CN106127669B - Based on the New chaotic image encryption method for protecting area B aker mapping - Google Patents

Based on the New chaotic image encryption method for protecting area B aker mapping Download PDF

Info

Publication number
CN106127669B
CN106127669B CN201610508547.1A CN201610508547A CN106127669B CN 106127669 B CN106127669 B CN 106127669B CN 201610508547 A CN201610508547 A CN 201610508547A CN 106127669 B CN106127669 B CN 106127669B
Authority
CN
China
Prior art keywords
sequence
image
pixel
mapping
segmentation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201610508547.1A
Other languages
Chinese (zh)
Other versions
CN106127669A (en
Inventor
谢国波
杨彬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong University of Technology
Original Assignee
Guangdong University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong University of Technology filed Critical Guangdong University of Technology
Priority to CN201610508547.1A priority Critical patent/CN106127669B/en
Publication of CN106127669A publication Critical patent/CN106127669A/en
Application granted granted Critical
Publication of CN106127669B publication Critical patent/CN106127669B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
  • Facsimile Transmission Control (AREA)

Abstract

The present invention relates to a kind of image encryption methods, in particular to a kind of New chaotic image encryption method based on guarantor's area B aker mapping, this method process is simple, can not only enhance Space-time Complexity, Computer Precision restricted problem is solved, and is capable of increasing the complexity of Encryption Algorithm.Simultaneously because chaos system uses the quantumchaoticsystem more complicated than common chaos in text, in quantumchaoticsystem, the addition of disturbance quantity is so that chaos system aperiodicity is more preferable, sequence randomness is stronger, at the same common chaos system have " fixed point " and " stability window " the problem of be also improved and solve.

Description

Based on the New chaotic image encryption method for protecting area B aker mapping
Technical field
It is the present invention relates to a kind of image encryption method, in particular to a kind of based on the chaos image for protecting area B aker mapping Encryption method.
Background technique
Conventional encryption methods (such as DES, RSA etc.) are all used in the lesser environment of data volume, although can effective protection it is more Media copy enhances Information Security.But multi-medium data (including video, audio, image etc.) correlation is strong, and data volume is big. Using conventional encryption methods, a large amount of overheads are needed in most occasions.Therefore, any behaviour for being likely to increase algorithm complexity Make, will all drag down the efficiency of entire encryption system, influence practical function.
Chaos system is very sensitive to initial value, and slight variation occurs for original state, the generated chaos after iteration Sequence is made a world of difference.And chaos sequence also has good randomness, and this two dot characteristics and cryptographic key uncertainty require contract It closes.The mixed characteristic of chaotic orbit also matches with diffusivity in encryption system.Association on theoretical characteristics allows the two to be combined into For certainty.Theoretically, chaos system generates random number series and is infinitely, does not recycle, the sequence of no periodic;And in fact, meter Calculation machine is limited by computational accuracy, each operation all can lost part data, generate certain error.At this stage, it has been proposed that below The new New chaotic image encryption method of three classes: 1, it is based on complicated chaotic systems image encryption method.Such as: being carried out first based on hyperchaotic system Spread encryption method etc. twice afterwards.2, image encryption method is carried out in the transform domain as illustrated.Such as: DC coefficient being diffused in conjunction with DCT And scrambling encryption method, the satellite chaos encrypting method based on WT, based on FrWT New chaotic image encryption method etc..3, it is based on quantum Chaos system image encryption method.Such as: image being encrypted using the physical process of quantum chaos, with quantum chaotic sea Equation is to image encryption.
Summary of the invention
The purpose of the present invention is to overcome the shortcomings of the existing technology and deficiency, provides a kind of based on guarantor's area B aker mapping New chaotic image encryption method.This method process is simple, can not only enhance Space-time Complexity, solves Computer Precision limitation and asks Topic, and it is capable of increasing the complexity of Encryption Algorithm.Simultaneously because chaos system is using more complicated than common chaos in text Quantumchaoticsystem, in quantumchaoticsystem, the addition of disturbance quantity is so that chaos system aperiodicity is more preferable, and sequence randomness is more By force, while commonly the problem of chaos system has " fixed point " and " stability window ", is also improved and solves.
A kind of New chaotic image encryption method based on guarantor's area B aker mapping, comprising the following steps:
(1) input size be N × M pixel original image, define here each pixel length and it is wide be 1.
(2) segmented image: image is divided into k in the horizontal direction, and (k is positive integer that can be evenly divisible by N, can arbitrarily be defined full The number required enough) small rectangular block, each rectangular block has N × niA pixel, the width of each rectangular block is m after segmentation.It will segmentation Small rectangular block afterwards continues on vertical direction and is divided into niA sub-block.It include N × n in each large rectangular blockiA pixel, point The length for cutting rear sub-block is n.Therefore it is divided into n againiAfter a small rectangle, each small rectangle just has N number of pixel, after segmentation Sub-block size is n × m.
(3) in the rectangular block of n × m size after each segmentation, according to sequence is successively read from top to bottom from left to right, Obtain the position sequence of following pixel:
It recycles and protects area B aker mapping successively to the progress operation of its pixel.Successively to each rectangular block after segmentation Baker mapping operations are carried out according to the method described above.Complete a Baker mapping scramble operation.For meet practical application need by Whole image repeatedly carries out scramble, number is defined as S here, and (its size, which can according to need, to be set using S as one of key It is fixed, it is contemplated that number will affect performance too much, and scramble number takes between 50~200 times in actual use).It is protected used in it Area B aker mapping is as follows:
To use Baker mapping in this method, need to being mapped into some transformation of row, x ∈ (0,1) in original mapping, To adapt to this method, need to be expanded.Obtain following guarantor's area B aker mapping.
(4) each pixel of image after scramble is read in the form of one-dimension array C, by pixel binary form The element being expressed as in one-dimension array C.
(5) by external key xo,y0,z0,r0, β is iterated as the initial value of quantum Logistic chaos system, gives up Abandon the first k times value for starting iteration (k value here uses the k in (1) step for convenience's sake).Iteration N × M times again, and By the x of each iteration, the value of y, z are stored in EX respectively, and in tri- sequences of EY, EZ, wherein EX indicates the chaos sequence on the direction x Column, EY indicate that the chaos sequence on the direction y, EZ indicate the chaos sequence on the direction z.Quantum Logistic chaos system is as follows:
R is adjustable parameter in formula, and β is Dissipation Parameters, xn、yn、znIt is the state value of system,It is x respectivelynAnd zn Complex conjugate.System parameter value range r ∈ (3.74,4.00), β >=3.5, state value x ∈ (0,1), y ∈ (0,0.2461), z The value of ∈ (0,0.2461) these parameters can be arbitrarily selected under the premise of meeting conditions above.
(6) then EX, these three sequences of EY, EZ are into such as down conversion:
Transformation obtains FX, FY, FZ sequence.The purpose of transformation is that the small Number Sequence that will be obtained is converted into integer sequence, in order to Facilitate subsequent calculating, there is also the need to the sequence of decimal form is converted into binary form.
(7) by FXiExclusive or FYi, then by result exclusive or FZ againiObtain ciphering sequence P.
(8) following formula operation then is carried out to image sequence C after scramble:
Ciphering sequence C can be obtained1
(9) encrypted sequence is reverted to image, completes whole image ciphering process.
Encryption research is carried out to image using a kind of composite chaotic Encryption Algorithm herein.First mapped using guarantor area B akert Multiple piecemeal scramble is carried out to image, exclusive or encryption fortune is carried out to image after scramble in conjunction with quantum Logistic chaos system It calculates, uses this new resume image for the first time.Quantum Logistic chaos system physical structure used herein is opposite Simply, but in quantumchaoticsystem the presence of disturbance quantity makes mission nonlinear kinetic characteristics complexity, while also solving Computer Precision loses problem, increases the difficulty of decoding.And the algorithm for encryption works well, and sensibility is strong.Therefore, the party Safety of image can be effectively protected in method.
Detailed description of the invention
Fig. 1 is entire ciphering process flow chart;
Fig. 2 is original image before encrypting;
Fig. 3 is image after whole scramble;
Fig. 4 is the image completed after ciphering process.
Specific embodiment
Present invention will now be described in further detail with reference to the embodiments and the accompanying drawings, but embodiments of the present invention are unlimited In this.
Embodiment
Such as Fig. 1, the detailed process of image encryption is carried out such as based on the New chaotic image encryption method for protecting area B aker mapping Under:
(1) choosing the image that as above size shown in Fig. 2 is 256 × 256 is experimental subjects.
(2) segmented image: setting k value chooses k=32 here.In the horizontal direction picture segmentation at 32 rectangular blocks.Often A rectangular block has 256 × 8 pixels.Image is divided into along the vertical direction again 8 rectangular blocks, then each small rectangle by 256 pixel compositions, the size of each rectangular block are 32 × 8.
(3) in the rectangular block of 32 × 8 sizes after each segmentation, according to sequence is successively read from top to bottom from left to right The position (coordinate of i.e. first pixel be (0,0), and so on) of each pixel obtains following sequence:
Operation successively is carried out to it using area B aker mapping is protected to each coordinate, obtains the new position of the coordinate. And rearrange pixel according to each new position, complete the ciphering process of the small rectangular block.Again to all segmentations after Small rectangular block in each pixel carry out above-mentioned same operation, complete the wheel scramble operation.To reach better encryption Effect need to carry out multiple scramble to whole image, and secondary numerical value S value is 83 here, 83 circulations be carried out to scrambling encryption, to figure As carrying out multiple scramble.After completing entire scrambling process, image is as shown in Figure 3.
(4) the image after scramble in the form of one-dimension array C from top to bottom, sequence from left to right is read, obtain as Under one-dimension array C=00101101,0101110,10111010,11011011 ..., C256×256}。
(5) generate ciphering sequence: ciphering sequence is obtained by quantum Logistic chaotic maps iteration, in this example use with Lower parameter: x0=0.85845654, y0=0.03624551548, z0=0.02548634197 r0=3.821, β0=4.231 make For the initial value iteration of quantum Logistic chaos system.Primary iteration value is substituted into quantum Logistic chaotic maps equation In, give up preceding 16 values, then iteration 256*256 times again, the iterative value of x is taken to obtain chaos sequence EX= {0.8319321839,0.8081942841,0.7391382913…,EX256×256, take the iterative value of y to obtain chaos sequence EY ={ 0.0321817542,0.0301387401,0.0279164138 ..., EY256×256, take the iterative value of z to obtain chaos sequence EZ={ 0.0235964183,0.0211387403,0.0207916438 ..., Y256×256}。
(6) then EX, these three sequences of EY, EZ are into such as down conversion:
Transformation obtains sequence:
FX={ 839,841,913 ..., FX256×256,
FY={ 542,401,138 ..., FY256×256,
FZ={ 183,403,438 ..., FZ256×256};
Decimal sequence is converted to binary sequence, because of 8 images that image is, be converted into here two into During system, in sequence conversion, binary first 8 are only taken to encrypt.It obtains:
FX={ 11010001,11010010,11100100 ..., FX256×256,
FY={ 10000111,11001000,10001010 ..., FY256×256,
FZ={ 10110111,11001001,11011011 ..., FZ256×256}
(7) FX is usediExclusive or FYiExclusive or FZ againiObtain sequence:
P={ 11100001,11010011,10110101..., P256×256}。
(8) image sequence C after scramble is carried outOperation, (by There is no preceding paragraph in first element, therefore first element does not do the XOR operation in above formula.) encrypted according to the above operation Sequence C1=00001110,00101100,10000001 ... .C256×256}。
(9) encrypted sequence is reverted to image again, as shown in figure 4 above, completes this image encryption process.
The above embodiment is a preferred embodiment of the present invention, but embodiments of the present invention are not by above-described embodiment Limitation, other any changes, modifications, substitutions, combinations, simplifications made without departing from the spirit and principles of the present invention, It should be equivalent substitute mode, be included within the scope of the present invention.

Claims (3)

1. a kind of based on the New chaotic image encryption method for protecting area B aker mapping, comprising the following steps:
(1) input size is the original image of N × M pixel;
(2) segmented image, the sub-block size after segmentation are n × m;
(3) it in the rectangular block of n × m size after each segmentation, according to sequence is successively read from top to bottom from left to right, obtains The position sequence of following pixel:
It recycles and protects area B aker mapping successively to the progress operation of its pixel, successively each rectangular block after segmentation is carried out Baker mapping operations complete a Baker mapping scramble operation, protect area B aker mapping are as follows:
(4) each pixel of image after scramble is read in the form of one-dimension array C, pixel is indicated with binary form At the element in one-dimension array C;
(5) by external key x0,y0,z0,r0, β is iterated as the initial value of quantum Logistic chaos system, gives up beginning First k times value of iteration, then iteration N × M times, and by the x of each iteration, the value of y, z are stored in EX, tri- sequences of EY, EZ respectively In column, wherein EX indicates that the chaos sequence on the direction x, EY indicate that the chaos sequence on the direction y, EZ indicate the chaos on the direction z Sequence, quantum Logistic chaos system are as follows:
Z is adjustable parameter in formula, and β is Dissipation Parameters, xn、yn、znIt is the state value of system,It is x respectivelynAnd znAnswer Conjugation, system parameter value range r ∈ (3.74,4.00), β >=3.5, state value x ∈ (0,1), y ∈ (0,0.2461), z ∈ The value of (0,0.2461) these parameters can be arbitrarily selected under the premise of meeting conditions above;
(6) then EX, these three sequences of EY, EZ are into such as down conversion:
(7) transformation obtains FX, and FY, FZ sequence, the purpose of transformation is that the small Number Sequence that will be obtained is converted into integer sequence, for side Just subsequent calculating, there is also the need to the sequence of decimal form is converted into binary form;
(8) by FXiExclusive or FYi, then by result exclusive or FZ againiObtain ciphering sequence P;
(9) following formula operation then is carried out to image sequence C after scramble:
Ciphering sequence C can be obtained1
(10) encrypted sequence is reverted to image, completes whole image ciphering process.
2. New chaotic image encryption method according to claim 1, it is characterised in that: the length of each pixel and it is wide be 1.
3. New chaotic image encryption method according to claim 1, it is characterised in that: image is divided into k in the horizontal direction Small rectangular block, k are positive integers that can be evenly divisible by N, can arbitrarily define the number met the requirements, each rectangular block has N × niA pixel, The width of each rectangular block is m after segmentation, and the small rectangular block after segmentation is continued on vertical direction and is divided into niA sub-block, In It include N × n in each large rectangular blockiA pixel, the length of sub-block is n after segmentation, therefore is divided into n againiA small rectangle Afterwards, each small rectangle just has N number of pixel, and the sub-block size after segmentation is n × m.
CN201610508547.1A 2016-06-29 2016-06-29 Based on the New chaotic image encryption method for protecting area B aker mapping Expired - Fee Related CN106127669B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610508547.1A CN106127669B (en) 2016-06-29 2016-06-29 Based on the New chaotic image encryption method for protecting area B aker mapping

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610508547.1A CN106127669B (en) 2016-06-29 2016-06-29 Based on the New chaotic image encryption method for protecting area B aker mapping

Publications (2)

Publication Number Publication Date
CN106127669A CN106127669A (en) 2016-11-16
CN106127669B true CN106127669B (en) 2019-10-29

Family

ID=57468577

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610508547.1A Expired - Fee Related CN106127669B (en) 2016-06-29 2016-06-29 Based on the New chaotic image encryption method for protecting area B aker mapping

Country Status (1)

Country Link
CN (1) CN106127669B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106683041B (en) * 2016-12-12 2023-03-07 长春理工大学 Quantum image miscut method based on NEQR expression
CN111444522B (en) * 2020-03-19 2024-02-27 南昌大学 Random blocking chaotic image encryption method
CN114157774B (en) * 2021-11-23 2023-03-21 西南大学 Image encryption method based on quantum Baker mapping and sine chaotization model
CN114221756A (en) * 2021-11-23 2022-03-22 西南大学 Synchronous image encryption and fusion method based on quantum Baker mapping

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070189518A1 (en) * 2005-03-30 2007-08-16 Nanni Richard A 3-D quaternion quantum fractal encryption
CN102123026A (en) * 2011-04-12 2011-07-13 南开大学 Chaos and hyperchaos based two-level video streaming media encryption method
CN102360488B (en) * 2011-09-29 2013-02-13 付冲 Digital image encryption method based on chaotic orbit perturbation
CN103916234B (en) * 2014-04-11 2016-09-07 中国人民解放军沈阳军区总医院 A kind of chaos medical image encryption method being applied to secret protection
CN105631796B (en) * 2015-12-17 2019-04-16 广东工业大学 Quantum chaos image encryption method based on bit scramble

Also Published As

Publication number Publication date
CN106127669A (en) 2016-11-16

Similar Documents

Publication Publication Date Title
Man et al. Double image encryption algorithm based on neural network and chaos
Xian et al. Double parameters fractal sorting matrix and its application in image encryption
Zhan et al. Cross-utilizing hyperchaotic and DNA sequences for image encryption
Li et al. Asymmetric multiple-image encryption based on the cascaded fractional Fourier transform
CN106127669B (en) Based on the New chaotic image encryption method for protecting area B aker mapping
CN103248854B (en) Based on the medical image encryption method of even scramble and chaotic maps
CN106709854B (en) Image information fusion encryption method based on cat face transformation and chaos
CN108199828B (en) Method and device for encrypting color picture
CN101604439A (en) A kind of color image encrypting method based on multi-chaos system
CN106651976B (en) A kind of image encryption method based on cluster and chaos
Murugan et al. A hybrid image encryption algorithm using chaos and Conway's game‐of‐life cellular automata
CN110225222B (en) Image encryption method based on 3D orthogonal Latin square and chaotic system
Sinha et al. Chaotic image encryption scheme based on modified arnold cat map and henon map
Sun et al. An image encryption algorithm utilizing Mandelbrot set
Ali et al. 3D Content Encryption Using Multi-Level Chaotic Maps
CN106530362A (en) Calculating integral imaging technology and Fourier transform optical image encryption method
CN110473214A (en) Image scrambling and restoration methods based on Ramanujan matrix
Zhuang et al. A new digital image encryption algorithm based on improved logistic mapping and Josephus circle
Jiang et al. Compressive-sensing-based double-image encryption algorithm combining double random phase encoding with Josephus traversing operation
Agarwal Cryptographic key generation using burning ship fractal
Hu et al. Research on encrypted face recognition algorithm based on new combined chaotic map and neural network
Li et al. A Novel Scheme for the Preview of the Image Encryption Based on Chaotic Ikeda Map.
Yassir et al. Hybrid Image Encryption Technique for Securing Color Images Transmitted Over Cloud Networks.
Paul et al. RGB image encryption by using discrete log with and Lorenz's chaotic function
Ali et al. Multi-level encryption for 3D mesh model based on 3D Lorenz chaotic map and random number generator.

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20191029

Termination date: 20200629

CF01 Termination of patent right due to non-payment of annual fee