CN105761198A - Image selective encryption and decryption method based on dynamic probability and space-frequency domain compositing - Google Patents

Image selective encryption and decryption method based on dynamic probability and space-frequency domain compositing Download PDF

Info

Publication number
CN105761198A
CN105761198A CN201610102071.1A CN201610102071A CN105761198A CN 105761198 A CN105761198 A CN 105761198A CN 201610102071 A CN201610102071 A CN 201610102071A CN 105761198 A CN105761198 A CN 105761198A
Authority
CN
China
Prior art keywords
formula
init
image
parameter
sequence
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610102071.1A
Other languages
Chinese (zh)
Other versions
CN105761198B (en
Inventor
邵利平
唐子龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shaanxi Normal University
Original Assignee
Shaanxi Normal University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shaanxi Normal University filed Critical Shaanxi Normal University
Priority to CN201610102071.1A priority Critical patent/CN105761198B/en
Publication of CN105761198A publication Critical patent/CN105761198A/en
Application granted granted Critical
Publication of CN105761198B publication Critical patent/CN105761198B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention provides an image selective encryption and decryption method based on dynamic probability and space-frequency domain compositing. The MD5 value and SHA-1 value of a to-be-encrypted image are composited to improve the impact resistance of a single Hash feature, and intermediate key parameters are generated through close coupling to a user key to carry out probability interval division, probability generation and to-be-encrypted pixel screening and to determine a probabilistic encryption event and transform parameters. The designed encryption event includes a space domain and frequency domain replacement operation to improve the efficiency of encryption and avoid the influence of frequency domain coefficient overflow on the recovery of the visual quality of the image. According to the method, the encryption features of the to-be-encrypted image and the user key are updated, so that the key parameters under the condition of different number of encryption times differ greatly and are closely associated with the features of the to-be-encrypted image and the user key, and image visual quality and frequency domain overflow filtering control can be carried out through a preset encryption threshold. For decryption, an intermediate key set needs to be restored first, and then, the screened pixel blocks are decrypted reversely.

Description

Image selective encryption that a kind of dynamic probability and null tone territory are compound and decryption method
Technical field
The invention belongs to information security and data image signal processes crossing research field, relate to a kind of image encryption and conciliate Decryption method, the image selective encryption compound particularly to a kind of dynamic probability and null tone territory and decryption method.
Background technology
Be generally directed to is entire image in traditional images encryption, changed beyond recognition with secret for entire image being converted to Figure, not only brings high calculation cost, also masks the image to be encrypted all features almost in addition to size.A lot In actual application, often it is not required to entire image is encrypted, and only needs bit plane, region and the part picture selected to image Element is encrypted, and needs the Partial Feature providing original image to come to potential user with more experience while encryption, Thus exchange bigger commercial interest for, and the characteristics of image that these encrypted images are retained, can be further used for image classification, Retrieval and identification etc., thus encrypt relative to traditional images, possess more use value.This only to the bit that image is selected Plane, region and the method for partial pixel encryption, be referred to as selective encryption.
Encrypt for selective image, mainly have than more typical selective image encryption method at present:
1. partial bit plane or bit to choosing carry out selective encryption.Such as, Rehman A U, 2015. (Rehman A U,Liao X,Kulsoom A,et al.Selective encryption for gray images based on chaos and DNA complementary rules[J].Multimedia Tools and Applications, 2015,74 (13): 4655-4677) the high-low-position bit plane treating encrypted image is encrypted by different DNA sequence dnas. Kulsoom A,2016.(Kulsoom A,Xiao D,Aqeel-ur-Rehman,et al.An efficient and noise resistive selective image encryption scheme for gray images based on chaotic maps and DNA complementary rules[J].Multimedia Tools and Applications,2016,75 (1) the MD5 value of image: 1-23.) it is further introduced into improve Rehman A U, the anti-chosen-plain attact of strategy described in 2015 Ability.Moon D,2006.(Moon D,Chung Y,Pan S B,et al.An efficient selective encryption of fingerprint images for embedded processors[J].ETRI journal, 2006,28 (4): 444-452.) LSB of pixel carries out XOR encryption as random keystream and high order bit position cover and treat Encrypted image feature, and the security of described strategy is improved by secrecy LSB.Vanogenbroeck M,2002. (Vanogenbroeck M,Benedett R.Techniques for a selective encryption of uncompressed and compressed images[C]//in Proceedings of Advanced Concepts For Intelligent Vision Systems (ACIVS) 2002.2002:90-97.) utilize 2 values big with close figure etc. random The bit plane that double secret key is selected carries out XOR encryption by turn.Zhong Ming, 2008. (Zhong Ming, Liao Xiaofeng, Zhou Qing. a kind of based on four forks Spatial domain picture Choice encryption algorithm [J] of tree. computer engineering, 2008,34 (18): 174-178.) by bit selected for image Plane is divided into 8 × 8 fritters, is set the position decomposing node with layer by the position relationship and exchange 8 × 8 fritter 4 fork changing fritter Put order selected bit plane is encrypted.Xiang T,2007.(Xiang T,Wong K,Liao X.Selective image encryption using a spatiotemporal chaotic system[J].Chaos: An Interdisciplinary Journal of Nonlinear Science, 2007,17 (2): 415-427.) use base Tie up coupled map lattices in the 1 of skew tent map and the bit plane chosen is carried out selective encryption, and to be encrypted by adjusting Notable bit plane quantity compromise in security and encryption performance.Hoang T,2014.(Hoang T,Tran, D.Cryptanalysis and security improvement for selective image encryption[J] .European Physical Journal Special Topics, 2014,223 (8): 1635-1646.) to Xiang T, The security of 2007 is analyzed, and the notable number of bits participating in encryption by changing each pixel improves described strategy Security.Rehman A U, 2015, Kulsoom A, 2016, Moon D, 2006, Vanogenbroeck M, 2002, Zhong Ming, 2008, Xiang T, 2007 and Hoang T, 2014 are all based on the selective image encryption of bit plane or bit.Different Be Rehman A U, 2015 and Kulsoom A, 2016 pairs of high-low-position bit planes have employed different encryption policys;Moon D, 2006 is as the key encrypting high order bit plane XOR using low-order bit plane;Vanogenbroeck M, 2002, Zhong Ming, 2008 and Xiang T, 2007 are to be encrypted the bit plane chosen;Hoang T, different pixels is entered by 2014 The bit encryption of row varying number.The ratio that selective encryption strategy based on bit plane and bit can be encrypted by adjustment The quantity of special plane and encrypting bit position adjusts the visual quality of image to be encrypted, if encryption amount is too much, then tends to tradition Image encryption, if being only encrypted notable position or notable plane, then loses the identification feature of image, if only to not notable bit Plane is encrypted, then cannot be effectively reduced the visual quality of image.If using LSB as key, then it is prone to brokenly in transmitting procedure Bad, cause encrypted image to recover.For gray scale or coloured image, the most limited alternative bit plane, pass through Select different bit planes that the visual quality of image encryption cost and encrypted image is regulated and controled, the regulation and control that can play Act on extremely limited.
2. image pixel and block of pixels are screened, the pixel filtered out and block of pixels are carried out selective encryption.Example As, Zhao Liang, 2010. (Zhao Liang, Liao Xiaofeng, Xiang Tao etc. map based on Z matrix and the coloured image degeneration algorithm of Choice encryption grinds Study carefully. Acta Physica Sinica [J], 2010,59 [3]: 1507-1523.) give based on pixel random screening masterplate and Pixel Information entropy Image degradation encryption method.Lin Yangfei, 2015. (Lin Yangfei, Ye Shaozhen. a kind of selective encryption method of medical image data. Application of electronic technology [J], 2015,41 (3): 107-110.) utilize the pixel of image block and the block of pixels of encryption is carried out Screening, is encrypted the block of pixels filtered out by SCAN language and image hash value.Wen W,2015.(Wen W,Zhang Y,Fang Z,et al.Infrared target-based selective encryption bychaotic maps[J] .Optics Communications, 2015,341:131 139.) utilize geometric active contour and partial differential equation to infrared figure The target area of picture is screened, and is then encrypted the block of pixels filtered out.Khashan O A,2014.(Khashan O A,Zin A M,Sundararajan E A.Performance study of selective encryption in comparison to full encryption for still visual images[J].Journal of Zhejiang University SCIENCE C, 2014,15 (6): 435-444.) the not overlap partition that image is divided calculate pixel and, root The block of pixels that blowfish encrypts is filtered out according to pixel and the relation set between threshold value.Zhang T,2013.(Zhang T, El-Latif A,Han Q,et al.Selective Encryption for Cartoon Images[C]// Intelligent Human-Machine Systems and Cybernetics(IHMSC),20135th International Conference on.IEEE, 2013,2:198-201.) utilize scalable Shape context to screen card release Important information block to be encrypted in logical image.Ayoup A M,2015.(Ayoup A M,Hussein A H,Attia M A A.Efficient selective image encryption[J].Multimedia Tools and Applications, 2015:1-16.) the comentropy largest block filtered out is carried out AES encryption.Mehta G,2014.(Mehta G,Dutta M K, Travieso-Gonzalez C M,et al.Edge based selective encryption scheme for biometric data using chaotic theory[C]//Contemporary Computing and Informatics (IC3I), 2014International Conference on.IEEE, 2014:383-386.) only opposite side The notable block that edge detection filters out is encrypted, and is made a distinction notable block and non-significant block by encryption vector.Zhao Liang, 2010, Wen W, 2015, Khashan O A, 2014, Mehta G, 2014, Zhang T, 2013, Ayoup A M, 2015 Hes Mehta G, 2014 is all that the pixel filtered out on image and block of pixels are carried out selective encryption, need to set screening when screening Threshold value filters out pixel and the block of pixels of correspondence, owing to before and after encryption, block of pixels is the most corresponding, for keeping encryption policy Restorability, typically need to ensure encryption screening feature do not change or by record and embed encryption parameter come to encryption and not Pixel and the block of pixels of encryption make a distinction.For the former, generally it is only capable of selecting fixing encrypted feature, such as comentropy or only Simple encryption policy can be used to ensure that encrypted feature does not changes;For the latter, store extra encryption parameter usual Need higher storage cost.
3. the sensitizing range selected user carries out selective encryption.Ravishankar K C,2006. (Ravishankar K C,Venkateshmurthy M G.Region based selective image encryption [C]//Computing & Informatics,2006.ICOCI'06.International Conference on.ieee, 2006:1-6.) sensitizing range that user selectes is divided into nonoverlapping fritter, the fritter comprising sensitizing range is selected Property encryption.Ou Y,2007.(Ou Y,Sur C,Rhee K H.Region-based selective encryption for medical imaging[M]//Frontiers in Algorithmics.Springer Berlin Heidelberg, 2007:62-73.) specify sensitizing range to carry out AES deciphering user.Ravishankar K C, 2006 and Ou Y, 2007 are all The area-of-interest selecting user carries out selective encryption, when deciphering, need to provide the most selected sensitizing range, the most also Bring extra storage cost.
4. frequency coefficient specific to image carries out selective encryption.Wang Lihua, 2010. (Wang Lihua, Liao Xiaofeng, Xiang Tao Manually degenerate algorithm [J] Deng. image based on wavelet transformation. computer engineering, 2010,36 (16): 203-207.) by original graph As being converted to the wavelet field subgraph of different frequency composition, by HFS interpolation multiplicative noise and additive noise are come figure As carrying out frequency domain selective encryption.Nidhi Taneja,2011.(Nidhi Taneja,Balasubramanian Raman, Indra Gupta.Selective image encryption in fractionalwavelet domain[J].AEU- International Journal of Electronics and Communications,2011,65(4):338-344.) In Fourier Transform of Fractional Order territory, energy component is carried out the displacement of Arnold position and XOR encryption more than the sub-band of threshold value. Wang Lihua, 2010 and Nidhi Taneja, 2011 are to change image to frequency domain, select specific frequency coefficient to add Close, at frequency domain, choose the different frequency coefficient of significance level and can effectively regulate and control visual quality of images, but simultaneously to frequency coefficient Encryption also can change the amplitude area of frequency coefficient, thus causes spatial domain pixel overflow and cannot correctly decipher.
In addition to the above problems, selective image encryption there is also the safety problem existing for traditional images encryption, example Such as displacement and the loose coupling of process of obfuscation, the problems such as concrete encryption policy is unrelated with image to be encrypted.
Summary of the invention
Present invention aim to overcome that prior art defect, it is provided that the image that a kind of dynamic probability and null tone territory are combined selects Property encryption and decryption approaches, designed encrypted event include spatial domain and frequency domain replacement operator with improve encryption efficiency and avoid frequency Domain coefficient overflows the impact recovering visual quality of images, simultaneously can be by encryption threshold value set in advance to visual quality of images It is controlled.
For achieving the above object, the present invention is by the following technical solutions:
The image selective cryptographic method that a kind of dynamic probability and null tone territory are combined, comprises the following steps:
1st step: remember that image to be encrypted is A=(ai,j)m×nAnd ai,j∈ 0,1 ..., and 255}, encryption number of times t, t > 0 are set, Primary iteration controls parameter k=1, selected initial parameter μ0∈ [3.57,4] and setting encryption judgment threshold δ, δ > 0, note A's MD5 value and SHA-1 value are respectively 16 system Number Sequence SMD5=< m0,m1,…,m31> and SSHA-1=< s0,s1,…,s39>, by SMD5 And SSHA-1Series connection is 16 system Number Sequence Sms=SMD5||SSHA-1=< smi>72And initialization encryption event subscript index sequence Sid For Sid=<0,1 ..., 5>, wherein " | | " it is bit bit string serial operation symbol;
2nd step: by SmsIt is mapped as 16 system sequences Sh=< h0,h1,…,h39>;
3rd step: by ShIt is divided intoFour parts, then willI=0,1 ..., 3 are converted to (0,1) In the range of 10 system decimal Gi, i=0,1 ..., 3;
4th step: by G3As initial parameter α, G0,G1,G2It is mapped as 10 system decimal G ' in the range of (0,1)0,G′1, G′2, by G '0,G′1,G′2As key parameter Xinit,Yinit,xinit, i.e. Xinit=G '0,Yinit=G '1,xinit=G '2
5th step: by initial parameter μ0As systematic parameter, key parameter xinit5 (0,1) scopes are produced as initial value Interior random number is as sequence Sp=< p0,p1,p2,p3,p4>, by SpInterval division sequence S ' in the range of structure (0,1)p=< p′0,p′1,p′2,p′3,p′4>, thus obtain probability interval [0, p '0),[p′0,p′1),[p′1,p′2),[p′2,p′3),[p′3, p′4),[p′4,1];
6th step: by key parameter Yinit0It is mapped as μ1∈ [3.57,4], by XinitAnd μ1Respectively as initial value be System parameter iteration produces intermediate key parameter Z in the range of (0,1)init
7th step: by Xinit,Yinit,ZinitAs initial value, iteration produces 3 real-valued random numbers for 1 time successively as parameter X0,Y0,Z0
8th step: by X0,Y0It is mapped as encrypted image A=(ai,j)m×nOn random point (r0,v0);
9th step: by (r0,v0) as starting point, from image A=(a to be encryptedi,j)m×nFilter out Min=(mu,w)4×4, calculate MinMapping value Map (Min), if Map is (Min) >=δ then performs the 10th step, otherwise by xinitAs probabilistic determination value P, by X0,Y0, Z0Mapping value as transformation parameter v, the probability interval fallen into according to P, perform corresponding spatial domain and frequency domain displacement encryption behaviour Make, then to the matrix fritter M after encryptionoutCalculate mapping value Map (Mout);If Map is (Mout) < δ, then by MoutIn pixel depend on Secondary as image A=(a to be encryptedi,j)m×nThe pixel of correspondence position, otherwise by MinMiddle pixel is directly as image A=to be encrypted (ai,j)m×nCorrespondence position pixel;
10th step: utilize X0,Y0,Z0To case index sequence SidCarry out resetting and update;
11st step: utilize X0,Y0,Z0To initial parameter μ0And Sms=< msi>72In element be updated operation;
12nd step: if during k≤t, updates k=k+1, repeatedly performs the 2nd step~the 11st step;
13rd step: by A=(ai,j)m×nOutput is as encrypted image.
Further, the 2nd step is by SmsIt is mapped as Sh=< h0,h1,…,h39> concrete grammar be formula (1):
Sh=Draw (Sms,start,gap,|Sh|) (1)
In formula (1), Draw () is that sequential element extracts function, and wherein start is extraction starting point, and gap is the sample skipped Number, | Sh| for ShMiddle number of elements, i.e. from SmsCirculation extraction | Sh| individual 16 system numbers are as Sh, start, gap are respectively by formula (2) Map with formula (3) and obtain:
s t a r t = ( &Sigma; i = 0 31 &Sigma; j = 0 8 ( m i + s i + j ) ) mod | S m s | - - - ( 2 )
g a p = ( &Sigma; i = 0 31 &Sigma; j = 0 8 m i s i + j ) mod | S m s | - - - ( 3 ) ;
3rd step is by ShIt is divided intoTetrameric concrete grammar is formula (4):
S h i = < h i , h i + 1 , ... , h i + 9 > , i = 0 , 1 , ... , 3 - - - ( 4 ) ;
3rd step willI=0,1 ..., 3 are converted to 10 system decimal G in the range of (0,1)i, i=0,1 ..., the tool of 3 Body method is formula (5), and in formula (5), [] is round function:
G i = &Sigma; j = 0 9 &lsqb; 10 h 9 i + j / 17 &rsqb; &times; 10 - j - 1 , i = 0 , 1 , ... , 3 - - - ( 5 ) .
Further, the 4th step is by G3As initial parameter α, G0,G1,G2It is mapped as 10 system decimals in the range of (0,1) G′0,G′1,G′2Concrete grammar be by G0,G1,G2Respectively as the input parameter of formula (6), substitute into formula (6) iteration and produce 31 time Individual sequential value G '0,G′1,G′2
x i + 1 = x i &alpha; , 0 &le; x i < &alpha; 1 - x i 1 - &alpha; , &alpha; &le; x i < 1 - - - ( 6 ) ;
5th step is by μ0As systematic parameter, xinitThe random number in the range of 5 (0,1) is produced as sequence as initial value Sp=< p0,p1,p2,p3,p4> concrete grammar be by μ0As systematic parameter, xinitFormula (7) iteration is brought into 5 times as initial value 5 random numbers produced are as sequence Sp=< p0,p1,p2,p3,p4>
xi+1=μ xi(1-xi) (7);
By S in 5th steppInterval division sequence S ' in the range of structure (0,1)p=< p '0,p′1,p′2,p′3,p′4> tool Body method is by SpMiddle element obtains interval division sequence S ' by descending orderp=< p '0,p′1,p′2,p′3,p′4>。
Further, the 6th step is by Yinit0It is mapped as μ1The concrete grammar of ∈ [3.57,4] is formula (8):
&mu; 1 = ( 0.43 &times; Y i n i t + 3.57 ) &CenterDot; &mu; 0 - - - ( 8 ) ;
6th step is by XinitAnd μ1The intermediate key ginseng in the range of (0,1) is produced respectively as initial value and systematic parameter iteration Number ZinitConcrete grammar be by XinitAnd μ1Make for 1 time by formula (7) iteration respectively as the initial value in formula (7) and systematic parameter For intermediate key parameter Zinit
xi+1=μ xi(1-xi) (7);
7th step is by Xinit,Yinit,ZinitAs initial value, iteration produces 3 random numbers for 1 time successively as parameter X0,Y0, Z0Concrete grammar be by Xinit,Yinit,ZinitAs the initial value of formula (9), produce 3 random numbers successively iterative (9) 1 times As parameter X0,Y0,Z0, formula (9) systematic parameter takes a=b=0.2, c=5.7;
X &CenterDot; i + 1 = - Y i - Z i Y &CenterDot; i + 1 = X i + aY i Z &CenterDot; i + 1 = b + Z i ( X i - c ) - - - ( 9 ) .
Further, the 8th step is by X0,Y0Being mapped as encrypted image is A=(ai,j)m×nOn random point (r0,v0) concrete side Method is formula (10), in formula (10)Accord with for downward rounding operation;
9th step is by (r0,v0) as starting point, from image A=(a to be encryptedi,j)m×nFilter out the matrix fritter M of 4 × 4in= (mu,w)4×4Concrete grammar be formula (11):
m u , w = a r 0 + u , v 0 + w , u , w = 0 , 1 , ... , 3 - - - ( 11 ) ;
9th step calculates MinMapping value Map (Min) concrete grammar be by formula (12) calculate MinVariance:
M a p ( M i n ) = 1 16 &Sigma; u = 0 3 &Sigma; v = 0 3 ( m u , v - 1 16 &Sigma; u = 0 3 &Sigma; v = 0 3 m u , v ) 2 - - - ( 12 ) ;
9th step is to the matrix fritter M after encryptionoutCalculate mapping value Map (Mout) concrete grammar be same by formula (12) Method calculate MoutVariance;
By X in 9th step0,Y0,Z0Mapping value be formula (13) as the concrete grammar of transformation parameter v:
9th step performs the spatial domain of correspondence and the concrete grammar of frequency domain displacement cryptographic operation is formula (14):
Mout=Encrypt (Min,v,P,f,Sid,S′p) (14)
In formula (14), f={f0,f1,…,f5It is encrypted event set, SidIt is the subscript index sequence of f, S 'pFor interval Dividing sequence, corresponding 6 group encryption event, the wherein f of encrypted event set f0,f1,f2Spatial domain displacement box encrypted event, such as formula (15) Shown in, f3,f4,f5Transform domain displacement box encrypted event, as shown in formula (16), f0,f1,…,f5Corresponding displacement box Px0, Px1,…,Px5As shown in formula (17);
f i : | M o u t = Permute 0 ( M i n , M co d e , Px i , v ) , i = 0 , 1 , 2 ; M c o d e = 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 - - - ( 15 )
In formula (15), McodeIt is MinNumbering matrix, remember MinIn element mu,wAt McodeIn numbered id, then Permute0The function that () function performs is by mu,wMove to PxiMiddle element value is the coordinate position of (id+v) mod16;
f i : M t e m p = M H M i n M H M t e m p = Permute 1 ( M t e m p , M c o d e , Px i , v ) M o u t = 1 16 M H M t e m p M H , i = 3 , 4 , 5 ; M H = 1 1 1 1 1 - 1 1 - 1 1 1 - 1 - 1 1 - 1 - 1 1 - - - ( 16 )
In formula (16), MHIt is Hadamard transform battle array, remembers MtempIn element mtu,wAt McodeIn numbered id and id ≠ ×, Permute1The operation that () performs is by mtu,wMove to PxiMiddle element value is the coordinate position of (id+v) mod16+1, with Permute0The difference of () is Permute1() in conversion process, MtempIn the element of (0,0) position, i.e. id=× element Remaining at (0,0) position does not occur position to change;
Px 0 = 15 14 13 12 4 3 2 11 5 0 1 10 6 7 8 9 , Px 1 = 0 7 8 15 1 6 9 14 2 5 10 13 3 4 11 12 , Px 2 = 0 1 4 9 3 2 5 10 8 7 6 11 15 14 13 12 , Px 3 = &times; 2 8 10 3 1 11 9 12 14 4 6 15 13 7 5 , Px 4 = &times; 1 4 5 3 2 7 6 12 13 8 9 15 14 11 10 , Px 5 = &times; 1 3 5 2 7 8 10 4 9 12 13 6 11 14 15 - - - ( 17 ) .
Further, the 10th step utilizes X0,Y0,Z0To case index sequence SidCarry out resetting the concrete grammar updated for by X0, Y0,Z0Being mapped as start, gap by formula (18) and formula (19), right back-pushed-type (20) is to case index sequence SidIt is updated:
Sid=Draw (Sid,start,gap,|Sid|) (20);
11st step utilizes X0,Y0,Z0To initial parameter μ0The concrete grammar updated is formula (22):
&mu; 0 = 0.43 ( X 0 Y 0 + Z 0 Y 0 + X 0 Z 0 ) mod 1 ) + 3.57 - - - ( 22 ) ;
To S in 11st stepms=< msi>72In element be updated operation method particularly includes: first use X0,Y0,Z0By formula (21) x is generatedinit, then by xinit0Substitution formula (7) iteration produces random sequence SR=< ri>72, by formula (23) to Sms=< msi>72In element be updated operation;
xinit=(X0+X0Y0+X0Y0Z0)mod1 (21)
xi+1=μ xi(1-xi) (7)
The image selectivity decryption method that a kind of dynamic probability and null tone territory are combined, comprises the following steps:
1st step: inputted key μ by user0∈[3.57,4],SMD5,SSHA-1, encrypt number of times t, t > 0 and encrypted image C, Primary iteration controls parameter k=0, and input encryption judgment threshold δ, δ > 0, by SMD5And SSHA-1Series connection is 16 system Number Sequence Sms =SMD5||SSHA-1=< smi>72And initialization encryption event subscript index sequence Sid=<0,1 ..., 5>and intermediate key parameter Sequence SX >,SY >,SZ >,SX >,S′P >,SId >For empty sequence;
2nd step: by SmsIt is mapped as 16 system sequences Sh=< h0,h1,…,h39>;
3rd step: by ShIt is divided intoFour parts, then willI=0,1 ..., 3 are converted to (0,1) In the range of 10 system decimal Gi, i=0,1 ..., 3;
4th step: by G3As initial parameter α, G0,G1,G2It is mapped as 10 system decimal G ' in the range of (0,1)0,G′1, G′2, by G '0,G′1,G′2As key parameter Xinit,Yinit,xinit, i.e. Xinit=G '0,Yinit=G '1,xinit=G '2, by xinit As sequence SX >In kth element
5th step: by initial parameter μ0As systematic parameter, intermediate parameters xinit5 (0,1) scopes are produced as initial value Interior random number is as sequence Sp=< p0,p1,p2,p3,p4>, by SpInterval division sequence S ' in the range of structure (0,1)p=p ′0,p′1,p′2,p′3,p′4>, thus obtain 6 probability intervals [0, p '0),[p′0,p′1),[p′1,p′2),[p′2,p′3), [p′3,p′4),[p′4, 1], by p '0,p′1,p′2,p′3,p′4As sequence S 'P >In 5k, 5k+1 ..., 5k+4 element
6th step: by Yinit, μ is mapped as the μ in the range of [3.57,4]1, by XinitAnd μ1Respectively as initial value and system Parameter, then the mapping value of iteration 1 time is as intermediate key parameter Zinit
7th step: by Xinit,Yinit,ZinitSubstitute into chaos system for 1 time as initial value iteration and produce 3 real-valued random numbers X0,Y0,Z0, and by X0,Y0,Z0Successively respectively as SX >,SY >,SZ >In kth element
8th step: utilize X0,Y0,Z0To event subscript index sequence SidIt is updated, by SidIn all elements make successively For SId >In 6k, 6k+1 ..., 6k+5 element
9th step: utilize X0,Y0,Z0To initial parameter μ0And Sms=< msi>72In element be updated operation;
10th step: if k ≠ t updates k=k+1, repeatedly perform the 2nd step~the 9th step, available sequence S X > = < X i > > t , S Y = < Y i > > t , S Z > = < Z i > > t , S x > = < x i > > t , S p > &prime; = < p i &prime; > > 5 t , S i d > &prime; = < sid i > > 6 t ;
11st step: by SX >,SY >-1 element of kthIt is mapped as image C=(c to be decryptedi,j)m×nOn random Point (r0,v0), by SZ >-1 element of kth in sequenceWithIt is mapped as transformation parameter v;
12nd step: by (r0,v0) as starting point, from image C=(c to be decryptedi,j)m×nFilter out 4 × 4 matrix fritter Min= (mu,w)4×4, calculate MinMapping value Map (Min), if Map is (Min) >=δ, then update k=k-1, perform the 11st step when k ≠ 0, The 14th step is performed as k=0, if above-mentioned condition Map (Min) >=δ is not satisfied, and takes SX >-1 element of kthSentence as probability Disconnected value P, utilizes S 'P >5k-5,5k-4 ..., 5k-1 elementStructure probability intervalTake SId >6k-6,6k-5 ..., 6k-1 unit ElementAs subscript index sequence, with v as transformation parameter, the probability interval fallen into according to P, By matrix fritter Min=(mu,w)4×4Deciphering is matrix fritter Mout
13rd step: calculate MoutCorresponding mapping value Map (Mout), if Map is (Mout) < δ, then by MoutIn element make successively For encrypted image C=(ci,j)m×nThe pixel of correspondence position, otherwise by MinMiddle pixel is as encrypted image C=(ci,j)m×nCorresponding The pixel of position, updates k=k-1, repeatedly performs the 11st step~the 13rd step when k ≠ 0;
14th step: by C=(ci,j)m×nOutput is as decrypted image.
Further, by S in the 2nd stepmsIt is mapped as sequence Sh=< h0,h1,…,h39> concrete grammar be formula (1):
Sh=Draw (Sms,start,gap,|Sh|) (1)
In formula (1), Draw () is that sequential element extracts function, and wherein start is extraction starting point, and gap is the sample skipped Number, | Sh| for ShMiddle number of elements, i.e. from SmsCirculation extraction | Sh| individual 16 system numbers are as Sh, start, gap are respectively by formula (2) Map with formula (3) and obtain:
s t a r t = ( &Sigma; i = 0 31 &Sigma; j = 0 8 ( m i + s i + j ) ) mod | S m s | - - - ( 2 )
g a p = ( &Sigma; i = 0 31 &Sigma; j = 0 8 m i s i + j ) mod | S m s | - - - ( 3 ) ;
3rd step is by ShIt is divided intoTetrameric concrete grammar is formula (4):
S h i = < h i , h i + 1 , ... , h i + 9 > , i = 0 , 1 , ... , 3 - - - ( 4 ) ;
3rd step willI=0,1 ..., 3 are converted to 10 system decimal G in the range of (0,1)i, i=0,1 ..., the tool of 3 Body method is formula (5):
G i = &Sigma; j = 0 9 &lsqb; 10 h 9 i + j / 17 &rsqb; &times; 10 - j - 1 , i = 0 , 1 , ... , 3 - - - ( 5 ) ;
4th step is by G3As initial parameter α, G0,G1,G2It is mapped as 10 system decimal G ' in the range of (0,1)0,G′1, G′2Concrete grammar be by G0,G1,G2Respectively as the input parameter of formula (6), substitute into formula (6) iteration and produce 3 sequential values 1 time G′0,G′1,G′2
x i + 1 = x i &alpha; , 0 &le; x i < &alpha; 1 - x i 1 - &alpha; , &alpha; &le; x i < 1 - - - ( 6 ) ;
By μ in 5th step0As systematic parameter, xinitThe random number in the range of 5 (0,1) is produced as sequence as initial value Row Sp=< p0,p1,p2,p3,p4> concrete grammar be as systematic parameter, x using μ 0initFormula (7) iteration 5 is brought into as initial value Secondary generation sequence Sp=< p0,p1,p2,p3,p4>:
xi+1=μ xi(1-xi) (7);
By S in 5th steppInterval division sequence S ' in the range of structure (0,1)p=< p '0,p′1,p′2,p′3,p′4> tool Body method is by SpMiddle element obtains interval division sequence S ' by descending orderp=< p '0,p′1,p′2,p′3,p′4>。
Further, the 6th step is by Yinit0It is mapped as the μ in the range of [3.57,4]1Concrete grammar be formula (8):
&mu; 1 = ( 0.43 &times; Y i n i t + 3.57 ) &CenterDot; &mu; 0 - - - ( 8 )
6th step is by XinitAnd μ1Respectively as the mapping value of initial value and systematic parameter iteration 1 time as intermediate key parameter ZinitConcrete grammar be use formula (7):
xi+1=μ xi(1-xi) (7);
7th step is by Xinit,Yinit,ZinitSubstitute into chaos system for 1 time as initial value iteration and produce 3 real-valued random numbers X0, Y0,Z0Concrete grammar be by Xinit,Yinit,ZinitAs the initial value of formula (9), formula (9) systematic parameter takes a=b=0.2, c= 5.7, produce 3 real-valued random value X iterative (9) 1 times0,Y0,Z0:
X &CenterDot; i + 1 = - Y i - Z i Y &CenterDot; i + 1 = X i + aY i Z &CenterDot; i + 1 = b + Z i ( X i - c ) - - - ( 9 ) ;
8th step utilizes X0,Y0,Z0To event subscript index sequence SidThe concrete grammar being updated is for by X0,Y0,Z0By formula (18) and formula (19) is mapped as start, gap, right back-pushed-type (20) is to SidIt is updated:
Sid=Draw (Sid,start,gap,|Sid|) (20);
9th step utilizes X0,Y0,Z0To initial parameter μ0The concrete grammar being updated is formula (22):
&mu; 0 = 0.43 ( X 0 Y 0 + Z 0 Y 0 + X 0 Z 0 ) mod 1 ) + 3.57 - - - ( 22 ) ;
9th step is to Sms=< msi>72In element be updated operation method particularly includes: first use X0,Y0,Z0By formula (21) Generate xinit, then by xinit0Substitution formula (7) iteration produces random sequence SR=< ri>72, by formula (23) to Sms=< msi>72 In element be updated operation;
xinit=(X0+X0Y0+X0Y0Z0)mod1 (21)
xi+1=μ xi(1-xi) (7)
Further, by S in the 11st stepX >,SY >-1 element of kthIt is mapped as image C=(c to be decryptedi,j)m×n Upper random point (r0,v0) concrete grammar be formula (24):
11st step is by SZ >-1 element of kth in sequenceWithIt is mapped as the concrete grammar of transformation parameter v For formula (25):
12nd step is by (r0,v0) as starting point, from image C=(c to be decryptedi,j)m×nFilter out the matrix fritter M of 4 × 4in =(mu,w)4×4Concrete grammar be formula (26):
m u , w = c r 0 + u , v 0 + w , u , w = 0 , 1 , ... , 3 - - - ( 26 ) ;
12nd step calculates MinMapping value Map (Min) concrete grammar for calculate M by formula (12)inCorresponding variance:
M a p ( M i n ) = 1 16 &Sigma; u = 0 3 &Sigma; v = 0 3 ( m u , v - 1 16 &Sigma; u = 0 3 &Sigma; v = 0 3 m u , v ) 2 - - - ( 12 ) ;
By matrix M in 12nd stepin=(mu,w)4×4Deciphering is matrix MoutConcrete grammar be formula (27):
Mout=Decryption (Min,v,P,f′,SId >,S′P >) (27)
In formula (27), f '={ f '0,f′1,…,f′5It is program event set, f ' corresponding 6 groups of program event, wherein f '0, f′1,f′2Spatial domain displacement box program event, as shown in formula (28), f '3,f′4,f′5Transform domain displacement box program event, such as formula (29) Shown in, f '0,f′1,…,f′5Corresponding displacement box Px0,Px1,…,Px5As shown in formula (17):
f i &prime; : | M o u t = Permute 0 - 1 ( M i n , M co d e , Px i , v ) , i = 0 , 1 , 2 ; M c o d e = 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 - - - ( 28 )
In formula (28), McodeIt is numbering matrix, remembers MinIn element mu,wAt PxiIn numbered id, thenThe function that function performs is by mu,wMove to McodeMiddle element number is the coordinate bit of (id-v+16) mod16 Put;
f i &prime; : M t e m p = M H M i n M H M t e m p = Permute 1 - 1 ( M t e m p , M c o d e , Px i , v ) M o u t = 1 16 M H M t e m p M H , i = 3 , 4 , 5 ; M H = 1 1 1 1 1 - 1 1 - 1 1 1 - 1 - 1 1 - 1 - 1 1 - - - ( 29 )
In formula (29), MHIt is Hadamard transform battle array, Permute1 -1The operation that () performs is by PxiIn numbered id ≠ × element mtu,wMove to McodeIn the coordinate position of numbered (id-v+16) mod16+1, id=× element remain Position is not occurred to change in (0,0) position;
Px 0 = 15 14 13 12 4 3 2 11 5 0 1 10 6 7 8 9 , Px 1 = 0 7 8 15 1 6 9 14 2 5 10 13 3 4 11 12 , Px 2 = 0 1 4 9 3 2 5 10 8 7 6 11 15 14 13 12 , Px 3 = &times; 2 8 10 3 1 11 9 12 14 4 6 15 13 7 5 , Px 4 = &times; 1 4 5 3 2 7 6 12 13 8 9 15 14 11 10 , Px 5 = &times; 1 3 5 2 7 8 10 4 9 12 13 6 11 14 15 - - - ( 17 ) ;
13rd step calculates MoutCorresponding mapping value Map (Mout) concrete grammar be to calculate by the same method of formula (12) MoutCorresponding variance.
Different compared with technology, advantages of the present invention is mainly reflected in:
1. The present invention gives a kind of selective image encryption compound based on dynamic probability event and null tone territory and deciphering Method, improves carried AES by introducing MD5 value and the SHA-1 value with image to be encrypted attribute extreme sensitivity in plain text Sensitiveness in plain text, and by MD5 value and the compound of SHA-1 value are improved single MD5 value or the crash-protective characteristics of SHA-1 value, institute Extracting method is by the attribute of image to be encrypted, the probability interval fallen into, the encryption link of participation, and corresponding transformation parameter is closely Be coupling in together, even if thus use identical key, different plaintext images is encrypted all by corresponding different adding Close result.
2. convert plaintext into the encryption policy difference of random noise with tradition, designed encryption method only reduces image Visual quality, the approximation characteristic of image can be retained while encryption, and this approximation characteristic can be by set in advance Encryption threshold value is controlled, thus can conveniently treat encrypted image and extract for classifying and knowing another characteristic, simultaneously when deciphering, Encrypted image can recover again in high quality.
The most traditional frequency domain selective cryptographic method may result in spatial domain pixel value when being encrypted frequency coefficient Overflow, thus reduce the visual quality recovering image.Change the impact recovering visual quality of images for reducing frequency coefficient, Present invention adds encryption threshold value screening strategy, for random selected block of pixels being encrypted the screening of before and after's threshold value, once Before and after block of pixels encryption, threshold value screening exceedes threshold value set in advance, then abandon random selected block of pixels is encrypted to ensure that figure Visual quality during as recovering, also retrains the encryption visual quality of image randomized block simultaneously.
What 4. the present invention was given be not only a kind of image encryption method based on probability encryption event, and be a kind of with The image Probabilistic Encryption Methods of update mechanism.Institute's extracting method is key parameter user given and image MD5 to be encrypted, SHA- It is interval that 1 value is mapped as different probability encryptions, is then come to be added by key parameter and MD5 value and SHA-1 value mapping parameters Close pixel carries out random screening, performs different probability encryption events according to the different probability interval fallen into.Institute's extracting method is not Only probability interval is updated, and by mapping parameters, probability encryption arrangement of objects order and initial key is all carried out Update, then the multiplexed sequence being made up of MD5 value and SHA-1 value the initial key generation encryption random sequence after updating is carried out Encryption updates, thus the encrypted state phase that the encrypted event corresponding to different probability intervals is the most incomplete same and the most different Tangle mutually and close-coupled.
Accompanying drawing explanation
Fig. 1 is encryption flow figure;
Fig. 2 is deciphering flow chart;
Fig. 3 is image to be encrypted, is 8 gray level image face of 256 × 256 resolution ratio, and the MD5 value corresponding to Fig. 3 is SMD5=<D, 1,1, C, B, B, B, C, 3,7, A, A, 8, B, F, 5,1,4,5,1,3, C, E, F, F, 3,4, E, 4,2,0,7>, SHA-1 Value is SSHA-1=< 2, A, E, 0, D, B, A, B, 1,1,6,3,2, E, 8,9, B, 4, A, D, D, 0,7,1, F, 9,3,7, C, 1,5,5,7, 0,E,C,2,A,1,E>;
Fig. 4 is embodiment: encrypted image when t=10000, δ=1300, relative to the PSNR=22.939dB of Fig. 3;
Fig. 5 is embodiment: decrypted image when t=10000, δ=1300, relative to the PSNR=50.825dB of Fig. 3;
Fig. 6 is embodiment: encrypted image when t=15000, δ=1600, relative to the PSNR=21.752dB of Fig. 3;
Fig. 7 is embodiment: decrypted image when t=15000, δ=1600, relative to the PSNR=48.276dB of Fig. 3;
Fig. 8 is embodiment: when t=10000, δ=1300, it is provided that corresponding (being revised as 3.989 of the μ value of mistake 3.989999998 decrypted image, relative to the PSNR=21.282dB of Fig. 3);
Fig. 9 is embodiment: when t=10000, δ=1300, it is provided that the S of mistakeMD5Value (SMD5=< D, 1,1, C, B, B, B, C, 3,7, A, A, 8, B, F, 5, Isosorbide-5-Nitrae, 5,1,3, C, E, F, F, 3,4, E, 4,2,0,8 >) corresponding decrypted image, relative to Fig. 3's PSNR=21.278dB;
Figure 10 is embodiment: when t=10000, δ=1300, it is provided that the S of mistakeSHA-1Value (SSHA-1=< 2, A, E, 0, D, B, A, B, 1,1,6,3,2, E, 8,9, B, 4, A, D, D, 0,7,1, F, 9,3,7, C, 1,5,5,7,0, E, C, 2, A, 1, F >) corresponding solution Close image, is PSNR=21.253dB relative to the PSNR of Fig. 3;
Figure 11 is embodiment: encrypted image when t=10000, δ=2500, relative to the PSNR=22.352dB of Fig. 3;
Figure 12 is embodiment: decrypted image when t=10000, δ=2500, relative to the PSNR=43.642dB of Fig. 3;
Figure 13 is embodiment: encrypted image when t=10000, δ=3500, relative to the PSNR=22.049dB of Fig. 3;
Figure 14 is embodiment: decrypted image when t=10000, δ=3500, relative to the PSNR=46.990dB of Fig. 3;
Figure 15 is embodiment: encrypted image when t=15000, δ=2500, relative to the PSNR=21.415dB of Fig. 3;
Figure 16 is embodiment: decrypted image when t=15000, δ=2500, relative to the PSNR=39.739dB of Fig. 3;
Figure 17 is embodiment: encrypted image when t=15000, δ=3500, relative to the PSNR=21.092dB of Fig. 3;
Figure 18 is embodiment: decrypted image when t=15000, δ=3500, relative to the PSNR=37.506dB of Fig. 3.
Detailed description of the invention
Below in conjunction with specific embodiment, the present invention will be described:
With JAVA jdk1.8.0_20 for case implementation environment, in conjunction with accompanying drawing, embodiment of the present invention is carried out specifically Bright, but it is not limited to the implementation case, wherein Fig. 1 is encryption flow figure, and Fig. 2 is deciphering flow chart;
Ciphering process is as follows:
1st step: choose image A as it is shown on figure 3, be the gray level image face of 256 × 256, remembers image A=to be encrypted (ai,j)m×n40 corresponding 16 system MD5 values are SMD5=< D, 1,1, C, B, B, B, C, 3,7, A, A, 8, B, F, 5,1,4,5,1, 3, C, E, F, F, 3,4, E, 4,2,0,7 >, SHA-1 value is SSHA-1=< 2, A, E, 0, D, B, A, B, 1,1,6,3,2, E, 8,9, B, 4, A, D, D, 0,7,1, F, 9,3,7, C, 1,5,5,7,0, E, C, 2, A, 1, E >, by SMD5And SSHA-1Series connection is 16 system Number Sequence Sms =SMD5||SSHA-1=< smi>72And initialization encryption event subscript index sequence SidFor Sid=<0,1 ..., 5>, encryption time is set Number t=10000, primary iteration controls parameter k=1, selected initial parameter μ0=3.989, encrypt judgment threshold δ=1300;
2nd step: by SmsSubstitution formula (1) is mapped as 16 system sequences Sh=< h0,h1,…,h39>, by SmsSubstitute into formula respectively And formula (3) is mapped as start, gap (2);Such as: by Sms=< D, 1,1, C, B, B, B, C, 3,7, A, A, 8, B, F, 5,1,4,5, 1,3, C, E, F, F, 3,4, E, 4,2,0,7,2, A, E, 0, D, B, A, B, 1,1,6,3,2, E, 8,9, B, 4, A, D, D, 0,7,1, F, 9,3,7, C, 1,5,5,7,0, E, C, 2, A, 1, E > substitution formula (1) is mapped as Sh=< A, E, 7,2,4,0, A, B, 6,9,0, C, 2, B, 5,4, B, 5, C, F, D, D, C, 1,7,3,1,1, B, 4,1,0,2,1, B, E, 3,7, D, 9 >, by SmsSubstitute into formula (2) and formula respectively (3) start=43, gap=67 can be obtained;
3rd step: by ShIt is divided into by formula (4)Four parts, then willI=0,1 ..., 3 substitute into Formula (5) is converted to 10 system decimal G in the range of (0,1)i, i=0,1 ..., 3;Such as: can be by ShIt is divided into S h 0 = < A , E , 7 , 2 , 4 , 0 , A , B , 6 , 9 > , S h 1 = < 0 , C , 2 , B , 5 , 4 , B , 5 , C , F > , S h 2 < D , D , C , 1 , 7 , 3 , 1 , 1 , B , 4 > , Substitution formula (5) is mapped as: G0=0.6748477158235295, G1= 0.07244421382352942,G2=0.8483371302352942, G3=0.06013199052941176;
4th step: by G3As initial parameter α, G0,G1,G2Respectively as the input parameter of formula (6), substitute into formula (6) repeatedly In generation, produces 3 sequential value G ' 1 time0,G′1,G′2, by G '0,G′1,G′2As key parameter Xinit,Yinit,xinit
Such as: α=0.06013199052941176 is as initial parameter, by G0,G1,G2Substitute into formula (6) respectively and map G '0 =0.34595526276037764, G '1=0.9869000506772724, G '2=0.16136613677290165, Xinit= 0.34595526276037764,Yinit=0.9869000506772724, xinit=0.16136613677290165;
5th step: by μ0As systematic parameter, xinit5 random numbers works that formula (7) iteration produces for 5 times are brought into as initial value For sequence Sp=< p0,p1,p2,p3,p4>, by SpMiddle element obtains interval division sequence S ' by descending orderp=< p '0,p ′1,p′2,p′3,p′4>;Such as: μ0=3.989, xinit=0.16136613677290165 substitutes into formula (7) iteration maps for 5 times, Sp =< p0,p1,p2,p3,p4>,p0=0.5398198285301286, p1=0.9909249668295106, p2= 0.035871788327397826,p3=0.13795957748394325, p4=0.4743987358004721, then can obtain S 'p =< p '0,p′1,p′2,p′3,p′4>, i.e. p '0=0.035871788327397826, p '1=0.13795957748394325, p '2 =0.4743987358004721, p '3=0.5398198285301286, p '4=0.9909249668295106;
6th step: by Yinit0Substitution formula (8) is mapped as μ1∈ [3.57,4], by XinitAnd μ1Initial respectively as formula (7) Value and systematic parameter by formula (7) iteration 1 time as intermediate key parameter Zinit;Such as: by μ0=3.989, Yinit= 0.9869000506772724 substitutes into formula (8) can obtain μ1=3.9916826088662414, by Xinit= 0.34595526276037764 and μ1=3.9916826088662414 substitute into formula (7) can obtain Zinit= 0.9031988978023509;
7th step: by Xinit,Yinit,ZinitAs the initial value of formula (9), produce 3 real-valued random numbers iterative (9) 1 times Successively as parameter X0,Y0,Z0, formula (9) systematic parameter takes a=b=0.2, c=5.7;
Such as: Xinit=0.34595526276037764, Yinit=0.9869000506772724, Zinit= 0.9031988978023509 is obtained X by formula (9)0=0.1755933912994469, Y0=1.0326377639685018, Z0= 0.5476634933830886;
8th step: by X0,Y0It is A=(a that substitution formula (10) is mapped as encrypted imagei,j)m×nOn random point (r0,v0);
Such as: X0=0.1755933912994469, Y0=1.0326377639685018 substitute into formula (10), can be mapped as Encrypted image is A=(ai,j)m×nOn random point r0=36, v0=6;
9th step: by (r0,v0) as starting point, by formula (11) from image A=(a to be encryptedi,j)m×nFilter out Min= (mu,w)4×4, by MinSubstitution formula (12) calculates mapping value Map (Min), if Map is (Min) >=δ then performs the 10th step, otherwise by xinit As probabilistic determination value P, by X0,Y0,Z0Substitution formula (13) mapping transformation parameter v, the probability interval fallen into according to P, by formula (14) corresponding spatial domain and frequency domain displacement cryptographic operation are performed, the method calculating M that right back-pushed-type (12) is sameoutMapping value Map (Mout), if Map is (Mout) < δ, then by MoutIn pixel successively as image A=(a to be encryptedi,j)m×nThe pixel of correspondence position, Otherwise by MinMiddle pixel is directly as image A=(a to be encryptedi,j)m×nThe pixel of correspondence position;Such as: by (r0,v0) as rising Point, by formula (11) from image A=(a to be encryptedi,j)m×nFilter out the matrix fritter of 4 × 4 M i n = 174 180 195 194 149 165 183 189 162 159 180 188 180 166 181 191 , By MinSubstitution formula (12), due to Map (Min)=172.4375 i.e. Map (Min) < δ passes through Judge to continue executing with cryptographic operation, P=0.16136613677290165, pass through X0=0.1755933912994469, Y0= 1.0326377639685018,Z0=0.5476634933830886 substitutes into formula (13) mapping transformation parameter v=10, according to P institute The probability interval fallen into, performs corresponding spatial domain by formula (14) and frequency domain displacement cryptographic operation obtains M o u t = 162 159 180 180 188 180 166 195 174 191 181 194 189 183 165 149 , By MoutSubstitution formula (12) judges, Map (Mout)=172.4375 i.e. Map (Mout) < δ, then by MoutMiddle element is successively as image A=(a to be encryptedi,j)m×nCorrespondence position pixel;
10th step: utilize X0,Y0,Z0Being mapped as start, gap by formula (18) and formula (19), right back-pushed-type (20) is to event Index sequence SidIt is updated;Such as: by Sid=0,1,2 ..., 5} substitutes into formula (20) and maps new Sid=3,1,0,2,5,4}, By X0=0.1755933912994469, Y0=1.0326377639685018, Z0=0.5476634933830886 substitutes into respectively Formula (18), (19) can obtain parameter start=0, gap=3;
11st step: utilize X0,Y0,Z0Substitution formula (22) maps initial parameter μ0, then use X0,Y0,Z0Generate by formula (21) xinit, then by xinit0Substitution formula (7) iteration produces random sequence SR=< ri>72, by formula (23) to Sms=< msi>72In Element is updated operation;Such as: by X0,Y0,Z0Substitution formula (22) undated parameter μ0=3.7798190064841766, by X0, Y0,Z0Substitution formula (21) maps xinit=0.45622249450285557, by xinit0Substitution formula (7) maps random sequence SR= <ri>72, and by SR=< ri>72To Sms=< msi>72Encrypt the most newly obtained new Sms=< D, 5,9,2, F, 8, E, 1, D, 1,6, F, E,D,F,D,C,7,F,B,5,6,9,3,C,C,0,D,1,8,0,9,B,D,9,0,F,1,9,8,0,2,A,B,1,9,9,A,F,7, 0,A,E,C,C,B,9,D,E,9,1,8,1,6,E,6,3,5,D,3,E,E>;
12nd step: if during k≤t, updates k=k+1, repeatedly performs the 2nd step~the 11st step;
13rd step: by A=(ai,j)m×nOutput is as encrypted image as shown in Figure 4.
Decrypting process is as follows:
1st step: input key μ0=3.989, encryption number of times t=10000, juxtaposition k=0, input encryption judgment threshold δ= 1300, SMD5=<D, 1,1, C, B, B, B, C, 3,7, A, A, 8, B, F, 5, Isosorbide-5-Nitrae, 5,1,3, C, E, F, F, 3,4, E, 4,2,0,7>, SSHA-1=< 2, A, E, 0, D, B, A, B, 1,1,6,3,2, E, 8,9, B, 4, A, D, D, 0,7,1, F, 9,3,7, C, 1,5,5,7,0, E, C, 2, A, 1, E >, by SMD5And SSHA-1Series connection is 16 system Number Sequence Sms=SMD5||SSHA-1=< smi>72And initialization encryption thing Part subscript index sequence Sid=<0,1 ..., 5>and intermediate key argument sequence SX >,SY >,SZ >,SX >,S′P >,SId >For empty sequence Row, encrypted image C=(ci,j)m×nAs shown in Figure 4;
2nd step: by SmsSubstitution formula (1) is mapped as 16 system sequences Sh=< h0,h1,…,h39>, by SmsSubstitute into formula respectively (2) and formula (3) map start, gap;Such as: by Sms=< D, 1,1, C, B, B, B, C, 3,7, A, A, 8, B, F, 5,1,4,5,1, 3, C, E, F, F, 3,4, E, 4,2,0,7,2, A, E, 0, D, B, A, B, 1,1,6,3,2, E, 8,9, B, 4, A, D, D, 0,7,1, F, 9, 3,7, C, 1,5,5,7,0, E, C, 2, A, 1, E > substitute into formula (1) mapping Sh=< A, E, 7,2,4,0, A, B, 6,9,0, C, 2, B, 5, 4, B, 5, C, F, D, D, C, 1,7,3,1,1, B, 4,1,0,2,1, B, E, 3,7, D, 9 >, wherein by SmsSubstitute into formula (2) and formula respectively (3) start=43, gap=67 are mapped;
3rd step: by ShIt is divided into by formula (4)Four parts, then willI=0,1 ..., 3 substitute into Formula (5) is converted to 10 system decimal G in the range of (0,1)i, i=0,1 ..., 3;Such as: by ShIt is divided into S h 0 = < A , E , 7 , 2 , 4 , 0 , A , B , 6 , 9 > , S h 1 = < 0 , C , 2 , B , 5 , 4 , B , 5 , C , F > , S h 2 < D , D , C , 1 , 7 , 3 , 1 , 1 , B , 4 > , Substitution formula (5) is mapped as G0=0.6748477158235295, G1= 0.07244421382352942,G2=0.8483371302352942, G3=0.06013199052941176;
4th step: by G3As initial parameter α, G0,G1,G2Respectively as the input parameter of formula (6), substitute into formula (6) repeatedly In generation, produces 3 sequential value G ' 1 time0,G′1,G′2, by G '0,G′1,G′2As key parameter Xinit,Yinit,xinit, by xinitAs Sequence SX >In kth elementSuch as: α=0.06013199052941176 is as initial parameter, by G0,G1,G2Respectively Substitution formula (6) is mapped as G '0=0.34595526276037764, G '1=0.9869000506772724, G '2= 0.16136613677290165 i.e. Xinit=0.34595526276037764, Yinit=0.9869000506772724, xinit= 0.16136613677290165, by xinitAs sequence SX >In kth element
5th step: by μ0As systematic parameter, xinit5 random numbers works that formula (7) iteration produces for 5 times are brought into as initial value For sequence Sp=< p0,p1,p2,p3,p4>, by SpMiddle element obtains interval division sequence S ' by descending orderp=< p '0,p ′1,p′2,p′3,p′4>, by p '0,p′1,p′2,p′3,p′4As sequence S 'P >In 5k, 5k+1 ..., 5k+4 elementSuch as: μ0=3.989, xinit=0.16136613677290165 substitutes into formula (7) iteration maps for 5 times Sp=< p0,p1,p2,p3,p4>,p0=0.5398198285301286, p1=0.9909249668295106, p2= 0.035871788327397826,p3=0.13795957748394325, p4=0.4743987358004721, then can get S′p=< p '0,p′1,p′2,p′3,p′4>, i.e. p '0=0.035871788327397826, p '1=0.13795957748394325, p′2=0.4743987358004721, p '3=0.5398198285301286, p '4=0.9909249668295106, by p '0, p′1,p′2,p′3,p′4As sequence S 'P >In 5k, 5k+1 ..., 5k+4 element
6th step: by Yinit0Substitution formula (8) is mapped as μ1∈ [3.57,4], by XinitAnd μ1Respectively as in formula (7) Initial value and systematic parameter by formula (7) iteration 1 time as intermediate key parameter Zinit;Such as: μ0=3.989, Yinit= 0.9869000506772724 substitutes into formula (8) maps μ1=3.9916826088662414, by Xinit= 0.34595526276037764,μ1=3.9916826088662414 substitute into formula (7) can obtain: Zinit= 0.9031988978023509;
7th step: by Xinit,Yinit,ZinitAs the initial value of formula (9), produce 3 real-valued random numbers iterative (9) 1 times Successively as parameter X0,Y0,Z0, formula (9) systematic parameter takes a=b=0.2, c=5.7, and by X0,Y0,Z0Successively respectively as SX >,SY >,SZ >In kth elementSuch as: Xinit=0.34595526276037764, Yinit= 0.9869000506772724, Zinit=0.9031988978023509 substitutes into formula (9) iteration maps X 1 time0= 0.1755933912994469,Y0=1.0326377639685018, Z0=0.5476634933830886, by X0,Y0,Z0Successively Respectively as SX >,SY >,SZ >In kth element
8th step: utilize X0,Y0,Z0Being mapped as start, gap by formula (18) and formula (19), right back-pushed-type (20) is to event rope Draw sequence SidIt is updated, by SidIn all elements successively as SId >In 6k, 6k+1 ..., 6k+5 elementSuch as: by Sid=0,1,2 ..., 5} substitutes into formula (20) and maps new Sid=3,1,0,2,5, 4}, wherein by X0=0.1755933912994469, Y0=1.0326377639685018, Z0=0.5476634933830886 Substituting into formula (18) respectively, (19) mapping parameters start=0, gap=3, by SidIn all elements successively as SId >In 6k, 6k+1 ..., 6k+5 element
9th step: utilize X0,Y0,Z0Substitution formula (22) maps initial parameter μ0, then use X0,Y0,Z0X is generated by formula (21)init, Then by xinit0Substitution formula (7) iteration produces random sequence SR=< ri>72, by formula (23) to Sms=< msi>72In element enter Row updates operation;Such as: by X0,Y0,Z0Substitution formula (22) undated parameter μ0=3.7798190064841766, by X0,Y0,Z0Generation Enter formula (21) and map xinit=0.45622249450285557, by xinit0Substitution formula (7) maps random sequence SR=< ri>72, And by SR=< ri>72To Sms=< msi>72Encrypt the most newly obtained new Sms=< D, 5,9,2, F, 8, E, 1, D, 1,6, F, E, D, F, D,C,7,F,B,5,6,9,3,C,C,0,D,1,8,0,9,B,D,9,0,F,1,9,8,0,2,A,B,1,9,9,A,F,7,0,A,E, C,C,B,9,D,E,9,1,8,1,6,E,6,3,5,D,3,E,E>;
10th step: if k ≠ t updates k=k+1, repeatedly perform the 2nd step~the 9th step, available sequence S X > = < X i > > t , S Y > = < Y i > > t , S Z > = < Z i > > t , S x > = < x i > > t , S p > &prime; = < p i &prime; > > 5 t , S i d > &prime; = < sid i > > 6 t ;
11st step: by SX >,SY >-1 element of kthSubstitution formula (24) is mapped as image C=to be decrypted (ci,j)m×nOn random point (r0,v0), by SZ >-1 element of kth in sequenceWithSubstitute into formula (25) together It is mapped as transformation parameter v;Such as: X k - 1 > = 0.49326206612700085 , Y k - 1 > = 0.5897724640770899 Substitution formula (24) image C=(c to be decrypted is mappedi,j)m×nOn random point r0=238, v0=52, willWithSubstitution formula (25) maps v=1;
12nd step: by (r0,v0) as starting point, by formula (26) from image C=(c to be decryptedi,j)m×nFilter out 4 × 4 matrixes Fritter Min=(mu,w)4×4, calculate M by formula (12)inMapping value Map (Min), if Map is (Min) >=δ, then update k when k ≠ 0 =k-1, performs the 11st step, performs the 14th step as k=0, if above-mentioned condition Map (Min) >=δ is not satisfied, and takes SX >Kth-1 ElementAs probabilistic determination value P, utilize S 'P >5k-5,5k-4 ..., 5k-1 elementStructure Make probability intervalTake SId >6k-6,6k-5 ..., 6k-1 elementAs subscript index sequence, with v as transformation parameter, according to P fallen into general Rate is interval, by formula (27) by matrix fritter Min=(mu,w)4×4Deciphering is matrix fritter Mout;Such as: by (r0,v0) as starting point, By formula (26) from image C=(c to be decryptedi,j)m×nFilter out the matrix fritter of 4 × 4 M i n = 112 126 128 133 137 101 94 126 125 134 141 119 97 127 122 90 , Will MinSubstitution formula (12) judges, due to Map (Min)=239.75 i.e. Map (Min) < δ, then by SX >-1 element of kthMake For probabilistic determination value P=0.31040996788505415, utilize S 'P >5k-5,5k-4 ..., 5k-1 element p 5 k - 5 &prime; > = 0.011020580623130416 , p 5 k - 4 &prime; > = 0.04347661930175354 , p 5 k - 3 &prime; > = 0.49773757775175714 p 5 k - 2 &prime; > = 0.8538678670736659 , p 5 k - 1 &prime; > = 0.99872295820863812 Structure probability intervalTake SId >6k-6,6k-5 ..., 6k-1 unit Element sid 6 k - 6 > = 2 , sid 6 k - 5 > = 5 , sid 6 k - 4 > = 4 , sid 6 k - 3 > = 3 , sid 6 k - 2 > = 1 , sid 6 k - 1 > = 0 Sequence is indexed as subscript Row, with v=1 as transformation parameter, the probability interval fallen into according to P, by matrix fritter Min=(mu,w)4×4Substitution formula (27) solves Close for matrix fritter M o u t = 112 138 113 137 144 146 117 125 123 114 107 95 129 113 106 95 ;
13rd step: the method same by formula (12) calculates MoutCorresponding mapping value Map (Mout), if Map is (Mout) < δ, then By MoutIn element successively as encrypted image C=(ci,j)m×nThe pixel of correspondence position, otherwise by MinMiddle pixel is as encryption Image C=(ci,j)m×nThe pixel of correspondence position, updates k=k-1, repeatedly performs the 11st step~the 13rd step when k ≠ 0;Such as: By MoutSubstitution formula (12), due to Map (Mout)=237.484375 i.e. Map (Mout) < δ, then by MoutMiddle pixel is successively as adding Close image C=(ci,j)m×nThe pixel of correspondence position;
14th step: by C=(ci,j)m×nOutput is as decrypted image as shown in Figure 5.
Fig. 6 is that encryption number of times is respectively t=15000, δ=1600 encrypted image, and Fig. 7 is corresponding decrypted image, can from Fig. 6 Although finding out that the inventive method encrypted image can be with identification relative to artwork, but visual quality entirety is poor, solves as can be seen from Figure 7 Close image is clear relative to artwork visual quality, possesses certain using value;
Fig. 8~10 respectively revises the decrypted image of one of them correspondence;The inventive method is can be seen that from decrypted image, right The key of user's offer and picture characteristics extreme sensitivity to be encrypted, if providing the parameter of mistake, will cause decrypted image vision matter Amount declines, and decrypted image visual quality is the fuzzyyest;
Figure 11,13,15,17 is different encryption number of times t respectively, encrypted image embodiment corresponding during δ, Figure 12,14, 16,18 is corresponding decrypted image embodiment, can be seen that from decrypted image visual quality, by controlling t, δ, available The decrypted image of different visual qualities, thus possess the most wide using value.

Claims (10)

1. the image selective cryptographic method that a dynamic probability and null tone territory are combined, it is characterised in that comprise the following steps:
1st step: remember that image to be encrypted is A=(ai,j)m×nAnd ai,j∈ 0,1 ..., and 255}, encryption number of times t, t > 0 are set, initially Iteration control parameter k=1, selected initial parameter μ0∈ [3.57,4] and setting encryption judgment threshold δ, δ > 0, the MD5 of note A Value and SHA-1 value are respectively 16 system Number Sequence SMD5=< m0,m1,…,m31> and SSHA-1=< s0,s1,…,s39>, by SMD5With SSHA-1Series connection is 16 system Number Sequence Sms=SMD5||SSHA-1=< smi>72And initialization encryption event subscript index sequence SidFor Sid=<0,1 ..., 5>, wherein " | | " it is bit bit string serial operation symbol;
2nd step: by SmsIt is mapped as 16 system sequences Sh=< h0,h1,…,h39>;
3rd step: by ShIt is divided intoFour parts, then willBe converted to 10 in the range of (0,1) System decimal Gi, i=0,1 ..., 3;
4th step: by G3As initial parameter α, G0,G1,G2It is mapped as 10 system decimal G ' in the range of (0,1)0,G′1,G′2, By G '0,G′1,G′2As key parameter Xinit,Yinit,xinit, i.e. Xinit=G '0,Yinit=G '1,xinit=G '2
5th step: by initial parameter μ0As systematic parameter, key parameter xinitIn the range of producing 5 (0,1) as initial value Random number is as sequence Sp=< p0,p1,p2,p3,p4>, by SpInterval division sequence S ' in the range of structure (0,1)p=< p '0, p′1,p′2,p′3,p′4>, thus obtain probability interval [0, p '0),[p′0,p′1),[p′1,p′2),[p′2,p′3),[p′3,p′4), [p′4,1];
6th step: by key parameter Yinit0It is mapped as μ1∈ [3.57,4], by XinitAnd μ1Join respectively as initial value and system Number iteration produces intermediate key parameter Z in the range of (0,1)init
7th step: by Xinit,Yinit,ZinitAs initial value, iteration produces 3 real-valued random numbers for 1 time successively as parameter X0,Y0, Z0
8th step: by X0,Y0It is mapped as encrypted image A=(ai,j)m×nOn random point (r0,v0);
9th step: by (r0,v0) as starting point, from image A=(a to be encryptedi,j)m×nFilter out Min=(mu,w)4×4, calculate Min's Mapping value Map (Min), if Map is (Min) >=δ then performs the 10th step, otherwise by xinitAs probabilistic determination value P, by X0,Y0,Z0's Mapping value, as transformation parameter v, the probability interval fallen into according to P, performs corresponding spatial domain and frequency domain displacement cryptographic operation, so Afterwards to the matrix fritter M after encryptionoutCalculate mapping value Map (Mout);If Map is (Mout) < δ, then by MoutIn pixel make successively For image A=(a to be encryptedi,j)m×nThe pixel of correspondence position, otherwise by MinMiddle pixel is directly as image A=to be encrypted (ai,j)m×nCorrespondence position pixel;
10th step: utilize X0,Y0,Z0To case index sequence SidCarry out resetting and update;
11st step: utilize X0,Y0,Z0To initial parameter μ0And Sms=< msi>72In element be updated operation;
12nd step: if during k≤t, updates k=k+1, repeatedly performs the 2nd step~the 11st step;
13rd step: by A=(ai,j)m×nOutput is as encrypted image.
The image selective cryptographic method that a kind of dynamic probability the most as claimed in claim 1 and null tone territory are combined, its feature exists In: the 2nd step is by SmsIt is mapped as Sh=< h0,h1,…,h39> concrete grammar be formula (1):
Sh=Draw (Sms,start,gap,|Sh|) (1)
In formula (1), Draw () is that sequential element extracts function, and wherein start is extraction starting point, and gap is the sample number skipped, | Sh | for ShMiddle number of elements, i.e. from SmsCirculation extraction | Sh| individual 16 system numbers are as Sh, start, gap are respectively by formula (2) and formula (3) Mapping obtains:
3rd step is by ShIt is divided intoTetrameric concrete grammar is formula (4):
3rd step willBe converted to 10 system decimal G in the range of (0,1)i, i=0,1 ..., the concrete grammar of 3 is Formula (5), in formula (5), [] is round function:
The image selective cryptographic method that a kind of dynamic probability the most as claimed in claim 1 and null tone territory are combined, its feature exists In: the 4th step is by G3As initial parameter α, G0,G1,G2It is mapped as 10 system decimal G ' in the range of (0,1)0,G′1,G′2's Concrete grammar is by G0,G1,G2Respectively as the input parameter of formula (6), substitute into formula (6) iteration and produce 3 sequential value G ' 1 time0, G′1,G′2
5th step is by μ0As systematic parameter, xinitThe random number in the range of 5 (0,1) is produced as sequence S as initial valuep= <p0,p1,p2,p3,p4> concrete grammar be by μ0As systematic parameter, xinitBring formula (7) iteration into as initial value to produce for 5 times 5 random numbers as sequence Sp=< p0,p1,p2,p3,p4>
xi+1=μ xi(1-xi) (7);
By S in 5th steppInterval division sequence S ' in the range of structure (0,1)p=< p '0,p′1,p′2,p′3,p′4> concrete grammar For by SpMiddle element obtains interval division sequence S ' by descending orderp=< p '0,p′1,p′2,p′3,p′4>。
The image selective cryptographic method that a kind of dynamic probability the most as claimed in claim 1 and null tone territory are combined, its feature exists In: the 6th step is by Yinit0It is mapped as μ1The concrete grammar of ∈ [3.57,4] is formula (8):
6th step is by XinitAnd μ1The intermediate key parameter in the range of (0,1) is produced respectively as initial value and systematic parameter iteration ZinitConcrete grammar be by XinitAnd μ11 conduct of formula (7) iteration is pressed respectively as the initial value in formula (7) and systematic parameter Intermediate key parameter Zinit
xi+1=μ xi(1-xi) (7);
7th step is by Xinit,Yinit,ZinitAs initial value, iteration produces 3 random numbers for 1 time successively as parameter X0,Y0,Z0's Concrete grammar is by Xinit,Yinit,ZinitAs the initial value of formula (9), produce 3 random number conducts successively iterative (9) 1 times Parameter X0,Y0,Z0, formula (9) systematic parameter takes a=b=0.2, c=5.7;
The image selective cryptographic method that a kind of dynamic probability the most as claimed in claim 1 and null tone territory are combined, its feature exists In: the 8th step is by X0,Y0Being mapped as encrypted image is A=(ai,j)m×nOn random point (r0,v0) concrete grammar be formula (10), In formula (10)Accord with for downward rounding operation;
9th step is by (r0,v0) as starting point, from image A=(a to be encryptedi,j)m×nFilter out the matrix fritter M of 4 × 4in= (mu,w)4×4Concrete grammar be formula (11):
9th step calculates MinMapping value Map (Min) concrete grammar be by formula (12) calculate MinVariance:
9th step is to the matrix fritter M after encryptionoutCalculate mapping value Map (Mout) concrete grammar be the side same by formula (12) Method calculates MoutVariance;
By X in 9th step0,Y0,Z0Mapping value be formula (13) as the concrete grammar of transformation parameter v:
9th step performs the spatial domain of correspondence and the concrete grammar of frequency domain displacement cryptographic operation is formula (14):
Mout=Encrypt (Min,v,P,f,Sid,S′p) (14)
In formula (14), f={f0,f1,…,f5It is encrypted event set, SidIt is the subscript index sequence of f, S 'pFor interval division Sequence, corresponding 6 group encryption event, the wherein f of encrypted event set f0,f1,f2Spatial domain displacement box encrypted event, as shown in formula (15), f3,f4,f5Transform domain displacement box encrypted event, as shown in formula (16), f0,f1,…,f5Corresponding displacement box Px0,Px1,…, Px5As shown in formula (17);
In formula (15), McodeIt is MinNumbering matrix, remember MinIn element mu,wAt McodeIn numbered id, then Permute0() The function that function performs is by mu,wMove to PxiMiddle element value is the coordinate position of (id+v) mod16;
In formula (16), MHIt is Hadamard transform battle array, remembers MtempIn element mtu,wAt McodeIn numbered id and id ≠ ×, Permute1The operation that () performs is by mtu,wMove to PxiMiddle element value is the coordinate position of (id+v) mod16+1, with Permute0The difference of () is Permute1() in conversion process, MtempIn the element of (0,0) position, i.e. id=× element Remaining at (0,0) position does not occur position to change;
The image selective cryptographic method that a kind of dynamic probability the most as claimed in claim 1 and null tone territory are combined, its feature exists In: the 10th step utilizes X0,Y0,Z0To case index sequence SidCarry out resetting the concrete grammar updated for by X0,Y0,Z0By formula (18) Being mapped as start, gap with formula (19), right back-pushed-type (20) is to case index sequence SidIt is updated:
Sid=Draw (Sid,start,gap,|Sid|) (20);
11st step utilizes X0,Y0,Z0To initial parameter μ0The concrete grammar updated is formula (22):
To S in 11st stepms=< msi>72In element be updated operation method particularly includes: first use X0,Y0,Z0By formula (21) Generate xinit, then by xinit0Substitution formula (7) iteration produces random sequence SR=< ri>72, by formula (23) to Sms=< msi>72 In element be updated operation;
xinit=(X0+X0Y0+X0Y0Z0)mod1 (21)
xi+1=μ xi(1-xi) (7)
7. the image selectivity decryption method that a kind of dynamic probability corresponding with claim 1 and null tone territory are combined, its feature It is to comprise the following steps:
1st step: inputted key μ by user0∈[3.57,4],SMD5,SSHA-1, encrypt number of times t, t > 0 and encrypted image C, initially Iteration control parameter k=0, input encryption judgment threshold δ, δ > 0, by SMD5And SSHA-1Series connection is 16 system Number Sequence Sms=SMD5 ||SSHA-1=< smi>72And initialization encryption event subscript index sequence Sid=<0,1 ..., 5>and intermediate key argument sequence SX >,SY >,SZ >,SX >,S′P >,SId >For empty sequence;
2nd step: by SmsIt is mapped as 16 system sequences Sh=< h0,h1,…,h39>;
3rd step: by ShIt is divided intoFour parts, then willBe converted to 10 in the range of (0,1) System decimal Gi, i=0,1 ..., 3;
4th step: by G3As initial parameter α, G0,G1,G2It is mapped as 10 system decimal G in the range of (0,1)0′,G1′,G2', By G0′,G1′,G2' as key parameter Xinit,Yinit,xinit, i.e. Xinit=G '0,Yinit=G '1,xinit=G '2, by xinitMake For sequence SX >In kth element
5th step: by μ0As systematic parameter, xinitThe random number in the range of 5 (0,1) is produced as sequence S as initial valuep =< p0,p1,p2,p3,p4>, by SpInterval division sequence S ' in the range of structure (0,1)p=< p '0,p′1,p′2,p′3,p′4>, from And obtain 6 probability intervals [0, p '0),[p′0,p′1),[p′1,p′2),[p′2,p′3),[p′3,p′4),[p′4, 1], by p '0, p′1,p′2,p′3,p′4As sequence S 'P >In 5k, 5k+1 ..., 5k+4 element
6th step: by Yinit, μ is mapped as the μ in the range of [3.57,4]1, by XinitAnd μ1Change respectively as initial value and systematic parameter In generation, the mapping value of 1 time was as intermediate key parameter Zinit
7th step: by Xinit,Yinit,ZinitSubstitute into chaos system for 1 time as initial value iteration and produce 3 real-valued random numbers X0,Y0, Z0, and by X0,Y0,Z0Successively respectively as SX >,SY >,SZ >In kth element
8th step: utilize X0,Y0,Z0To event subscript index sequence SidIt is updated, by SidIn all elements conduct successively SId >In 6k, 6k+1 ..., 6k+5 element
9th step: utilize X0,Y0,Z0To initial parameter μ0And Sms=< msi>72In element be updated operation;
10th step: if k ≠ t updates k=k+1, repeatedly perform the 2nd step~the 9th step, available sequence
11st step: by SX >,SY >-1 element of kthIt is mapped as image C=(c to be decryptedi,j)m×nOn random point (r0,v0), by SZ >-1 element of kth in sequenceWithIt is mapped as transformation parameter v;
12nd step: by (r0,v0) as starting point, from image C=(c to be decryptedi,j)m×nFilter out 4 × 4 matrix fritter Min= (mu,w)4×4, calculate MinMapping value Map (Min), if Map is (Min) >=δ, then update k=k-1, perform the 11st step when k ≠ 0, The 14th step is performed as k=0, if above-mentioned condition Map (Min) >=δ is not satisfied, and takes SX >-1 element of kthAs probability Judgment value P, utilizes S 'P >5k-5,5k-4 ..., 5k-1 elementStructure probability intervalTake SId >6k-6,6k-5 ..., 6k-1 unit ElementAs subscript index sequence, with v as transformation parameter, the Probability Region fallen into according to P Between, by matrix fritter Min=(mu,w)4×4Deciphering is matrix fritter Mout
13rd step: calculate MoutCorresponding mapping value Map (Mout), if Map is (Mout) < δ, then by MoutIn element successively as adding Close image C=(ci,j)m×nThe pixel of correspondence position, otherwise by MinMiddle pixel is as encrypted image C=(ci,j)m×nCorrespondence position Pixel, update k=k-1 when k ≠ 0, repeatedly perform the 11st step~the 13rd step;
14th step: by C=(ci,j)m×nOutput is as decrypted image.
The image selectivity decryption method that a kind of dynamic probability the most as claimed in claim 7 and null tone territory are combined, its feature exists In: by S in the 2nd stepmsIt is mapped as sequence Sh=< h0,h1,…,h39> concrete grammar be formula (1):
Sh=Draw (Sms,start,gap,|Sh|) (1)
In formula (1), Draw () is that sequential element extracts function, and wherein start is extraction starting point, and gap is the sample number skipped, | Sh | for ShMiddle number of elements, i.e. from SmsCirculation extraction | Sh| individual 16 system numbers are as Sh, start, gap are respectively by formula (2) and formula (3) Mapping obtains:
3rd step is by ShIt is divided intoTetrameric concrete grammar is formula (4):
3rd step willBe converted to 10 system decimal G in the range of (0,1)i, i=0,1 ..., the concrete grammar of 3 is Formula (5):
4th step is by G3As initial parameter α, G0,G1,G2It is mapped as 10 system decimal G ' in the range of (0,1)0,G′1,G′2's Concrete grammar is by G0,G1,G2Respectively as the input parameter of formula (6), substitute into formula (6) iteration and produce 3 sequential value G ' 1 time0, G′1,G′2
By μ in 5th step0As systematic parameter, xinitThe random number in the range of 5 (0,1) is produced as sequence S as initial valuep =< p0,p1,p2,p3,p4> concrete grammar be by μ0As systematic parameter, xinitBring formula (7) iteration into as initial value to produce for 5 times Raw sequence Sp=< p0,p1,p2,p3,p4>:
xi+1=μ xi(1-xi) (7);
By S in 5th steppInterval division sequence S ' in the range of structure (0,1)p=< p '0,p′1,p′2,p′3,p′4> concrete grammar For by SpMiddle element obtains interval division sequence S ' by descending orderp=< p '0,p′1,p′2,p′3,p′4>。
9., as claimed in claim 7 based on the image selectivity decryption method that dynamic probability and null tone territory are compound, its feature exists In: the 6th step is by Yinit0It is mapped as the μ in the range of [3.57,4]1Concrete grammar be formula (8):
6th step is by XinitAnd μ1Respectively as the mapping value of initial value and systematic parameter iteration 1 time as intermediate key parameter Zinit Concrete grammar be use formula (7):
xi+1=μ xi(1-xi) (7);
7th step is by Xinit,Yinit,ZinitSubstitute into chaos system for 1 time as initial value iteration and produce 3 real-valued random numbers X0,Y0,Z0 Concrete grammar be by Xinit,Yinit,ZinitAs the initial value of formula (9), formula (9) systematic parameter takes a=b=0.2, c=5.7, Produce 3 real-valued random value X iterative (9) 1 times0,Y0,Z0:
8th step utilizes X0,Y0,Z0To event subscript index sequence SidThe concrete grammar being updated is for by X0,Y0,Z0By formula (18) Being mapped as start, gap with formula (19), right back-pushed-type (20) is to SidIt is updated:
Sid=Draw (Sid,start,gap,|Sid|) (20);
9th step utilizes X0,Y0,Z0To initial parameter μ0The concrete grammar being updated is formula (22):
9th step is to Sms=< msi>72In element be updated operation method particularly includes: first use X0,Y0,Z0Generate by formula (21) xinit, then by xinit0Substitution formula (7) iteration produces random sequence SR=< ri>72, by formula (23) to Sms=< msi>72In Element is updated operation;
xinit=(X0+X0Y0+X0Y0Z0)mod1 (21)
xi+1=μ xi(1-xi) (7)
The image selectivity decryption method that a kind of dynamic probability the most as claimed in claim 7 and null tone territory are combined, its feature exists In: by S in the 11st stepX >,SY >-1 element of kthIt is mapped as image C=(c to be decryptedi,j)m×nUpper random point (r0, v0) concrete grammar be formula (24):
11st step is by SZ >-1 element of kth in sequenceWithThe concrete grammar being mapped as transformation parameter v is formula (25):
12nd step is by (r0,v0) as starting point, from image C=(c to be decryptedi,j)m×nFilter out the matrix fritter M of 4 × 4in= (mu,w)4×4Concrete grammar be formula (26):
12nd step calculates MinMapping value Map (Min) concrete grammar for calculate M by formula (12)inCorresponding variance:
By matrix M in 12nd stepin=(mu,w)4×4Deciphering is matrix MoutConcrete grammar be formula (27):
Mout=Decryption (Min,v,P,f′,SId >,S′P >) (27)
In formula (27), f '={ f '0,f′1,…,f′5It is program event set, f ' corresponding 6 groups of program event, wherein f '0,f′1, f′2Spatial domain displacement box program event, as shown in formula (28), f '3,f′4,f′5Transform domain displacement box program event, such as formula (29) institute Show, f '0,f′1,…,f′5Corresponding displacement box Px0,Px1,…,Px5As shown in formula (17):
In formula (28), McodeIt is numbering matrix, remembers MinIn element mu,wAt PxiIn numbered id, thenLetter The function that number performs is by mu,wMove to McodeMiddle element number is the coordinate position of (id-v+16) mod16;
In formula (29), MHIt is Hadamard transform battle array, Permute1 -1The operation that () performs is by PxiIn numbered id ≠ × Element mtu,wMove to McodeIn the coordinate position of numbered (id-v+16) mod16+1, id=× element remain at (0,0) position does not occur position to change;
13rd step calculates MoutCorresponding mapping value Map (Mout) concrete grammar be to calculate M by the same method of formula (12)outInstitute Corresponding variance.
CN201610102071.1A 2016-02-24 2016-02-24 The compound image selection encryption and decryption approaches of a kind of dynamic probability and null tone domain Active CN105761198B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610102071.1A CN105761198B (en) 2016-02-24 2016-02-24 The compound image selection encryption and decryption approaches of a kind of dynamic probability and null tone domain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610102071.1A CN105761198B (en) 2016-02-24 2016-02-24 The compound image selection encryption and decryption approaches of a kind of dynamic probability and null tone domain

Publications (2)

Publication Number Publication Date
CN105761198A true CN105761198A (en) 2016-07-13
CN105761198B CN105761198B (en) 2019-03-05

Family

ID=56331121

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610102071.1A Active CN105761198B (en) 2016-02-24 2016-02-24 The compound image selection encryption and decryption approaches of a kind of dynamic probability and null tone domain

Country Status (1)

Country Link
CN (1) CN105761198B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106485742A (en) * 2016-07-26 2017-03-08 上海海洋大学 A kind of remote sensing images based on Arnold chaotic maps encrypt search method
CN106600517A (en) * 2016-11-11 2017-04-26 陕西师范大学 Multi-carrier secret image separate storage and reconstruction method based on EMD-3
CN110197077A (en) * 2019-05-31 2019-09-03 长春理工大学 Area-of-interest medical image chaos encrypting method based on comentropy more new key
CN111865908A (en) * 2020-06-08 2020-10-30 杭州电子科技大学 Resource-constrained system secure communication method based on random encryption strategy
CN113344853A (en) * 2021-05-06 2021-09-03 东南大学 Robustness detection method based on random displacement algorithm brain image omics
CN114153411A (en) * 2021-12-02 2022-03-08 上海交通大学 Image optimization transmission system for remote terminal management and control

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20040073045A (en) * 2003-02-13 2004-08-19 주식회사 디지트리얼테크놀로지 Data Hiding and Extraction System Using JND and CSF
CN1885342A (en) * 2006-06-21 2006-12-27 北京交通大学 Print domain trademark anti-counterfeit method based on digital watermark technology
CN103402040A (en) * 2013-08-06 2013-11-20 浙江农林大学 Spatial domain and Fourier frequency domain double encryption-based dual image encryption method
CN103929563A (en) * 2014-04-11 2014-07-16 陕西师范大学 Image encryption and decryption method based on improved Joseph traversal and generalized Henon mapping
CN104851070A (en) * 2015-05-08 2015-08-19 陕西师范大学 Foreground and background separation-based image encryption and decryption methods

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20040073045A (en) * 2003-02-13 2004-08-19 주식회사 디지트리얼테크놀로지 Data Hiding and Extraction System Using JND and CSF
CN1885342A (en) * 2006-06-21 2006-12-27 北京交通大学 Print domain trademark anti-counterfeit method based on digital watermark technology
CN103402040A (en) * 2013-08-06 2013-11-20 浙江农林大学 Spatial domain and Fourier frequency domain double encryption-based dual image encryption method
CN103929563A (en) * 2014-04-11 2014-07-16 陕西师范大学 Image encryption and decryption method based on improved Joseph traversal and generalized Henon mapping
CN104851070A (en) * 2015-05-08 2015-08-19 陕西师范大学 Foreground and background separation-based image encryption and decryption methods

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106485742A (en) * 2016-07-26 2017-03-08 上海海洋大学 A kind of remote sensing images based on Arnold chaotic maps encrypt search method
CN106485742B (en) * 2016-07-26 2019-08-23 上海海洋大学 A kind of remote sensing images encryption search method based on Arnold chaotic maps
CN106600517A (en) * 2016-11-11 2017-04-26 陕西师范大学 Multi-carrier secret image separate storage and reconstruction method based on EMD-3
CN110197077A (en) * 2019-05-31 2019-09-03 长春理工大学 Area-of-interest medical image chaos encrypting method based on comentropy more new key
CN110197077B (en) * 2019-05-31 2020-12-11 长春理工大学 Region-of-interest medical image chaotic encryption method based on information entropy updating key
CN111865908A (en) * 2020-06-08 2020-10-30 杭州电子科技大学 Resource-constrained system secure communication method based on random encryption strategy
CN111865908B (en) * 2020-06-08 2022-05-17 杭州电子科技大学 Resource-constrained system secure communication method based on random encryption strategy
CN113344853A (en) * 2021-05-06 2021-09-03 东南大学 Robustness detection method based on random displacement algorithm brain image omics
CN113344853B (en) * 2021-05-06 2024-03-12 东南大学 Robustness detection method based on random displacement algorithm brain image histology
CN114153411A (en) * 2021-12-02 2022-03-08 上海交通大学 Image optimization transmission system for remote terminal management and control
CN114153411B (en) * 2021-12-02 2024-01-12 上海交通大学 Remote terminal control-oriented image optimization transmission system

Also Published As

Publication number Publication date
CN105761198B (en) 2019-03-05

Similar Documents

Publication Publication Date Title
CN105761198A (en) Image selective encryption and decryption method based on dynamic probability and space-frequency domain compositing
CN112258520B (en) Image encryption and decryption communication method based on two-dimensional hysteresis complex Logistic mapping
CN111105339B (en) Image encryption method based on multidimensional chaotic system and Joseph scrambling
CN107492064B (en) Image encryption method based on memristor chaos system, elementary cellular automata and compressed sensing
CN101739695B (en) Three-dimensional Arnold mapping-based image grouping encryption method
CN106327414B (en) A kind of double New chaotic image encryption methods based on plaintext self-characteristic
CN103167213B (en) Digital image encryption method based on Cat mapping and hyper-chaos Lorenz system
CN105847629A (en) Reversible information hiding method for encrypted image
Jose et al. A separable reversible data hiding in encrypted image with improved performance
CN105577354A (en) Image encryption and decryption method based on probability interval division and dynamic probability events
Belazi et al. Algebraic analysis of a RGB image encryption algorithm based on DNA encoding and chaotic map
CN105681622A (en) Color image encryption method based on cellular neural network hyperchaos and DNA sequence
CN105917381B (en) Cryptography crack method and device based on double random phase image encoding system
CN114389788B (en) Image encryption algorithm with mixed chaos and block scrambling
CN110299988B (en) Method and device for detecting anti-attack capability of lightweight block cipher algorithm
Hassan Proposed hyperchaotic system for image encryption
Wang et al. An image scrambling encryption using chaos-controlled Poker shuffle operation
CN106780278A (en) A kind of combination zero watermarking and the self- recoverage image encryption and decryption method of block sort fusion
CN105553639A (en) Multi-image encryption and decryption method based on compression sensing
CN108075878A (en) A kind of Chaotic Secure Speech Communication method based on transmitting terminal
CN109657484B (en) Multi-channel image coding and decoding method based on gamma function and ciphertext splicing
CN115190216A (en) Encryption image reversible data hiding and decrypting method based on prediction error map
Loidreau Analysis of a public-key encryption scheme based on distorted Gabidulin codes
CN115170377A (en) Progressive image sharing method based on super-resolution and encrypted domain information hiding
Jiang et al. Compressive-sensing-based double-image encryption algorithm combining double random phase encoding with Josephus traversing operation

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant