CN105913369A - Three dimensional cat face transformation and hyper-chaotic system-based fractional domain image encryption method - Google Patents

Three dimensional cat face transformation and hyper-chaotic system-based fractional domain image encryption method Download PDF

Info

Publication number
CN105913369A
CN105913369A CN201610217483.XA CN201610217483A CN105913369A CN 105913369 A CN105913369 A CN 105913369A CN 201610217483 A CN201610217483 A CN 201610217483A CN 105913369 A CN105913369 A CN 105913369A
Authority
CN
China
Prior art keywords
image
dimensional
dimension
array
chaos sequence
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610217483.XA
Other languages
Chinese (zh)
Other versions
CN105913369B (en
Inventor
魏德运
邓斌
王睿岿
李远敏
胡发宝
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xidian University
Original Assignee
Xidian University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xidian University filed Critical Xidian University
Priority to CN201610217483.XA priority Critical patent/CN105913369B/en
Publication of CN105913369A publication Critical patent/CN105913369A/en
Application granted granted Critical
Publication of CN105913369B publication Critical patent/CN105913369B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Complex Calculations (AREA)
  • Image Processing (AREA)

Abstract

The invention discloses a three dimensional cat face transformation and hyper-chaotic system-based fractional domain image encryption method which is mainly used for solving problems of low scrambling degrees, low sensitivity of secret keys and poor robustness in technologies of the prior art. The method comprises the following steps: 1, after an original image is decomposed, a three dimensional matrix set is obtained; 2, each element in the three dimensional matrix set is subjected to three dimensional cat face transformation operation, and a scrambled three dimensional matrix set is obtained; 3, the scrambled three dimensional matrix set is reconstructed, and a scrambled image is obtained; 4, the scrambled image is subjected to fraction Fourier transforming operation, and a transformed image is obtained; 5, a Clifford hyper-chaotic system is used for generating a chaotic sequence and processing the chaotic sequence, and a row and column scrambled address set is obtained; 6, the row and column scrambled address set is used for subjecting the transformed image to secondary scrambling operation, and a final encrypted image is obtained. The three dimensional cat face transformation and hyper-chaotic system-based fractional domain image encryption method is high in scrambling degree, strong in sensitivity and good in robustness; security of image transmission is improved, and the method can be applied to information safety.

Description

Score field image encryption method based on three-dimensional cat face conversion with hyperchaotic system
Technical field
The invention belongs to technical field of image processing, particularly to a kind of image encryption method, can be used for information security.
Background technology
Along with the fast development of network technology, substantial amounts of view data is transmitted on the internet and exchanges.Due to figure As information is vivid, comprised contains much information, and it becomes the mankind and transmits the important means of information.Image information is directed not only to To individual privacy, some also relates to national security, thus image encryption is increasingly by the most attention of society.In recent years, Fractional fourier transform and chaos is used to be encrypted to cause to image and pay close attention to widely.
Changing image pixel positions is the method commonly using image encryption.Arnold conversion, is commonly called as " conversion of cat face ", is The class cutting conversion that Russia mathematician V.J.Arnold proposes in the research of ergodic theory.Because the chaos of cat face conversion is special Property, it is incorporated into image encryption and digital watermarking has good effect.Three-dimensional cat face conversion has good decorrelation, due to This conversion is three-dimensional, thus has certain space complexity in actual applications, and it has bigger close than the conversion of two-dimentional cat face Key space, faster diffusion velocity.But, owing to three-dimensional cat face conversion has periodically, and parameter only has 6, therefore is used for counting It is easily subject to attack during according to encryption.
Chaos phenomenon is the performance of the similar stochastic process a kind of that determine, inherent occurred in nonlinear dynamic system.Mixed The chaotic signal that ignorant system produces has similar white noise, structure complexity, is difficult to analyze and to initial condition and control parameter The characteristics such as extreme sensitivity.Hyperchaotic system is a kind of special chaos system, is generally of two or more positive The chaos system of Lyapunov index is referred to as hyperchaotic system.Positive Lyapunov index is the most, the side that system track is unstable To the most, the randomness of system is the strongest, and its antidecoding capability is the strongest.Use Clifford hyperchaotic system that image is added Close, its key has good sensitivity.Utilize Clifford hyperchaotic system encrypted image simply in the spatial domain of image Converting, if cipher text part information dropout, then decrypted image also can lose part information therewith, so robustness compares Difference.
Fractional fourier transform can make the energy of image different along with the difference of conversion order.When order is by 0 convergence In changing in 1, image is gradually reduced in time domain energy, and frequency domain energy is gradually increased, and vice versa.So fractional order Fourier becomes Change and there is time domain and the feature in frequency-domain combined territory.Therefore, in transform domain, the distribution of the energy of picture signal is change.It along with The changing above each pixel of Energy distribution to spatial domain of conversion order, thus it is effectively guaranteed that the safety of encrypted image Property, make encrypted image have stronger antinoise signal and process and the ability of malicious attack.But it is single use fractional fourier transform The sensitivity of the key being encrypted image is the highest, there is certain risk being decrypted.
Summary of the invention
Present invention aims to the deficiency of above-mentioned prior art, it is provided that one converts with super mixed based on three-dimensional cat face The score field image encryption method of ignorant system, the sensitivity of safety and key to improve image transmitting.
The technical scheme is that first treating encrypted image carries out three-dimensional cat face conversion, then carries out mark to it Fourier transformation, finally uses Clifford hyperchaotic system that image is carried out scramble, obtains encrypted image.Implementation step bag Include as follows:
(1) the gray level image F of a width M × N is inputted, it is thus achieved that and the two-dimensional matrix f of this gray level image (s, t), and to this two dimension Matrix decomposes, and obtains the three-dimensional matrice set omega of gray level imagen={ A1,A2,...,An, wherein AnRepresent three-dimensional matrice collection Close ΩnIn the n-th three-dimensional matrice, M >=N;
(2) transformation matrix parameter and the iterations m of three-dimensional cat face conversion are chosen, to three-dimensional matrice set omeganIn each Three-dimensional matrice makees m three-dimensional cat face conversion respectively, obtains the three-dimensional matrice set omega ' after scramblen={ A '1,A′2,...,A′n, Again by the three-dimensional matrice set omega ' after scramblenReconstruct the image array f after two dimension scramble1(s,t);
(3) fractional fourier transform conversion exponent number p in x, y direction is chosen1、p2, to the image array f after two dimension scramble1 (s t) carries out two dimension fractional fourier transform, the image array after being converted
(4) x is chosen respectively0、y0、z0As the initial value of Clifford hyperchaotic system, and this initial value is substituted into Clifford Hyperchaotic system equation is iterated, obtains three chaos sequence { xi}、{yi}、{zi, i=0,1,2 ..., 9999+M;
(5) respectively by first chaos sequence { xiAnd second chaos sequence { yiFront 10000 numerical value remove, and It is re-started numbering, obtains acting on the final chaos sequence in x directionWith the original chaotic sequence acting on y direction {y′i′, j1=0,1,2 ..., M-1, i '=0,1,2 ..., M-1;
(6) choose and act on the original chaotic sequence { y ' in y directioni′Top n element and rename, acted on The final chaos sequence in y directionj2=0,1,2 ..., N-1;
(7) the final chaos sequence in x directionFinal chaos sequence with y directionBy order from small to large It is ranked up, obtains two orderly new chaos sequencesWithAnd record the new chaos sequence in x direction respectivelyy The new chaos sequence in directionIn each element final chaos sequence in x directionFinal chaos sequence with y directionIn Position Number, obtain line shuffle address setWith row scramble address setWhereinRepresent the new chaos sequence in x directionIn r1+ 1 element is in x direction Whole chaos sequenceIn Position Number,Represent the new chaos sequence in y directionIn r2+ 1 element is in y direction Final chaos sequenceIn Position Number, r1=0,1,2 ..., M-1, r2=0,1,2 ..., N-1;
(8) image array after the conversion that will obtain in step (3)Row, column successively according to line shuffle address Element in set Q and row scramble address set P carries out scramble, and image array g after being encrypted (u, v).
The invention have the benefit that
1. the present invention utilizes three-dimensional cat face conversion and Clifford hyperchaotic system to carry out overall situation pixel permutation, and with dividing Number Fourier transformation processes, and greatly reduces the dependency between ciphertext pixel;
2. the present invention carries out preliminary scrambling encryption first with three-dimensional cat face conversion, then utilizes fractional fourier transform to enter Row secondary is encrypted, and finally utilizes Clifford Hyperchaotic Sequence scramble to carry out Tertiary infilling, and this multi-level encryption makes encryption method There is the highest safety;
3. the present invention uses fractional fourier transform, enhances the robustness of image encryption;
4. the present invention uses Clifford hyperchaotic system, has the key parameter that sensitivity is higher.
Accompanying drawing explanation
Fig. 1 is the flowchart of the present invention;
Fig. 2 is the original image that the present invention uses;
Fig. 3 is the image after encrypting Fig. 2;
Fig. 4 is the grey level histogram of Fig. 2;
Fig. 5 is the grey level histogram of Fig. 3
Key sensitivity analysis figure when Fig. 6 is that in the present invention, change combined by two chaos initial values;
Key sensitivity analysis figure when Fig. 7 is that in the present invention, two fractional fourier transform exponent numbers combine change;
Fig. 8 is that the image after Clifford hyperchaotic system method and the inventive method encryption is suffering sanction in various degree Image after cutting and the deciphering figure of correspondence thereof.
Detailed description of the invention
With reference to Fig. 1, the present invention to be embodied as step as follows:
Step 1, inputs image to be encrypted, it is thus achieved that and its two-dimensional matrix f (s, t).
Call imread function and read in the gray level image of M × N of an entitled liftingbody as image to be encrypted, As shown in Figure 2, it is thus achieved that and its two-dimensional matrix f (s, t), now M=N=512.
Step 2, to two-dimensional matrix f, (s, t) decomposes, and obtains the three-dimensional matrice set omega of gray level imagen
(2a) the three-dimensional matrice set omega after decomposition is determinednNumber n of middle element:
(2a1) total number S of element of image is calculated0=M × N=512 × 512=262144, to S0Open cube and to knot Fruit rounds, and obtains line number value a of the three-dimensional matrice of first cubic1=64, make n=1;
(2a2) the element number S of image after n-1 three-dimensional matrice before calculating is removedn-1Scheme after deducting the n-th three-dimensional matrice The element number a of picturen 3Value, obtain removing the element number S of image after the n-th three-dimensional matricen
(2a3) the element number S of image after the n-th three-dimensional matrice is removed in judgementnWhether > 100 sets up: if setting up, the most right Remove the element number S of image after the n-th three-dimensional matricenOpen cube and result is rounded, making n=n+1, returning step (1a2);If being false, then make remaining element number a0For S nown, end loop;
Now S1=0, it is clear that no more than 100, and remaining element number a0=S1=0, end loop, therefore after decomposing Three-dimensional matrice set omeganNumber n=1 of middle element;
(2b) by two-dimensional matrix f, (s t) resolves into the three-dimensional matrice set omega of 1 three-dimensional matrice composition1:
(2b1) by two-dimensional matrix f, (s t) reconstructs one-dimension array B [262144], according to order from left to right by each column Element be placed in one-dimension array, the element in each column is placed from the top down, obtains one containing 262144 elements One-dimension array B [262144];
(2b2) element of the n-th=1 fragment is placed in the n-th=1 three-dimensional matrice of correspondence, will the n-th=1 section In 262144 elements place according to the order from bottom-up layer, element is placed into each column by every layer from left to right, then Element in each column is arranged from the top down, obtains the three-dimensional matrice A that size is 64 × 64 × 641, by this three Dimension matrix obtains three-dimensional matrice set omegan={ A1}。
Step 3, to three-dimensional matrice set omega1In each three-dimensional matrice make m=10 three-dimensional cat face conversion respectively, put Three-dimensional matrice set omega ' after unrest1
Three-dimensional cat face transformation for mula is as follows:
x ′ y ′ z ′ = A x y z mod ( N ) ,
WhereinIt is referred to as Transformation matrix, ax、ay、azIt is respectively two dimension cat face transformation matrix a expansion parameter in the x, y, z-directions, bx、by、bzFor two dimension Cat face transformation matrix b expansion parameter in the x, y, z-directions;X, y, z is respectively the abscissa before conversion, vertical coordinate, ordinate; X ', y ', z ' are the abscissa after three-dimensional cat face change action, vertical coordinate, ordinate;Mod represents modular arithmetic.
Choose transformation matrix parameter a of three-dimensional cat face conversionx=ay=az=bx=by=bz=1 and iterations m=10, Utilize above-mentioned three-dimensional cat face transformation for mula to three-dimensional matrice set omega1In a three-dimensional matrice convert, its step is as follows:
(3a) three-dimensional matrice A is obtained1In coordinate (x, y, z) pixel value at place of each pixel;
(3b) by three-dimensional matrice A1In the coordinate of each pixel (x, y, z) according to above-mentioned three-dimensional cat face conversion Carry out coordinate transform, obtain coordinate (x ', y ', z ');
(3c) original pixel value is composed on new coordinate (x ', y ', z '), thus complete once three-dimensional cat face conversion;
(3d) repeat above-mentioned conversion 9 times, obtain the three-dimensional matrice A ' after scramble1, by the three-dimensional matrice A ' after scramble1, Obtain the three-dimensional matrice set omega ' after scramble1={ A '1}。
Step 4, by the three-dimensional matrice set omega ' after scramble1Reconstruct the image array f after two dimension scramble1(s,t)。
(4a) by the n-th=1 three-dimensional matrice A1In h1The h of page2Row h3The element of row is placed on one-dimension array B1's TheIndividual position, obtains n=1 one-dimension arrayh1=1,2, 3 ..., 64, h2=1,2,3 ..., 64, h3=1,2,3 ..., 64;
(4b) by n=1 one-dimension array B1[262144] new one-dimension array B ' it is emitted on successively according to the size of array [262144], in, the new one-dimension array B ' [262144] containing 262144 elements is obtained;
(4c) by 262144 elements in new one-dimension array B ' [262144] according to being subsequently placed at from left to right Image array f after two dimension scramble1(s, t) in each column, the element in each column places from the top down, obtains two dimension scramble After image array f1(s,t)。
Step 5, by the image array f after the scramble of two dimension1(s t) carries out two dimension fractional fourier transform, is converted After image array
Two dimension fractional fourier transform formula is as follows:
F p 1 , p 2 ( u , v ) = F p 1 , p 2 [ f 1 ( s , t ) ] = ∫ - ∞ + ∞ ∫ - ∞ + ∞ f 1 ( s , t ) K p 1 , p 2 ( s , t , u , v ) d s d t ,
WhereinBeing the core of two dimension fractional fourier transform, this conversion can be equivalent to respectively by x, y two Individual direction carries out fractional fourier transform, therefore its transformation kernel can be write asNow two The kernel function of dimension fractional fourier transform is:
K p 1 , p 2 ( x , t , u , v ) = ( 1 - j cot α ) ( 1 - j cot β ) 2 π × exp ( j ( s 2 + u 2 ) 2 tan α - j s u sin α ) exp ( j ( t 2 + v 2 ) 2 tan β - j t v sin β )
Whereinp1、p2It is respectively the exponent number of fractional form;
Choose the fractional fourier transform conversion exponent number p in x, y direction1=0.6, p2=0.4, after the scramble of two dimension Image array f1(s t) brings above-mentioned two dimension fractional fourier transform formula into, carries out two dimension fractional fourier transform, converted After image array
Step 5, chooses the initial value of Clifford hyperchaotic system, and this initial value is substituted into Clifford hyperchaotic system side Journey is iterated, obtains three chaos sequence { xi}、{yi}、{zi}。
(5a) input initial value x0=-0.98765, y0=0.435678, z0=-0.0000029884, makes k=0;
(5b) first chaos sequence { x is calculatedi+ 1 element x of kthk+1, xk+1=sin (ayk)-zkcos(bxk), its Middle a=2.24, b=0.43;
(5c) second chaos sequence { y is calculatedi+ 1 element y of kthk+1, yk+1=zksin(cxk)-cos(dyk) its Middle c=-0.65, d=-2.43;
(5d) the 3rd chaos sequence { z is calculatedi+ 1 element { z of kthi, zk+1=ecos (bxk), wherein e=1.0;
(5e) numerical value of k is increased by 1, it is judged that the magnitude relationship of k and 10511, if k≤10511, return (5b);Otherwise, Jump out circulation, terminate calculating, obtain three chaos sequence { xi}、{yi}、{zi, wherein i=0,1,2 ..., 10511.
Step 6, respectively by first chaos sequence { xiAnd second chaos sequence { yiFront 10000 numerical value remove, And it is re-started numbering, obtain acting on the final chaos sequence in x directionWith the original chaotic sequence acting on y direction Row { y 'i′, j1=0,1,2 ..., 511, i '=0,1,2 ..., 511.
Step 7, chooses the original chaotic sequence { y ' acting on y directioni′Front N=512 element and rename, To the final chaos sequence acting on y directionj2=0,1,2 ..., 511.
Step 8, the final chaos sequence to x directionFinal chaos sequence with y directionProcess, obtain Line shuffle address set Q and row scramble address set P.
(8a) the final chaos sequence in x directionFinal chaos sequence with y directionBy order from small to large It is ranked up, obtains two orderly new chaos sequencesWith
(8b) the new chaos sequence in x direction is recordedIn each element final chaos sequence in x directionIn Position Number, obtains line shuffle address setWhereinRepresent the new chaos sequence in x directionIn r1+ 1 element final chaos sequence in x directionIn Position Number, r1=0,1,2 ..., 511;
(8c) the new chaos sequence in y direction is recordedIn each element final chaos sequence in y directionIn Position Number, obtains row scramble address set Represent the new chaos sequence in y directionIn R2+ 1 element final chaos sequence in y directionIn Position Number, r2=0,1,2 ..., 511.
Step 9, to the image array after conversionCarry out scramble, and image array g after being encrypted (u, v).
By the image array after conversion in step 5R1+ 1 line replacement is toOK;By image arrayR2+ 1 column permutation is toRow, image array g after being encrypted (u, v), as it is shown on figure 3, r1=0, 1,2 ..., 511, r2=0,1,2 ..., 511.
The effect of the present invention can be further illustrated by following emulation experiment:
In order to illustrate advantage and the feature of the present invention, below this invention and prior art are emulated, analyze it Cipher round results.
1. experimental situation
The hardware test platform of this experiment is: Inter (R) Core (TM) i5-4200U CPU, dominant frequency 1.6Ghz, internal memory 4.0GB;Software platform is: Windows 7 operating system and Matlab2012a.Emulating image uses gray level to be 256, size It it is the liftingbody figure of 512 × 512.
2. experiment content
Experiment 1, the grey level histogram of image before and after contrast the inventive method encryption.
Statistical nature grey level histogram between the frequency that in digital picture, each gray level and this gray level occur Representing, grey level histogram is an important statistical nature of image.
The pixel of each gray scale treating encrypted image is added up, and obtains encrypting the grey level histogram of front image, such as Fig. 4 Shown in;The pixel of each gray scale of the image after encrypting by the inventive method is added up, the ash of the image after being encrypted Degree rectangular histogram, as shown in Figure 5.
The grey level histogram of the image before and after encryption is compared, finds that the grey level histogram of the image after encryption is with former There is the biggest difference between the grey level histogram of beginning image, illustrate that the inventive method masks the statistics spy of original image Property, thus significantly increase the image resistance to Statistical Analysis Attacks.
Experiment 2, contrast the inventive method and the scramble degree of three-dimensional cat face alternative approach.
Being encrypted Fig. 2 by the inventive method, result is as shown in Figure 3;
With existing three-dimensional cat face alternative approach, Fig. 2 is encrypted, obtains three-dimensional cat face alternative approach encryption figure.
Randomly choose in level, vertical both direction from Fig. 2, Fig. 3 and three-dimensional cat face alternative approach encryption figure respectively 5000 pairs of neighbors, to investigating dependency, substitute into below equation and are calculated the pixel phase relation at different directions of each image Number:
E ( x ) = 1 N Σ i = 1 N x i D ( x ) = 1 N Σ i = 1 N ( x i - E ( x ) ) 2 cov ( x , y ) = 1 N Σ i = 1 N ( x i - E ( x ) ) ( y i - E ( y ) ) r x , y = cov ( x , y ) D ( x ) D ( y )
Wherein x and y refers to the gray value of two neighbors of image, and E (x) is the estimated value of the mathematic expectaion of x, D (x) Being the estimated value of the variance of x, (x y) is the estimated value of covariance of x and y, calculates with the image of two kinds of encryption method gained cov At the pixel correlation coefficient of different directions, result is as shown in table 1.
The existing three-dimensional cat face conversion of table 1 and the pixel correlation coefficient of the inventive method encrypted image
Artwork Only three-dimensional cat face conversion The inventive method
Horizontal direction 0.8661 0.0920 0.0342
Vertical direction 0.9578 0.0427 0.0405
As it can be seen from table 1 original image is bigger at the pixel correlation coefficient of different directions, show original image Dependency between neighbor pixel is the highest;After three-dimensional cat face conversion is encrypted, the phase between neighbor pixel Closing property substantially diminishes, but the dependency between the neighbor pixel after being encrypted by the inventive method is lower.So, the present invention Method is abundant to the comparison of image slices vegetarian refreshments scramble, and the safety of encryption is higher.
Experiment 3, contrast the inventive method and the key sensitivity of existing fractional fourier transform.
Note original image is I, and encrypted image is Q, is R by the image of deciphering encrypted image gained, thenMSE represent through deciphering image with encrypt before image equal Side's error, MSE value is the biggest, and the information difference of the image before showing the image after deciphering and encrypting is the biggest.
In order to describe the encryption method effectiveness to key in detail, describe with the MSE of decrypted image with original image.
For the hyperchaotic system in the inventive method, fixing z0=-0.0000029884, makes initial value x0、y0Associating change During change on the impact of MSE as shown in Figure 6;
For fractional fourier transform method, two exponent number p of fractional fourier transform1、p2To MSE's during associating change Impact is as shown in Figure 7.
Comparison diagram 6 and Fig. 7 understands, and in the present invention, the change of chaos initial value makes MSE curved surface only in one piece of minimum region Interior change is fairly obvious, and the encryption method of fractional fourier transform make MSE curved surface significant change Parameters variation scope very Greatly, thus the present invention has the key that sensitivity is the strongest, outside the scope that the key parameter of input is minimum around right value, Now decrypted image then can not obtain original image.
Experiment 4, the robustness that contrast the inventive method is encrypted with Clifford hyperchaos method.
By existing Clifford hyperchaos method, liftingbody figure is encrypted, then by encryption figure shearing 20%, 30%, 40%, obtain the cutting figure after the encryption as shown in Fig. 8 (a), Fig. 8 (b), Fig. 8 (c);Again the image after cutting is carried out Deciphering, obtains the deciphering figure of Clifford hyperchaos encryption method as shown in Fig. 8 (d), Fig. 8 (e), Fig. 8 (f).
Liftingbody figure is encrypted by the method proposed by the present invention, then by encryption figure shearing 20%, 30%, 40%, obtain the cutting figure after the encryption as shown in Fig. 8 (g), Fig. 8 (h), Fig. 8 (i);Again the image after cutting is decrypted, Obtain the deciphering figure of use the inventive method as shown in Fig. 8 (j), Fig. 8 (k), Fig. 8 (l).
Comparison diagram 8 (d), Fig. 8 (e), Fig. 8 (f) and Fig. 8 (j), Fig. 8 (k), Fig. 8 (l), it is possible to find after the encryption of hyperchaos method Image be decrypted after cutting, some part of the image after deciphering cannot be restored by after cutting, and along with cutting It is increasingly severe that degree increases impact, and still it can be seen that original image in the image after the encryption method deciphering used by the present invention In most information.Indicate the inventive method there is certain opposing to cut out attacking ability.
To sum up, the present invention not only has the key that sensitivity is the strongest, also has good robustness, so having the highest simultaneously Safety.

Claims (6)

1. a score field image encryption method based on three-dimensional cat face conversion with hyperchaotic system, including:
(1) the gray level image F of a width M × N is inputted, it is thus achieved that and the two-dimensional matrix f of this gray level image (s, t), and to this two-dimensional matrix Decompose, obtain the three-dimensional matrice set omega of gray level imagen={ A1,A2,...,An, wherein AnRepresent three-dimensional matrice set ΩnIn the n-th three-dimensional matrice, M >=N;
(2) transformation matrix parameter and the iterations m of three-dimensional cat face conversion are chosen, to three-dimensional matrice set omeganIn each three-dimensional square Battle array makees m three-dimensional cat face conversion respectively, obtains the three-dimensional matrice set omega ' after scramblen={ A '1,A′2,...,A′n, then will put Three-dimensional matrice set omega ' after unrestnReconstruct the image array f after two dimension scramble1(s,t);
(3) fractional fourier transform conversion exponent number p in x, y direction is chosen1、p2, to the image array f after two dimension scramble1(s, T) two dimension fractional fourier transform, the image array after being converted are carried out
(4) x is chosen respectively0、y0、z0As the initial value of Clifford hyperchaotic system, and it is super mixed that this initial value is substituted into Clifford Ignorant system equation is iterated, obtains three chaos sequence { xi}、{yi}、{zi, i=0,1,2 ..., 9999+M;
(5) respectively by first chaos sequence { xiAnd second chaos sequence { yiFront 10000 numerical value remove, and to it Re-start numbering, obtain acting on the final chaos sequence in x directionWith the original chaotic sequence acting on y direction {y′i′, j1=0,1,2 ..., M-1, i '=0,1,2 ..., M-1;
(6) choose and act on the original chaotic sequence { y ' in y directioni′Top n element and rename, obtain acting on y side To final chaos sequencej2=0,1,2 ..., N-1;
(7) the final chaos sequence in x directionFinal chaos sequence with y directionCarry out by order from small to large Sequence, obtains two orderly new chaos sequencesWithAnd record the new chaos sequence in x direction respectivelyY direction New chaos sequenceIn each element final chaos sequence in x directionFinal chaos sequence with y direction In Position Number, obtain line shuffle address setWith row scramble address setWhereinRepresent the new chaos sequence in x directionIn r1+ 1 element is in x direction Whole chaos sequenceIn Position Number,Represent the new chaos sequence in y directionIn r2+ 1 element is in y direction Final chaos sequenceIn Position Number, r1=0,1,2 ..., M-1, r2=0,1,2 ..., N-1;
(8) image array after the conversion that will obtain in step (3)Row, column successively according to line shuffle address set Element in Q and row scramble address set P carries out scramble, and image array g after being encrypted (u, v).
2. according to the method described in claims 1, wherein this two-dimensional matrix is decomposed by step (1), by following step Suddenly carry out:
(1a) the three-dimensional matrice set omega after decomposition is determinednNumber n of middle element:
(1a1) total number S of element of image is calculated0=M × N, to S0Open cube and result is rounded, obtaining the first cube Line number value a of the three-dimensional matrice of body shape1, make n=1;
(1a2) the element number S of image after n-1 three-dimensional matrice before calculating is removedn-1Deduct image after the n-th three-dimensional matrice Element number an 3Value, obtain removing the element number S of image after the n-th three-dimensional matricen
(1a3) the element number S of image after the n-th three-dimensional matrice is removed in judgementnWhether > 100 sets up: if setting up, then to removal The element number S of image after n-th three-dimensional matricenOpen cube and result is rounded, making n=n+1, returning step (1a2);If It is false, then makes remaining element number a0For S nown, end loop;
(1b) by two-dimensional matrix f, (s t) resolves into the three-dimensional matrice set omega of n three-dimensional matrice compositionn={ A1,A2,...,An}:
(1b1) by two-dimensional matrix f, (s t) reconstructs one-dimension array B [M × N], according to order from left to right by the element of each column Being placed in one-dimension array, the element in each column is placed from the top down, obtains a dimension containing M × N number of element Group B [M × N];
(1b2) the n numerical value of basis carries out segmentation: if n=1, then need not carry out segmentation;If n >=2, then to one-dimension array B [M × N] In element carry out segmentation, this one-dimension array will intercept n fragment of Length discrepancy according to order from front to back, wherein n-th The number of the element contained in individual fragment is the element number that the n-th three-dimensional matrice contains
(1b3) element of the n-th fragment is placed in the n-th three-dimensional matrice of correspondence, will be in n-th sectionIndividual element according to Placing from the order of bottom-up layer, element is placed into each column by every layer from left to right, and the element in each column is from the top down Arranging, obtaining a size is an×an×anThree-dimensional matrice An
(1b4) n fragment is carried out above-mentioned (1b3) operation, obtains three-dimensional matrice set omegan={ A1,A2,...,An}。
3. according to the method described in claims 1, the wherein conversion of the three-dimensional cat face in step (2), carried out by following formula:
x ′ y ′ z ′ = A x y z mod ( N ) ,
WhereinIt is referred to as conversion Matrix, ax、ay、azIt is respectively two dimension cat face transformation matrix a expansion parameter in the x, y, z-directions, bx、by、bzFor two dimension cat face Transformation matrix b expansion parameter in the x, y, z-directions;X, y, z is respectively the abscissa before conversion, vertical coordinate, ordinate;x′、 Y ', z ' are the abscissa after three-dimensional cat face change action, vertical coordinate, ordinate;Mod represents modular arithmetic.
4. according to the method described in claims 1, wherein by the three-dimensional matrice set omega ' after scramble in step (1)n= {A′1,A′2,...,A′nReconstruct two dimension scramble after image array f1(s, t), is carried out as follows:
(2a) by the n-th three-dimensional matrice AnIn h1The h of page2Row h3The element of row is placed on one-dimension array Bn?Individual position, obtains one-dimension array Bn
(2b) n three-dimensional matrice is carried out above-mentioned (2a) operation, obtains n one-dimension arrayh1=1,2,3 ..., an, h2 =1,2,3 ..., an, h3=1,2,3 ..., an
(2c) by n one-dimension arrayIt is emitted on successively in new one-dimension array B ' [M × N] according to the size of array;If a0 ≠ 0, then will decompose two-dimensional matrix f (s, remaining a time t)0Individual element comes backmost, and obtain containing M × N number of element is new One-dimension array B ' [M × N];
(2d) by the M × N number of element in new one-dimension array B ' [M × N] according to from left to right be subsequently placed at two dimension scramble After image array f1(s, t) in each column, the element in each column places from the top down, obtains the image after two dimension scramble Matrix f1(s,t)。
5., according to the method described in claims 1, wherein the initial value of Clifford hyperchaotic system is substituted into by step (4) Clifford hyperchaotic system equation is iterated, obtains three chaos sequence { xi}、{yi}、{zi, obtain as follows :
4a) input initial value x0、y0、z0, make k=0;
4b) calculate first chaos sequence { xi+ 1 element x of kthk+1, xk+1=sin (ayk)-zkcos(bxk), wherein a= 2.24, b=0.43;
4c) calculate second chaos sequence { yi+ 1 element y of kthk+1, yk+1=zksin(cxk)-cos(dyk) wherein c=- 0.65, d=-2.43;
4d) calculate the 3rd chaos sequence { zi+ 1 element { z of kthi, zk+1=ecos (bxk), wherein e=1.0;
4e) numerical value of k is increased by 1, it is judged that the magnitude relationship of k Yu 9999+M, if k≤9999+M, return 4b);Otherwise, jump out Circulation, terminates calculating, obtains three chaos sequence { xi}、{yi}、{zi, wherein i=0,1,2 ..., 9999+M.
6. according to the method described in claims 1, wherein by the image array after conversion in step (8)'s Row, column carries out scramble according to the element in line shuffle address set Q and row scramble address set P successively, is first by image arrayR1+ 1 line replacement is toOK, then by image arrayR2+ 1 column permutation is toRow, r1=0,1,2 ..., M-1, r2=0,1,2 ..., N-1.
CN201610217483.XA 2016-04-08 2016-04-08 Score field image encryption method based on three-dimensional cat face transformation and hyperchaotic system Active CN105913369B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610217483.XA CN105913369B (en) 2016-04-08 2016-04-08 Score field image encryption method based on three-dimensional cat face transformation and hyperchaotic system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610217483.XA CN105913369B (en) 2016-04-08 2016-04-08 Score field image encryption method based on three-dimensional cat face transformation and hyperchaotic system

Publications (2)

Publication Number Publication Date
CN105913369A true CN105913369A (en) 2016-08-31
CN105913369B CN105913369B (en) 2018-11-30

Family

ID=56745610

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610217483.XA Active CN105913369B (en) 2016-04-08 2016-04-08 Score field image encryption method based on three-dimensional cat face transformation and hyperchaotic system

Country Status (1)

Country Link
CN (1) CN105913369B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106709854A (en) * 2016-12-20 2017-05-24 西安电子科技大学 Cat mapping and chaos based image information fusion and encryption method
CN109086617A (en) * 2018-08-14 2018-12-25 长春理工大学 One-time pad optical image encryption decryption method based on fractional order quantum chaos
CN110519037A (en) * 2019-07-23 2019-11-29 江苏理工学院 The image encryption method of ultra-chaos pseudo random sequence
CN111314046A (en) * 2020-01-19 2020-06-19 内江师范学院 Image encryption and decryption method based on Arnold transformation and fractional order chaotic sequence

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6064738A (en) * 1996-12-10 2000-05-16 The Research Foundation Of State University Of New York Method for encrypting and decrypting data using chaotic maps
CN103489151A (en) * 2013-09-11 2014-01-01 河南大学 Color image encryption method based on chaos sequence and hyper-chaos system
CN105447396A (en) * 2015-12-15 2016-03-30 西安电子科技大学 Fractional domain image encryption method based on Arnold transformation and compound chaos

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6064738A (en) * 1996-12-10 2000-05-16 The Research Foundation Of State University Of New York Method for encrypting and decrypting data using chaotic maps
CN103489151A (en) * 2013-09-11 2014-01-01 河南大学 Color image encryption method based on chaos sequence and hyper-chaos system
CN105447396A (en) * 2015-12-15 2016-03-30 西安电子科技大学 Fractional domain image encryption method based on Arnold transformation and compound chaos

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
HONGJUAN LIU等: "A Novel Image Encryption Algorithm Based on Improved 3D Chaotic Cat Map", 《THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS》 *
杜翠霞等: "一种新的三维Arnold变换和混沌序列相结合的图像加密算法", 《数据通信》 *
杨雪松等: "基于复合超混沌系统且与明文相关联的图像加密", 《计算机应用研究》 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106709854A (en) * 2016-12-20 2017-05-24 西安电子科技大学 Cat mapping and chaos based image information fusion and encryption method
CN106709854B (en) * 2016-12-20 2020-02-21 西安电子科技大学 Image information fusion encryption method based on cat face transformation and chaos
CN109086617A (en) * 2018-08-14 2018-12-25 长春理工大学 One-time pad optical image encryption decryption method based on fractional order quantum chaos
CN110519037A (en) * 2019-07-23 2019-11-29 江苏理工学院 The image encryption method of ultra-chaos pseudo random sequence
CN110519037B (en) * 2019-07-23 2023-04-07 江苏理工学院 Image encryption method of hyperchaotic pseudorandom sequence
CN111314046A (en) * 2020-01-19 2020-06-19 内江师范学院 Image encryption and decryption method based on Arnold transformation and fractional order chaotic sequence

Also Published As

Publication number Publication date
CN105913369B (en) 2018-11-30

Similar Documents

Publication Publication Date Title
Lai et al. A novel pixel-split image encryption scheme based on 2D Salomon map
Lin et al. An image encryption scheme based on Lorenz hyperchaotic system and RSA algorithm
CN106339976B (en) A kind of encryption method
Kumar et al. An efficient chaos based image encryption algorithm using enhanced thorp shuffle and chaotic convolution function
CN105447396A (en) Fractional domain image encryption method based on Arnold transformation and compound chaos
Hikal et al. A new approach for palmprint image encryption based on hybrid chaotic maps
CN108898025A (en) New chaotic image encryption method based on dual scramble and DNA encoding
CN103258312B (en) There is the digital image encryption method of fast key stream generting machanism
CN105913369A (en) Three dimensional cat face transformation and hyper-chaotic system-based fractional domain image encryption method
CN107274457A (en) Double color image encrypting methods based on DNA sequence dna computing and Coupling Deformation image grid
Zhang et al. RGB color image encryption method based on Lorenz chaotic system and DNA computation
CN114389788B (en) Image encryption algorithm with mixed chaos and block scrambling
CN114679250B (en) Image encryption algorithm based on mixed chaos and Arnold transformation
CN114157772B (en) Digital image encryption method based on space-time chaotic system and half tensor product compressed sensing
CN106709854A (en) Cat mapping and chaos based image information fusion and encryption method
Zhang et al. Image encryption algorithm based on bit-plane scrambling and multiple chaotic systems combination
Liu et al. A color image encryption scheme based on a novel 3d chaotic mapping
Fang et al. A secure chaotic block image encryption algorithm using generative adversarial networks and DNA sequence coding
Liu et al. Globally coupled private image encryption algorithm based on infinite interval spatiotemporal chaotic system
CN104050617A (en) Method for image encryption based on Liu chaotic system
CN106067182A (en) Based on double random phase and the linear domain of holomorphy image encryption method of composite chaotic
Liu et al. A novel image encryption algorithm based on plaintext-related hybrid modulation map
CN110472424A (en) The method of more image encryptions, certification based on intensity transmission equation and photon counting
CN104143174A (en) Image disguising and reconstructing method based on Tangram algorithm and two-dimensional double-scale rectangular mapping
CN105827632B (en) Cloud computing CCS fine-grained data control method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant