilled in the art, technical scheme is modified or waited
With replacing, without departure from the protection domain of technical solution of the present invention.