CN104240177A - Colored image encryption method based on chaotic system and fractional order Fourier transform - Google Patents
Colored image encryption method based on chaotic system and fractional order Fourier transform Download PDFInfo
- Publication number
- CN104240177A CN104240177A CN201410486126.4A CN201410486126A CN104240177A CN 104240177 A CN104240177 A CN 104240177A CN 201410486126 A CN201410486126 A CN 201410486126A CN 104240177 A CN104240177 A CN 104240177A
- Authority
- CN
- China
- Prior art keywords
- matrix
- image
- encryption
- fourier transform
- row
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 32
- 230000000739 chaotic effect Effects 0.000 title abstract description 8
- 239000011159 matrix material Substances 0.000 claims abstract description 60
- 238000006243 chemical reaction Methods 0.000 claims description 15
- 150000001875 compounds Chemical class 0.000 claims description 3
- 230000000694 effects Effects 0.000 abstract 1
- 230000008569 process Effects 0.000 description 10
- 230000008901 benefit Effects 0.000 description 4
- 230000009977 dual effect Effects 0.000 description 4
- 238000004458 analytical method Methods 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 238000013478 data encryption standard Methods 0.000 description 2
- 238000012360 testing method Methods 0.000 description 2
- 230000009466 transformation Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000002939 deleterious effect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000009792 diffusion process Methods 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 230000035945 sensitivity Effects 0.000 description 1
- 238000010206 sensitivity analysis Methods 0.000 description 1
Landscapes
- Facsimile Transmission Control (AREA)
- Image Analysis (AREA)
Abstract
The invention discloses a colored image encryption method based on a chaotic system and the fractional order Fourier transform and relates to the field of the image encryption systems. The method comprises the steps that the Logistic chaotic system is utilized for generating a chaotic sequence at first, and global pixel scrambling is carried out on a regrouped colored image matrix; then the fractional order Fourier transform is carried out on the result obtained in the last step; finally, the Logistic chaotic system is utilized again for generating a chaotic sequence, global pixel scrambling is carried out on the regrouped matrix with the module length and phase angle extracted in the last step, and therefore image encryption is achieved. According to the colored image encryption method based on the chaotic system and the fractional order Fourier transform, one image is introduced for building a complex matrix, algorithm space occupation caused when two images are adopted for building a complex matrix is reduced, global pixel scrambling and the fractional order Fourier transform are introduced for pixel value encryption, the image pixel point relevancy is lowered, algorithm anti-interference performance and anti-attacking performance are improved, the encryption effect is good, and safety is high.
Description
Technical field
The invention belongs to image procossing and information security field, particularly relate to a kind of color image encrypting method based on chaos system and fraction Fourier conversion adopting single image cipher mode.
Background technology
Along with developing rapidly of computer networking technology, information security has become the serious problems of information transmission and storage, and image information transmission and image encryption technology all attract wide attention.It is large that image information itself has data volume, degree of correlation high between data, traditional encryption method for plain text information, as data encryption standards (DES), IDEA, rivest, shamir, adelman RSA etc., and is not exclusively applicable to image encryption.The features such as to have key space large due to chaos system, initial value sensitivity, aperiodicity, non-linear and unpredictability, the image encryption method based on chaos has advantage in security, adaptability, obtains in recent years and studies widely.
At present, New chaotic image encryption method can be divided into two classes by the method for encrypted image: image pixel values transformation and pixel coordinate conversion.Image pixel values transformation carrys out encrypted image by change image intensity value, and pixel coordinate conversion changes encryption picture by change image pixel coordinates.But all with expressly image is irrelevant for the encryption key of these traditional two kinds of encryption methods, so be difficult to resist known plain text attack.
In addition, the conventional at present encryption method based on chaos image uses dual image encryption.Although dual image is encrypted in image encryption to use have the high advantage of encryption complexity, there is algorithm and take the shortcomings such as the large and practical application of storage space is inconvenient.Use single image is encrypted, and cryptographic algorithm takes up room little and practical application convenient, and relative dual image is encrypted in the aspects such as image encryption efficiency and security and has certain advantage.
Summary of the invention
The object of this invention is to provide that a kind of cipher round results is good, security is high based on the color image encrypting method of chaos system and fraction Fourier conversion.
The present invention is achieved by the following technical solutions:
Based on a color image encrypting method for chaos system and fraction Fourier conversion, comprise following step:
Step one: input is of a size of the plaintext colour element image I of M × N
in, extract three chrominance channel matrix R of expressly colour element image, G, B connect into the matrix I of a 3M × N in turn
irgb;
Step 2: by initial parameter λ
1with primary iteration value x
0substitute into Logistic chaos system iteration m+3MN time, ignore front m iteration result, obtain chaos sequence x={x
m+1, x
m+2..., x
m+3MN, all values of chaos sequence x is sorted, obtains new sequence
and obtain sequence
in the position T of each element value in former chaos sequence x
1={ t
1, t
2..., t
3MN, namely
Step 3: to matrix I
irgbcarry out overall pixel permutation, by matrix I
irgbbe transformed into the matrix I of 3MN × 1
t, by I
tall row according to T
1rearrange, by I
tt
1row moves to the first row, by I
tt
2row moves to the second row, by that analogy, until by I
tt
3MNrow moves to last column, obtains matrix I
1;
Step 4: by matrix I
1be divided into two matrix I
11and I
12, allow matrix I
11as mould, matrix I
12a complex matrix is formed as phase angle
Step 5: by complex matrix I
ecarry out the fraction Fourier conversion that rotation angle is α, obtain complex matrix I
2;
Step 6: extract complex matrix I
2mould and phase angle, obtain matrix I
21and I
22, by matrix I
21and I
22be merged into the matrix I of 3MN × 1
3;
Step 7: substitute into initial parameter λ
2with primary iteration value y
0, repeat step 2 to step 3, obtain matrix I
orgb;
Step 8: by I
orgbbe divided into the matrix of 3 isometric MN × 1 and rearrange, obtaining the matrix I of M × N
or, I
og, I
ob, and three matrix compounds are finally obtained ciphertext graph as I
out.
Beneficial effect of the present invention is:
1, adopt single image encryption, algorithm takes up room little, and cryptographic algorithm travelling speed is fast.Namely dual image cryptographic algorithm encryption times is 2.367s, and decryption time is 2.376s; Encryption times of the present invention is 0.674s, and decryption time is 0.688s.
2, make use of two chaos system and have more complicated dynamics and the advantage of greater security, overcoming single chaos system, to carry out the key space of image encryption little, the shortcoming that security is low.Namely adopt two chaos system (cipher key number is 6), precision is 10
-15key space is 10
90, much larger than 2
128, key space enough resists known various attack.
3, utilize overall pixel permutation and fraction Fourier conversion encrypted pixel gray-scale value, greatly reduce the correlativity between ciphertext pixel value.Namely between original image pixel, correlativity is more than 99%, and the present invention encrypts rear image slices vegetarian refreshments correlativity and reduces to less than 2%.
Accompanying drawing explanation
Fig. 1 is the inventive method process flow diagram;
Fig. 2 a is Lena original image;
Fig. 2 b is the R channel image of Fig. 2 a;
Fig. 2 c is the G channel image of Fig. 2 a;
Fig. 2 d is the channel B image of Fig. 2 a;
Fig. 3 a is the encrypted image of Fig. 2 a;
Fig. 3 b is the R channel image of Fig. 3 a;
Fig. 3 c is the G channel image of Fig. 3 a;
Fig. 3 d is the channel B image of Fig. 3 a;
Fig. 4 a is the correct decrypted image of Fig. 3 a;
Fig. 4 b is the wrong parameter x of Fig. 4 a
0decrypted image;
Fig. 4 c is the wrong parameter y of Fig. 4 a
0decrypted image;
Fig. 4 d is the wrong parameter λ of Fig. 4 a
1decrypted image;
Fig. 4 e is the wrong parameter λ of Fig. 4 a
2decrypted image;
Fig. 5 a is that Fig. 3 a hides 20% image;
Fig. 5 b is Fig. 3 a interpolation mean square deviation is 0.05 Gaussian noise image;
Fig. 5 c is the decrypted image of Fig. 5 a;
Fig. 5 d is the decrypted image of Fig. 5 b;
Fig. 6 a is original image and encrypted image R, G, B each passage pixel interdependence table;
Fig. 6 b is R, G, same position pixel interdependence table between channel B;
Fig. 6 c is R, G, pixel interdependence table in adjacent position between channel B.
Embodiment
Below in conjunction with accompanying drawing, the present invention is described in further details.
As shown in Figure 1 based on a color image encrypting method for chaos system and fraction Fourier conversion, comprise the steps:
S1: known-plaintext colour element image I
in(.bmp form), picture size is M × N, and extract three chrominance channel matrix R of image, G, B connect and compose the matrix I of a 3M × N in turn
irgb.
S2: initial parameter λ is set
1with primary iteration value x
0, substitute into Logistic chaos system iteration m+3MN time.Ignore front m iteration result to avoid deleterious effect, obtain chaos sequence x={x
m+1, x
m+2..., x
m+3MN.
S3: sorted by all values of chaos sequence x, obtains new sequence
and obtain sequence
in the position T of each element value in former sequence x
1={ t
1, t
2..., t
3MN, namely
S4: to I
irgbcarry out overall pixel permutation, that is, by I
irgbbe transformed into the matrix I of 3MN × 1
t, by I
tall row according to T
1rearrange, by I
tt
1row moves to the first row, just I
tt
2row moves to the second row, by that analogy, until by I
tt
3MNrow moves to last column, and now we obtain matrix I
1.
S5: by I
1be divided into two parts I
11and I
12, allow I
11the I as mould
12a complex matrix is formed, namely as phase angle
now we obtain matrix I
e.
S6: by I
ecarry out the fraction Fourier conversion (DFrFT that rotation angle is α
α), now we obtain matrix I
2.
S7: extract complex matrix I
2mould and phase angle, obtain matrix I respectively
21and I
22, by I
21and I
22be merged into the matrix of 3MN × 1, now we obtain matrix I
3.
S8: initial parameter λ is set
2with primary iteration value y
0, repeat step S2-S4, now we obtain matrix I
orgb.
S9: by I
orgbbe divided into the matrix of 3 isometric MN × 1 and rearrange, obtaining the matrix I of M × N
or, I
og, I
ob, their compound is finally obtained ciphertext graph as I
out(.bmp form).
MATLAB software is used to emulate the image encryption method that the present invention proposes, expressly image selection standard test coloured image Lena, picture size 256 × 256) as shown in Figure 2 a, the encryption based on chaos system and fraction Fourier conversion is carried out to it, key parameter is x
0=0.8927, y
0=0.7035, m=300, n=349, α=0.5000, λ
1=3.9735, λ
2the encryption of=3.9824, and analytical performance.Fig. 2 b is the R channel image of Fig. 2 a, and Fig. 2 c is the G channel image of Fig. 2 a, and Fig. 2 d is the channel B image of Fig. 2 a.
First by expressly image is according to step S1-S9, obtain encrypted image as shown in Figure 3 a, Fig. 3 b is the R channel image of Fig. 3 a, and Fig. 3 c is the G channel image of Fig. 3 a, and Fig. 3 d is the channel B image of Fig. 3 a.
Key sensitivity analysis is tested: use correct key x
0=0.8927, y
0=0.7035, m=300, n=349, α=0.5000, λ
1=3.9735, λ
2=3.9824 deciphering, obtain decrypted image as Fig. 4 a, respectively mistake in key x
0=0.8927+10
-15, y
0=0.7035+10
-15, λ
1=3.9735+10
-15, λ
2=3.9824+10
-15obtain decrypted result image as Fig. 4 b, Fig. 4 c, Fig. 4 d, Fig. 4 e.As can be seen from decrypted result, key susceptibility is high, and key space is large, can keep out cipher key attacks.
Encryption method attack tolerant analytical test: hide 20% as Fig. 5 a to encrypted result image graph 3a, it is decrypted, obtains decrypted result figure as Fig. 5 c; To encrypted result image graph 3a add mean square deviation be the Gaussian noise of 0.05 as Fig. 5 b, it is decrypted, obtains decrypted result figure as Fig. 5 d.As can be seen from decrypted result, encrypted image still can effectively be deciphered after receiving certain attack, and show that encryption method robustness is good, attack tolerant is high.
Pixel interdependence analytical test: the correlativity of neighbor can reflect the diffusion of image pixel, and in original plaintext image, the correlativity of adjacent two pixels is usually very large, allows the relative coefficient of encrypted image neighbor close to zero as far as possible.Table 1 is original image and encrypted image R, each passage pixel interdependence of G, B, and table 2 is R, G, same position pixel interdependence between channel B, and table 3 is R, G, adjacent position pixel interdependence between channel B.As can be seen from above form, original image correlativity is comparatively strong, and encrypted image correlativity is more weak, and security is high.
Decrypting process:
Image decryption process is the inverse process of image encryption process.
In the present invention, decrypting process can use key x
0=0.8927, y
0=0.7035, m=300, n=349, α=0.5000, λ
1=3.9735, λ
2=3.9824, by completing deciphering with the process of ciphering process contrary.
Such as, image to be encrypted is standard testing color Lena image, picture size 256 × 256, and the key carried out based on chaos system and fraction Fourier conversion it is x
0, y
0, m, n, α, λ
1, λ
2color image encryption, then deciphering time also can use key parameter x
0, y
0, m, n, α, λ
1, λ
2the process participating in ciphering process contrary is decrypted.
A kind of encryption method based on chaos system and fraction Fourier conversion provided by the invention, security is high, and antidecoding capability is strong, for image encryption provides a new solution, using image to carry out the occasion communicated, this encryption method has very high use value.
Claims (1)
1., based on a color image encrypting method for chaos system and fraction Fourier conversion, it is characterized in that, comprise following step:
Step one: input is of a size of the plaintext colour element image I of M × N
in, extract three chrominance channel matrix R of expressly colour element image, G, B connect into the matrix I of a 3M × N in turn
irgb;
Step 2: by initial parameter λ
1with primary iteration value x
0substitute into Logistic chaos system iteration m+3MN time, ignore front m iteration result, obtain chaos sequence x={x
m+1, x
m+2..., x
m+3MN, all values of chaos sequence x is sorted, obtains new sequence
and obtain sequence
in the position T of each element value in former chaos sequence x
1={ t
1, t
2..., t
3MN, namely
Step 3: to matrix I
irgbcarry out overall pixel permutation, by matrix I
irgbbe transformed into the matrix I of 3MN × 1
t, by I
tall row according to T
1rearrange, by I
tt
1row moves to the first row, by I
tt
2row moves to the second row, by that analogy, until by I
tt
3MNrow moves to last column, obtains matrix I
1;
Step 4: by matrix I
1be divided into two matrix I
11and I
12, allow matrix I
11as mould, matrix I
12a complex matrix is formed as phase angle
Step 5: by complex matrix I
ecarry out the fraction Fourier conversion that rotation angle is α, obtain complex matrix I
2;
Step 6: extract complex matrix I
2mould and phase angle, obtain matrix I
21and I
22, by matrix I
21and I
22be merged into the matrix I of 3MN × 1
3;
Step 7: substitute into initial parameter λ
2with primary iteration value y
0, repeat step 2 to step 3, obtain matrix I
orgb;
Step 8: by I
orgbbe divided into the matrix of 3 isometric MN × 1 and rearrange, obtaining the matrix I of M × N
or, I
og, I
ob, and three matrix compounds are finally obtained ciphertext graph as I
out.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410486126.4A CN104240177B (en) | 2014-09-22 | 2014-09-22 | A kind of color image encrypting method based on chaos system and fraction Fourier conversion |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410486126.4A CN104240177B (en) | 2014-09-22 | 2014-09-22 | A kind of color image encrypting method based on chaos system and fraction Fourier conversion |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104240177A true CN104240177A (en) | 2014-12-24 |
CN104240177B CN104240177B (en) | 2017-07-11 |
Family
ID=52228189
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410486126.4A Expired - Fee Related CN104240177B (en) | 2014-09-22 | 2014-09-22 | A kind of color image encrypting method based on chaos system and fraction Fourier conversion |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104240177B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104700348A (en) * | 2015-03-13 | 2015-06-10 | 哈尔滨工程大学 | Colorful image self-adaption encrypting method based on high-order chaotic system |
CN104809685A (en) * | 2015-05-13 | 2015-07-29 | 哈尔滨工程大学 | Color image one-time-key DNA (Deoxyribonucleic Acid) encryption method based on six-dimensional chaotic system |
CN105979116A (en) * | 2016-03-31 | 2016-09-28 | 首都师范大学 | Color image authentication method and system based on hypercomplex number encrypted domain sparse representation |
CN108270944A (en) * | 2018-01-02 | 2018-07-10 | 北京邮电大学 | A kind of method and device of the digital image encryption based on fractional order transformation |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6064738A (en) * | 1996-12-10 | 2000-05-16 | The Research Foundation Of State University Of New York | Method for encrypting and decrypting data using chaotic maps |
US20070076868A1 (en) * | 2005-09-30 | 2007-04-05 | Konica Minolta Systems Laboratory, Inc. | Method and apparatus for image encryption and embedding and related applications |
CN101604439A (en) * | 2008-06-13 | 2009-12-16 | 西北工业大学 | A kind of color image encrypting method based on multi-chaos system |
CN102982499A (en) * | 2012-09-28 | 2013-03-20 | 河南大学 | Color image encryption and decryption method based on multiple-fractional-order chaotic systems |
CN103020891A (en) * | 2012-12-21 | 2013-04-03 | 东华大学 | Color image encryption method based on compound chaotic sequence and shifting |
-
2014
- 2014-09-22 CN CN201410486126.4A patent/CN104240177B/en not_active Expired - Fee Related
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6064738A (en) * | 1996-12-10 | 2000-05-16 | The Research Foundation Of State University Of New York | Method for encrypting and decrypting data using chaotic maps |
US20070076868A1 (en) * | 2005-09-30 | 2007-04-05 | Konica Minolta Systems Laboratory, Inc. | Method and apparatus for image encryption and embedding and related applications |
CN101604439A (en) * | 2008-06-13 | 2009-12-16 | 西北工业大学 | A kind of color image encrypting method based on multi-chaos system |
CN102982499A (en) * | 2012-09-28 | 2013-03-20 | 河南大学 | Color image encryption and decryption method based on multiple-fractional-order chaotic systems |
CN103020891A (en) * | 2012-12-21 | 2013-04-03 | 东华大学 | Color image encryption method based on compound chaotic sequence and shifting |
Non-Patent Citations (2)
Title |
---|
崔得龙等: "一种基于分数阶傅里叶变换的改进图像加密算法", 《成都信息工程学院学报》 * |
左敬龙等: "基于混沌系统和分数阶傅里叶变换的图像加密算法", 《计算机与现代化》 * |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104700348A (en) * | 2015-03-13 | 2015-06-10 | 哈尔滨工程大学 | Colorful image self-adaption encrypting method based on high-order chaotic system |
CN104700348B (en) * | 2015-03-13 | 2017-11-21 | 哈尔滨工程大学 | A kind of color image-adaptive encryption method based on high-order chaos system |
CN104809685A (en) * | 2015-05-13 | 2015-07-29 | 哈尔滨工程大学 | Color image one-time-key DNA (Deoxyribonucleic Acid) encryption method based on six-dimensional chaotic system |
CN104809685B (en) * | 2015-05-13 | 2018-08-17 | 哈尔滨工程大学 | A kind of coloured image one time key DNA encryption methods based on 6 dimension chaos systems |
CN105979116A (en) * | 2016-03-31 | 2016-09-28 | 首都师范大学 | Color image authentication method and system based on hypercomplex number encrypted domain sparse representation |
CN105979116B (en) * | 2016-03-31 | 2019-01-29 | 首都师范大学 | The color image authentication method and system of supercomplex encrypted domain rarefaction representation |
CN108270944A (en) * | 2018-01-02 | 2018-07-10 | 北京邮电大学 | A kind of method and device of the digital image encryption based on fractional order transformation |
Also Published As
Publication number | Publication date |
---|---|
CN104240177B (en) | 2017-07-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Xian et al. | Image encryption based on chaotic sub-block scrambling and chaotic digit selection diffusion | |
Mansouri et al. | A novel one-dimensional sine powered chaotic map and its application in a new image encryption scheme | |
Gao et al. | EFR-CSTP: Encryption for face recognition based on the chaos and semi-tensor product theory | |
Wang et al. | Cryptanalysis and enhancements of image encryption using combination of the 1D chaotic map | |
Kang et al. | Color image encryption using pixel scrambling operator and reality-preserving MPFRHT | |
Bakhshandeh et al. | An authenticated image encryption scheme based on chaotic maps and memory cellular automata | |
CN101739695B (en) | Three-dimensional Arnold mapping-based image grouping encryption method | |
Shatheesh Sam et al. | An intertwining chaotic maps based image encryption scheme | |
CN102693523B (en) | Image two-grade encrypting method based on double-chaos system | |
Xue et al. | Region of interest encryption for color images based on a hyperchaotic system with three positive Lyapunov exponets | |
Belazi et al. | Algebraic analysis of a RGB image encryption algorithm based on DNA encoding and chaotic map | |
CN103679625A (en) | Single-channel color image encryption method based on chaos and phase retrieval process | |
CN104734842A (en) | Resisting method of circuit on side channel attack based on pseudo-operation | |
CN104202145A (en) | Plaintext or ciphertext selection based side channel power analysis attack method on round function output of SM4 cipher algorithm | |
EP3096488B1 (en) | Hypersphere-based multivariable public key encryption/decryption system and method | |
Es-Sabry et al. | A new color image encryption algorithm using multiple chaotic maps with the intersecting planes method | |
CN101604439A (en) | A kind of color image encrypting method based on multi-chaos system | |
CN104809685A (en) | Color image one-time-key DNA (Deoxyribonucleic Acid) encryption method based on six-dimensional chaotic system | |
Zanin et al. | Gray code permutation algorithm for high-dimensional data encryption | |
CN103455971A (en) | Image encryption method combining three-dimensional Arnold transformation with chaotic sequence | |
CN104734845A (en) | Side-channel attack protection method based on full-encryption algorithm pseudo-operation | |
CN104240177A (en) | Colored image encryption method based on chaotic system and fractional order Fourier transform | |
CN104182926B (en) | Color image encrypting method based on Hilbert conversion and chaos Liu algorithms | |
Irfan et al. | Image encryption using combination of chaotic system and rivers shamir adleman (RSA) | |
CN104050625B (en) | A kind of plaintext builds the composite chaotic image encryption method of initial key |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20170711 |
|
CF01 | Termination of patent right due to non-payment of annual fee |