CN104240177A - Colored image encryption method based on chaotic system and fractional order Fourier transform - Google Patents

Colored image encryption method based on chaotic system and fractional order Fourier transform Download PDF

Info

Publication number
CN104240177A
CN104240177A CN201410486126.4A CN201410486126A CN104240177A CN 104240177 A CN104240177 A CN 104240177A CN 201410486126 A CN201410486126 A CN 201410486126A CN 104240177 A CN104240177 A CN 104240177A
Authority
CN
China
Prior art keywords
matrix
image
encryption
fourier transform
row
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410486126.4A
Other languages
Chinese (zh)
Other versions
CN104240177B (en
Inventor
高振国
张伟
陈丹杰
刘彦文
綦志刚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Harbin Engineering University
Original Assignee
Harbin Engineering University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Harbin Engineering University filed Critical Harbin Engineering University
Priority to CN201410486126.4A priority Critical patent/CN104240177B/en
Publication of CN104240177A publication Critical patent/CN104240177A/en
Application granted granted Critical
Publication of CN104240177B publication Critical patent/CN104240177B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Facsimile Transmission Control (AREA)
  • Image Analysis (AREA)

Abstract

The invention discloses a colored image encryption method based on a chaotic system and the fractional order Fourier transform and relates to the field of the image encryption systems. The method comprises the steps that the Logistic chaotic system is utilized for generating a chaotic sequence at first, and global pixel scrambling is carried out on a regrouped colored image matrix; then the fractional order Fourier transform is carried out on the result obtained in the last step; finally, the Logistic chaotic system is utilized again for generating a chaotic sequence, global pixel scrambling is carried out on the regrouped matrix with the module length and phase angle extracted in the last step, and therefore image encryption is achieved. According to the colored image encryption method based on the chaotic system and the fractional order Fourier transform, one image is introduced for building a complex matrix, algorithm space occupation caused when two images are adopted for building a complex matrix is reduced, global pixel scrambling and the fractional order Fourier transform are introduced for pixel value encryption, the image pixel point relevancy is lowered, algorithm anti-interference performance and anti-attacking performance are improved, the encryption effect is good, and safety is high.

Description

A kind of color image encrypting method based on chaos system and fraction Fourier conversion
Technical field
The invention belongs to image procossing and information security field, particularly relate to a kind of color image encrypting method based on chaos system and fraction Fourier conversion adopting single image cipher mode.
Background technology
Along with developing rapidly of computer networking technology, information security has become the serious problems of information transmission and storage, and image information transmission and image encryption technology all attract wide attention.It is large that image information itself has data volume, degree of correlation high between data, traditional encryption method for plain text information, as data encryption standards (DES), IDEA, rivest, shamir, adelman RSA etc., and is not exclusively applicable to image encryption.The features such as to have key space large due to chaos system, initial value sensitivity, aperiodicity, non-linear and unpredictability, the image encryption method based on chaos has advantage in security, adaptability, obtains in recent years and studies widely.
At present, New chaotic image encryption method can be divided into two classes by the method for encrypted image: image pixel values transformation and pixel coordinate conversion.Image pixel values transformation carrys out encrypted image by change image intensity value, and pixel coordinate conversion changes encryption picture by change image pixel coordinates.But all with expressly image is irrelevant for the encryption key of these traditional two kinds of encryption methods, so be difficult to resist known plain text attack.
In addition, the conventional at present encryption method based on chaos image uses dual image encryption.Although dual image is encrypted in image encryption to use have the high advantage of encryption complexity, there is algorithm and take the shortcomings such as the large and practical application of storage space is inconvenient.Use single image is encrypted, and cryptographic algorithm takes up room little and practical application convenient, and relative dual image is encrypted in the aspects such as image encryption efficiency and security and has certain advantage.
Summary of the invention
The object of this invention is to provide that a kind of cipher round results is good, security is high based on the color image encrypting method of chaos system and fraction Fourier conversion.
The present invention is achieved by the following technical solutions:
Based on a color image encrypting method for chaos system and fraction Fourier conversion, comprise following step:
Step one: input is of a size of the plaintext colour element image I of M × N in, extract three chrominance channel matrix R of expressly colour element image, G, B connect into the matrix I of a 3M × N in turn irgb;
Step 2: by initial parameter λ 1with primary iteration value x 0substitute into Logistic chaos system iteration m+3MN time, ignore front m iteration result, obtain chaos sequence x={x m+1, x m+2..., x m+3MN, all values of chaos sequence x is sorted, obtains new sequence and obtain sequence in the position T of each element value in former chaos sequence x 1={ t 1, t 2..., t 3MN, namely x i = x ‾ t i ( i = 1,2 , . . . , 3 MN ) ;
Step 3: to matrix I irgbcarry out overall pixel permutation, by matrix I irgbbe transformed into the matrix I of 3MN × 1 t, by I tall row according to T 1rearrange, by I tt 1row moves to the first row, by I tt 2row moves to the second row, by that analogy, until by I tt 3MNrow moves to last column, obtains matrix I 1;
Step 4: by matrix I 1be divided into two matrix I 11and I 12, allow matrix I 11as mould, matrix I 12a complex matrix is formed as phase angle I e = I 11 e jπ I 12 ;
Step 5: by complex matrix I ecarry out the fraction Fourier conversion that rotation angle is α, obtain complex matrix I 2;
Step 6: extract complex matrix I 2mould and phase angle, obtain matrix I 21and I 22, by matrix I 21and I 22be merged into the matrix I of 3MN × 1 3;
Step 7: substitute into initial parameter λ 2with primary iteration value y 0, repeat step 2 to step 3, obtain matrix I orgb;
Step 8: by I orgbbe divided into the matrix of 3 isometric MN × 1 and rearrange, obtaining the matrix I of M × N or, I og, I ob, and three matrix compounds are finally obtained ciphertext graph as I out.
Beneficial effect of the present invention is:
1, adopt single image encryption, algorithm takes up room little, and cryptographic algorithm travelling speed is fast.Namely dual image cryptographic algorithm encryption times is 2.367s, and decryption time is 2.376s; Encryption times of the present invention is 0.674s, and decryption time is 0.688s.
2, make use of two chaos system and have more complicated dynamics and the advantage of greater security, overcoming single chaos system, to carry out the key space of image encryption little, the shortcoming that security is low.Namely adopt two chaos system (cipher key number is 6), precision is 10 -15key space is 10 90, much larger than 2 128, key space enough resists known various attack.
3, utilize overall pixel permutation and fraction Fourier conversion encrypted pixel gray-scale value, greatly reduce the correlativity between ciphertext pixel value.Namely between original image pixel, correlativity is more than 99%, and the present invention encrypts rear image slices vegetarian refreshments correlativity and reduces to less than 2%.
Accompanying drawing explanation
Fig. 1 is the inventive method process flow diagram;
Fig. 2 a is Lena original image;
Fig. 2 b is the R channel image of Fig. 2 a;
Fig. 2 c is the G channel image of Fig. 2 a;
Fig. 2 d is the channel B image of Fig. 2 a;
Fig. 3 a is the encrypted image of Fig. 2 a;
Fig. 3 b is the R channel image of Fig. 3 a;
Fig. 3 c is the G channel image of Fig. 3 a;
Fig. 3 d is the channel B image of Fig. 3 a;
Fig. 4 a is the correct decrypted image of Fig. 3 a;
Fig. 4 b is the wrong parameter x of Fig. 4 a 0decrypted image;
Fig. 4 c is the wrong parameter y of Fig. 4 a 0decrypted image;
Fig. 4 d is the wrong parameter λ of Fig. 4 a 1decrypted image;
Fig. 4 e is the wrong parameter λ of Fig. 4 a 2decrypted image;
Fig. 5 a is that Fig. 3 a hides 20% image;
Fig. 5 b is Fig. 3 a interpolation mean square deviation is 0.05 Gaussian noise image;
Fig. 5 c is the decrypted image of Fig. 5 a;
Fig. 5 d is the decrypted image of Fig. 5 b;
Fig. 6 a is original image and encrypted image R, G, B each passage pixel interdependence table;
Fig. 6 b is R, G, same position pixel interdependence table between channel B;
Fig. 6 c is R, G, pixel interdependence table in adjacent position between channel B.
Embodiment
Below in conjunction with accompanying drawing, the present invention is described in further details.
As shown in Figure 1 based on a color image encrypting method for chaos system and fraction Fourier conversion, comprise the steps:
S1: known-plaintext colour element image I in(.bmp form), picture size is M × N, and extract three chrominance channel matrix R of image, G, B connect and compose the matrix I of a 3M × N in turn irgb.
S2: initial parameter λ is set 1with primary iteration value x 0, substitute into Logistic chaos system iteration m+3MN time.Ignore front m iteration result to avoid deleterious effect, obtain chaos sequence x={x m+1, x m+2..., x m+3MN.
S3: sorted by all values of chaos sequence x, obtains new sequence and obtain sequence in the position T of each element value in former sequence x 1={ t 1, t 2..., t 3MN, namely
S4: to I irgbcarry out overall pixel permutation, that is, by I irgbbe transformed into the matrix I of 3MN × 1 t, by I tall row according to T 1rearrange, by I tt 1row moves to the first row, just I tt 2row moves to the second row, by that analogy, until by I tt 3MNrow moves to last column, and now we obtain matrix I 1.
S5: by I 1be divided into two parts I 11and I 12, allow I 11the I as mould 12a complex matrix is formed, namely as phase angle now we obtain matrix I e.
S6: by I ecarry out the fraction Fourier conversion (DFrFT that rotation angle is α α), now we obtain matrix I 2.
S7: extract complex matrix I 2mould and phase angle, obtain matrix I respectively 21and I 22, by I 21and I 22be merged into the matrix of 3MN × 1, now we obtain matrix I 3.
S8: initial parameter λ is set 2with primary iteration value y 0, repeat step S2-S4, now we obtain matrix I orgb.
S9: by I orgbbe divided into the matrix of 3 isometric MN × 1 and rearrange, obtaining the matrix I of M × N or, I og, I ob, their compound is finally obtained ciphertext graph as I out(.bmp form).
MATLAB software is used to emulate the image encryption method that the present invention proposes, expressly image selection standard test coloured image Lena, picture size 256 × 256) as shown in Figure 2 a, the encryption based on chaos system and fraction Fourier conversion is carried out to it, key parameter is x 0=0.8927, y 0=0.7035, m=300, n=349, α=0.5000, λ 1=3.9735, λ 2the encryption of=3.9824, and analytical performance.Fig. 2 b is the R channel image of Fig. 2 a, and Fig. 2 c is the G channel image of Fig. 2 a, and Fig. 2 d is the channel B image of Fig. 2 a.
First by expressly image is according to step S1-S9, obtain encrypted image as shown in Figure 3 a, Fig. 3 b is the R channel image of Fig. 3 a, and Fig. 3 c is the G channel image of Fig. 3 a, and Fig. 3 d is the channel B image of Fig. 3 a.
Key sensitivity analysis is tested: use correct key x 0=0.8927, y 0=0.7035, m=300, n=349, α=0.5000, λ 1=3.9735, λ 2=3.9824 deciphering, obtain decrypted image as Fig. 4 a, respectively mistake in key x 0=0.8927+10 -15, y 0=0.7035+10 -15, λ 1=3.9735+10 -15, λ 2=3.9824+10 -15obtain decrypted result image as Fig. 4 b, Fig. 4 c, Fig. 4 d, Fig. 4 e.As can be seen from decrypted result, key susceptibility is high, and key space is large, can keep out cipher key attacks.
Encryption method attack tolerant analytical test: hide 20% as Fig. 5 a to encrypted result image graph 3a, it is decrypted, obtains decrypted result figure as Fig. 5 c; To encrypted result image graph 3a add mean square deviation be the Gaussian noise of 0.05 as Fig. 5 b, it is decrypted, obtains decrypted result figure as Fig. 5 d.As can be seen from decrypted result, encrypted image still can effectively be deciphered after receiving certain attack, and show that encryption method robustness is good, attack tolerant is high.
Pixel interdependence analytical test: the correlativity of neighbor can reflect the diffusion of image pixel, and in original plaintext image, the correlativity of adjacent two pixels is usually very large, allows the relative coefficient of encrypted image neighbor close to zero as far as possible.Table 1 is original image and encrypted image R, each passage pixel interdependence of G, B, and table 2 is R, G, same position pixel interdependence between channel B, and table 3 is R, G, adjacent position pixel interdependence between channel B.As can be seen from above form, original image correlativity is comparatively strong, and encrypted image correlativity is more weak, and security is high.
Decrypting process:
Image decryption process is the inverse process of image encryption process.
In the present invention, decrypting process can use key x 0=0.8927, y 0=0.7035, m=300, n=349, α=0.5000, λ 1=3.9735, λ 2=3.9824, by completing deciphering with the process of ciphering process contrary.
Such as, image to be encrypted is standard testing color Lena image, picture size 256 × 256, and the key carried out based on chaos system and fraction Fourier conversion it is x 0, y 0, m, n, α, λ 1, λ 2color image encryption, then deciphering time also can use key parameter x 0, y 0, m, n, α, λ 1, λ 2the process participating in ciphering process contrary is decrypted.
A kind of encryption method based on chaos system and fraction Fourier conversion provided by the invention, security is high, and antidecoding capability is strong, for image encryption provides a new solution, using image to carry out the occasion communicated, this encryption method has very high use value.

Claims (1)

1., based on a color image encrypting method for chaos system and fraction Fourier conversion, it is characterized in that, comprise following step:
Step one: input is of a size of the plaintext colour element image I of M × N in, extract three chrominance channel matrix R of expressly colour element image, G, B connect into the matrix I of a 3M × N in turn irgb;
Step 2: by initial parameter λ 1with primary iteration value x 0substitute into Logistic chaos system iteration m+3MN time, ignore front m iteration result, obtain chaos sequence x={x m+1, x m+2..., x m+3MN, all values of chaos sequence x is sorted, obtains new sequence and obtain sequence in the position T of each element value in former chaos sequence x 1={ t 1, t 2..., t 3MN, namely x i = x ‾ t i ( i = 1,2 , . . . , 3 MN ) ;
Step 3: to matrix I irgbcarry out overall pixel permutation, by matrix I irgbbe transformed into the matrix I of 3MN × 1 t, by I tall row according to T 1rearrange, by I tt 1row moves to the first row, by I tt 2row moves to the second row, by that analogy, until by I tt 3MNrow moves to last column, obtains matrix I 1;
Step 4: by matrix I 1be divided into two matrix I 11and I 12, allow matrix I 11as mould, matrix I 12a complex matrix is formed as phase angle I e = I 11 e jπ I 12 ;
Step 5: by complex matrix I ecarry out the fraction Fourier conversion that rotation angle is α, obtain complex matrix I 2;
Step 6: extract complex matrix I 2mould and phase angle, obtain matrix I 21and I 22, by matrix I 21and I 22be merged into the matrix I of 3MN × 1 3;
Step 7: substitute into initial parameter λ 2with primary iteration value y 0, repeat step 2 to step 3, obtain matrix I orgb;
Step 8: by I orgbbe divided into the matrix of 3 isometric MN × 1 and rearrange, obtaining the matrix I of M × N or, I og, I ob, and three matrix compounds are finally obtained ciphertext graph as I out.
CN201410486126.4A 2014-09-22 2014-09-22 A kind of color image encrypting method based on chaos system and fraction Fourier conversion Expired - Fee Related CN104240177B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410486126.4A CN104240177B (en) 2014-09-22 2014-09-22 A kind of color image encrypting method based on chaos system and fraction Fourier conversion

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410486126.4A CN104240177B (en) 2014-09-22 2014-09-22 A kind of color image encrypting method based on chaos system and fraction Fourier conversion

Publications (2)

Publication Number Publication Date
CN104240177A true CN104240177A (en) 2014-12-24
CN104240177B CN104240177B (en) 2017-07-11

Family

ID=52228189

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410486126.4A Expired - Fee Related CN104240177B (en) 2014-09-22 2014-09-22 A kind of color image encrypting method based on chaos system and fraction Fourier conversion

Country Status (1)

Country Link
CN (1) CN104240177B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104700348A (en) * 2015-03-13 2015-06-10 哈尔滨工程大学 Colorful image self-adaption encrypting method based on high-order chaotic system
CN104809685A (en) * 2015-05-13 2015-07-29 哈尔滨工程大学 Color image one-time-key DNA (Deoxyribonucleic Acid) encryption method based on six-dimensional chaotic system
CN105979116A (en) * 2016-03-31 2016-09-28 首都师范大学 Color image authentication method and system based on hypercomplex number encrypted domain sparse representation
CN108270944A (en) * 2018-01-02 2018-07-10 北京邮电大学 A kind of method and device of the digital image encryption based on fractional order transformation

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6064738A (en) * 1996-12-10 2000-05-16 The Research Foundation Of State University Of New York Method for encrypting and decrypting data using chaotic maps
US20070076868A1 (en) * 2005-09-30 2007-04-05 Konica Minolta Systems Laboratory, Inc. Method and apparatus for image encryption and embedding and related applications
CN101604439A (en) * 2008-06-13 2009-12-16 西北工业大学 A kind of color image encrypting method based on multi-chaos system
CN102982499A (en) * 2012-09-28 2013-03-20 河南大学 Color image encryption and decryption method based on multiple-fractional-order chaotic systems
CN103020891A (en) * 2012-12-21 2013-04-03 东华大学 Color image encryption method based on compound chaotic sequence and shifting

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6064738A (en) * 1996-12-10 2000-05-16 The Research Foundation Of State University Of New York Method for encrypting and decrypting data using chaotic maps
US20070076868A1 (en) * 2005-09-30 2007-04-05 Konica Minolta Systems Laboratory, Inc. Method and apparatus for image encryption and embedding and related applications
CN101604439A (en) * 2008-06-13 2009-12-16 西北工业大学 A kind of color image encrypting method based on multi-chaos system
CN102982499A (en) * 2012-09-28 2013-03-20 河南大学 Color image encryption and decryption method based on multiple-fractional-order chaotic systems
CN103020891A (en) * 2012-12-21 2013-04-03 东华大学 Color image encryption method based on compound chaotic sequence and shifting

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
崔得龙等: "一种基于分数阶傅里叶变换的改进图像加密算法", 《成都信息工程学院学报》 *
左敬龙等: "基于混沌系统和分数阶傅里叶变换的图像加密算法", 《计算机与现代化》 *

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104700348A (en) * 2015-03-13 2015-06-10 哈尔滨工程大学 Colorful image self-adaption encrypting method based on high-order chaotic system
CN104700348B (en) * 2015-03-13 2017-11-21 哈尔滨工程大学 A kind of color image-adaptive encryption method based on high-order chaos system
CN104809685A (en) * 2015-05-13 2015-07-29 哈尔滨工程大学 Color image one-time-key DNA (Deoxyribonucleic Acid) encryption method based on six-dimensional chaotic system
CN104809685B (en) * 2015-05-13 2018-08-17 哈尔滨工程大学 A kind of coloured image one time key DNA encryption methods based on 6 dimension chaos systems
CN105979116A (en) * 2016-03-31 2016-09-28 首都师范大学 Color image authentication method and system based on hypercomplex number encrypted domain sparse representation
CN105979116B (en) * 2016-03-31 2019-01-29 首都师范大学 The color image authentication method and system of supercomplex encrypted domain rarefaction representation
CN108270944A (en) * 2018-01-02 2018-07-10 北京邮电大学 A kind of method and device of the digital image encryption based on fractional order transformation

Also Published As

Publication number Publication date
CN104240177B (en) 2017-07-11

Similar Documents

Publication Publication Date Title
Xian et al. Image encryption based on chaotic sub-block scrambling and chaotic digit selection diffusion
Mansouri et al. A novel one-dimensional sine powered chaotic map and its application in a new image encryption scheme
Gao et al. EFR-CSTP: Encryption for face recognition based on the chaos and semi-tensor product theory
Wang et al. Cryptanalysis and enhancements of image encryption using combination of the 1D chaotic map
Kang et al. Color image encryption using pixel scrambling operator and reality-preserving MPFRHT
Bakhshandeh et al. An authenticated image encryption scheme based on chaotic maps and memory cellular automata
CN101739695B (en) Three-dimensional Arnold mapping-based image grouping encryption method
Shatheesh Sam et al. An intertwining chaotic maps based image encryption scheme
CN102693523B (en) Image two-grade encrypting method based on double-chaos system
Xue et al. Region of interest encryption for color images based on a hyperchaotic system with three positive Lyapunov exponets
Belazi et al. Algebraic analysis of a RGB image encryption algorithm based on DNA encoding and chaotic map
CN103679625A (en) Single-channel color image encryption method based on chaos and phase retrieval process
CN104734842A (en) Resisting method of circuit on side channel attack based on pseudo-operation
CN104202145A (en) Plaintext or ciphertext selection based side channel power analysis attack method on round function output of SM4 cipher algorithm
EP3096488B1 (en) Hypersphere-based multivariable public key encryption/decryption system and method
Es-Sabry et al. A new color image encryption algorithm using multiple chaotic maps with the intersecting planes method
CN101604439A (en) A kind of color image encrypting method based on multi-chaos system
CN104809685A (en) Color image one-time-key DNA (Deoxyribonucleic Acid) encryption method based on six-dimensional chaotic system
Zanin et al. Gray code permutation algorithm for high-dimensional data encryption
CN103455971A (en) Image encryption method combining three-dimensional Arnold transformation with chaotic sequence
CN104734845A (en) Side-channel attack protection method based on full-encryption algorithm pseudo-operation
CN104240177A (en) Colored image encryption method based on chaotic system and fractional order Fourier transform
CN104182926B (en) Color image encrypting method based on Hilbert conversion and chaos Liu algorithms
Irfan et al. Image encryption using combination of chaotic system and rivers shamir adleman (RSA)
CN104050625B (en) A kind of plaintext builds the composite chaotic image encryption method of initial key

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20170711

CF01 Termination of patent right due to non-payment of annual fee