CN106570814B - Hyperchaotic image encryption method - Google Patents

Hyperchaotic image encryption method Download PDF

Info

Publication number
CN106570814B
CN106570814B CN201610908104.1A CN201610908104A CN106570814B CN 106570814 B CN106570814 B CN 106570814B CN 201610908104 A CN201610908104 A CN 201610908104A CN 106570814 B CN106570814 B CN 106570814B
Authority
CN
China
Prior art keywords
key
column vector
ciphertext
hyperchaotic
multiplied
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610908104.1A
Other languages
Chinese (zh)
Other versions
CN106570814A (en
Inventor
谢国波
姜先值
王朝阳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong University of Technology
Original Assignee
Guangdong University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong University of Technology filed Critical Guangdong University of Technology
Priority to CN201610908104.1A priority Critical patent/CN106570814B/en
Publication of CN106570814A publication Critical patent/CN106570814A/en
Application granted granted Critical
Publication of CN106570814B publication Critical patent/CN106570814B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking

Abstract

The invention provides a hyperchaotic image encryption method which is mainly applied to the field of gray level image encryption. The algorithm mainly comprises the following contents: firstly, a plaintext image with the size of N multiplied by M is divided into M column vector groups, pixels in the obtained vector groups are subjected to bit conversion to obtain 8 multiplied by M vector groups, and then scrambling operation is carried out. And then remapping the obtained scrambled pixel values to the positions between [0, 255] to obtain an intermediate ciphertext. And finally, performing diffusion operation on the chaotic sequence generated by the Hyperhenon chaotic system and the intermediate ciphertext to obtain a final ciphertext. Experimental simulation shows that the algorithm can not only improve the defects of a low-dimensional chaotic system and resist statistical characteristic attack and differential attack, but also effectively resist four kinds of classical attack, well hide plaintext information and achieve a good encryption effect.

Description

Hyperchaotic image encryption method
Technical Field
The invention belongs to a gray level image encryption method, and particularly relates to a hyperchaotic image encryption method.
Background
With the rapid development of computer networks, the number of pictures transmitted in the networks is increasing, which brings about the attention of people to the safe transmission of pictures, and nowadays, scholars at home and abroad give high attention to how to encrypt pictures during image transmission.
Due to the characteristics of strong correlation of pixels of the image, high redundancy, large data volume and the like, the traditional text encryption method is difficult to be applied to image encryption. In recent years, experts point out that chaotic systems have the characteristics of high sensitivity to initial conditions, positive Lyapunov indexes, fractal and the like, can be applied to image encryption, and gradually provide some chaotic image encryption methods: such as one-time pad, bit encryption, mathematical model encryption and DNA sequence encryption
However, the above-identified methods have significant disadvantages:
such as the one-time pad key, presents great difficulties in delivery and distribution; the bit encryption method needs to convert all pixel values into binary system for image encryption during encryption, so that the encryption efficiency is low and time is consumed; the mathematical model encryption method is not beneficial to the realization of the encryption algorithm due to the comparison of factors which need to be considered; the pixel correlation coefficient in the DNA sequence encryption method is high and easy to be decrypted by an attacker.
Disclosure of Invention
Aiming at the defects of the encryption method, the invention provides a hyperchaotic image encryption method. The invention directly encrypts and generates the key according to the pixel value of the plaintext, can well solve the problems of image encryption efficiency and key transmission, and introduces the Hyperhenon hyper-chaotic system for encryption, thereby not only simplifying the realization of an encryption system, but also reducing the correlation of the pixel of the ciphertext image. Besides, the invention can effectively resist four classic attack methods and achieve good encryption effect.
The hyperchaotic image encryption method is characterized by comprising a key initialization process and a key encryption device
A chaotic transformation process and a Hyperhenon hyper-chaotic mapping diffusion process.
(1) Key initialization procedure
The encryption key K is mainly composed of a binary auxiliary key K with the length of 400 bits1Inputting a secret key X0,Y0The three parts are as follows.
Step 1: firstly, a binary auxiliary secret K with the length of 400 bits is used1Is divided into ten binary units of 40 bits in length, each of which is K10,K11,...,K19
Step 2: will input the key X0,Y0As an initial key of the Hyperhenon map, as shown in formula (1), where c is made 1.76, d is made 0.1, and X0,Y0And taking values between (0,1) to generate a group of hyperchaotic sequences for diffusion operation.
Figure GDA0002525452410000011
k=0,1,2,... (1)
(2) Scrambling transformation process
Step 1: first, an N × M plaintext image is divided into M column vector groups, and pixels of each vector group are represented by 8-bit binary, so that 8 × M column vector groups can be obtained.
Step 2: according to the auxiliary key matrix K10,K11,...,K19Two control parameters v and w in the cat map are calculated as shown in equation (2):
Figure GDA0002525452410000021
Figure GDA0002525452410000022
and step 3: combining v and w obtained in step 2, and substituting each column vector subscript as an input variable into an Arnold mapping, and obtaining s and t as shown in formula (3), wherein r is 0,1, 2. s is 0,1, 2.., 8 × M represents a new position scalar after the column vector is subjected to Arnold transformation; t is expressed as the number of bits of the column vector bit group that are rotationally shifted up.
Figure GDA0002525452410000023
And 4, step 4: and moving the column vector group represented by r into the column vector group represented by s according to the s obtained in the step 3. And circularly moving each element of the column vector group moved to the s position upwards by t according to the t obtained in the step 3.
And 5: and (5) repeating the steps 3 and 4 for 8 times multiplied by M times to obtain an intermediate ciphertext B.
(3) Hyperhenon hyper-chaotic map diffusion process
Step 1: and changing the obtained binary intermediate ciphertext B into a decimal ciphertext P with the size of N multiplied by M.
Step 2: setting an initial value X0Is x1,Y0Is y1Substituting the chaos sequence into a Hyperhenon hyperchaotic mapping system, discarding the previous 200 iteration results, and performing N × M iteration to obtain a chaos sequence L with the length of N × M ═ L1,l2,...,lN×MSubstituting the obtained chaotic sequence L into formula (4) to transform the element value range to [0, 255 }]Get a new chaotic sequence Q ═ { Q ═ Q1,q2,...,qN×M}。
qi=mod(li×105,256)1≤i≤N×M (4)
And step 3: performing formula (5) operation on each pixel of the intermediate ciphertext P, and enabling c0Is composed ofThe average value of the pixel values of the ciphertext P is increased, so that the correlation between the plaintext and the ciphertext is increased to achieve the pixel diffusion effect, and the final ciphertext C is obtained as { C {1,c2,...,cN×M}。
Figure GDA0002525452410000024
The invention has the beneficial effects that:
the invention increases the length and combination of the key by forming the encryption key by the auxiliary key with the length of 400 bits and the input key, and makes exhaustive attack impossible. Then, plaintext scrambling operation is performed by means of the auxiliary key information, and plaintext (ciphertext attack) can be effectively resisted. And carrying out XOR operation on the obtained intermediate ciphertext and a hyper-henon hyperchaotic mapping to generate a chaotic sequence, and improving the poor characteristics of periodic windows and the like in the low-dimensional chaotic transformation. The invention can effectively resist classical attacks, ensures the security of channel transmission and has wide application prospect in the field of digital multimedia information security.
Drawings
FIG. 1 is an encryption flow diagram of the present invention
FIG. 2 shows a key K1Composition diagram of
FIG. 3 is a block diagram of the intermediate ciphertext bit
FIG. 4(a) is a 256X 256 gray scale Lena diagram
FIG. 4(b) is the final encrypted image
FIG. 5(a) clear text grayscale histogram
FIG. 5(b) Gray histogram of ciphertext image
FIG. 6(a) is a plain text relationship diagram
FIG. 6(b) ciphertext relational graph
FIG. 7(a) K2Decryption graph
FIG. 7(b) K3Decryption graph
FIG. 7(c) K4Decryption graph
Detailed Description
The specific implementation steps are shown in the encryption flowchart of fig. 1.
To implement image encryption, the present invention first implements a key initialization process, as shown in fig. 2.
The encryption key K is mainly composed of a binary auxiliary key K with the length of 400 bits1Inputting a secret key X0,Y0The three parts are as follows.
Step 1: firstly, a binary auxiliary secret K with the length of 400 bits is used1Is divided into ten binary units of 40 bits in length, each of which is K10,K11,...,K19
Step 2: will input the key X0,Y0As an initial key of the Hyperhenon map, as shown in formula (1), where c is made 1.76, d is made 0.1, and X0,Y0And taking values between (0,1) to generate a group of hyperchaotic sequences for diffusion operation.
Figure GDA0002525452410000031
k=0,1,2,... (1)
After the key initialization process of fig. 2 is completed, the image encryption process of fig. 1 is performed, during which an intermediate bit cipher text matrix is also generated, as shown in fig. 3.
Step 1: first, an N × M plaintext image is divided into M column vector groups, and pixels of each vector group are represented by 8-bit binary, so that 8 × M column vector groups can be obtained.
Step 2: according to the auxiliary key matrix K10,K11,...,K19Two control parameters v and w in the cat map are calculated as shown in equation (2):
Figure GDA0002525452410000041
Figure GDA0002525452410000042
and step 3: combining v and w obtained in step 2, and substituting each column vector subscript as an input variable into an Arnold mapping, and obtaining s and t as shown in formula (3), wherein r is 0,1, 2. s is 0,1, 2.., 8 × M represents a new position scalar after the column vector is subjected to Arnold transformation; t is expressed as the number of bits of the column vector bit group that are rotationally shifted up.
Figure GDA0002525452410000043
And 4, step 4: and moving the column vector group represented by r into the column vector group represented by s according to the s obtained in the step 3. And circularly moving each element of the column vector group moved to the s position upwards by t according to the t obtained in the step 3.
And 5: and (5) repeating the steps 3 and 4 for 8 times multiplied by M times to obtain an intermediate ciphertext B.
Step 6: and changing the obtained binary intermediate ciphertext B into a decimal ciphertext P with the size of N multiplied by M.
And 7: setting an initial value X0Is x1,Y0Is y1Substituting the chaos sequence into a Hyperhenon hyperchaotic mapping system, discarding the previous 200 iteration results, and performing N × M iteration to obtain a chaos sequence L with the length of N × M ═ L1,l2,...,lN×MSubstituting the obtained chaotic sequence L into formula (4) to transform the element value range to [0, 255 }]Get a new chaotic sequence Q ═ { Q ═ Q1,q2,...,qN×M}。
qi=mod(li×105,256)1≤i≤N×M (4)
And 8: performing formula (5) operation on each pixel of the intermediate ciphertext P, and enabling c0Is the average value of the pixel values of the intermediate ciphertext P, so that the correlation between the plaintext and the ciphertext is increased to achieve the pixel diffusion effect, and the final ciphertext C is obtained1,c2,...,cN×M}。
Figure GDA0002525452410000044
Experimental simulations were performed using matlab 2014 on a gray scale Lena map of size 256 × 256, the plaintext image being shown in fig. 4(a), in whichThe system input keys are respectively: x0=0.314 852 2456,Y00.4258527320. The resulting encrypted image is shown in fig. 4 (b).
The image encryption method of the present invention is analyzed in terms of security as follows.
1. Histogram analysis
Fig. 5(a) and (b) are histogram diagrams of plaintext and ciphertext, respectively. As can be seen from the figure, the pixel value distribution of the image with the plaintext histogram distribution is quite uneven, and an attacker can obtain the image information according to the pixel distribution information. After the image is encrypted by the method, the histogram of the ciphertext image is distributed quite uniformly, the pixel value information is well hidden, and the encryption effect is achieved.
2. Statistical analysis
And randomly and respectively selecting two groups of adjacent pixel points in the horizontal direction, the vertical direction and the diagonal direction in the plaintext image and the ciphertext image to draw a pixel correlation diagram. Fig. 7(a) shows a plain text relationship diagram, fig. 7(b) shows a cipher text relationship diagram, and correlation coefficients between pixels are calculated according to equations (6) to (9).
Figure GDA0002525452410000051
Figure GDA0002525452410000052
Figure GDA0002525452410000053
Figure GDA0002525452410000054
Where x and y represent gray values of adjacent pixel groups of the image, E (.) -represents mathematical expectation, cov (.) -represents covariance, and γ representsxyRepresented as the relation coefficient of the neighboring pixels. The calculation results are shown in table 1, and a correlation coefficient closer to 1 indicates stronger correlation, and a smaller correlation indicates less correlation.
TABLE 1 neighboring Pixel correlation coefficient Table
Figure GDA0002525452410000055
3. Sensitivity analysis of initial values
The decryption key K of the invention is composed of K ═ K1,X0,Y0]In which the correct decryption key K is2=[K1,X0,Y0]In which K is1For a given 400-bit binary bit group, X0=0.314 852 2456,Y00.4258527320 when key X is input0,Y0The decryption keys K are respectively obtained by respectively changing slightly3,K4In which K is3In (C) X0Other values do not become a solution, K0.31485224574Middle Y0Other values do not change to another solution, 0.4258527321. As can be seen from fig. 6, provided that the decryption key occurs 10-10The small change of the data can not be decrypted successfully, and the method has extremely strong sensitivity to the initial value and can effectively resist differential attack.
4. Attack of classical type
The following four types are defined as classical attacks according to the Kerckhoff principle:
(1) ciphertext-only attack (Ciphertext only attack): the attacker has no other auxiliary information except the intercepted ciphertext.
(2) Known plaintext attack (knock plain attack): besides mastering the ciphertext, the attacker also masters the corresponding relation between partial plaintext and the ciphertext.
(3) Choose plaintext attack (Chosen plaintextattack): the attacker knows the encryption algorithm and can select the plaintext and obtain the ciphertext corresponding to the corresponding plaintext.
(4) Ciphertext attack (Chosen cipertext attack) was Chosen: the attacker knows the encryption algorithm and can select the ciphertext and obtain the corresponding plaintext.
Obviously, the plaintext attack is the most effective attack method, and the attack of the method can be effectively resisted by adding the encryption algorithm, and the attack of other methods can also be effectively resisted.
However, choosing a plaintext attack is not effective for the present invention, mainly for the following two reasons: firstly, the invention has extremely high sensitivity to the key, and the input key can not be decrypted normally as long as the input key has slight change; secondly, plaintext information is introduced when the diffusion operation is carried out, so that cracking through a two-dimensional matrix of all 0 is impossible. In conclusion, the invention can effectively resist the classical attack.
5. Clear text sensitivity analysis
Sensitivity to plaintext means that when the pixel values in an image change slightly, a distinct ciphertext image is obtained. Analysis is generally performed using two parameters, NPCR (pixel rate of change) and UACI (normalized average change in pixels).
Figure GDA0002525452410000061
Figure GDA0002525452410000062
And inputting the same key to obtain two identical ciphertexts. One of the ciphertext images is taken, and the pixel value 174 of (438,337) is changed to 173, which can be obtained from equations (10) and (11), where NPCR is 99.64% and UACI is 33.78%. The result shows that the method has strong sensitivity to the plaintext and can effectively resist differential attack.
6. Key space analysis
The input keys of the invention are all of double-precision floating point type, and the effective bits reach 16 bits, so the key space reaches 1032If the length of the key space is considered in the 400-bit binary bit group in the auxiliary key, the key space of the invention becomes larger, and it is almost impossible to obtain the plaintext image information through exhaustive attack. Therefore, the key space of the invention can effectively resist exhaustive attack, achieve the effect of safe transmission and ensure that the image information is not leaked.

Claims (1)

1. A hyperchaotic image encryption method sequentially comprises a key initialization process, a scrambling transformation process and a Hyperhenon hyperchaotic mapping diffusion process, and is characterized in that,
(1) key initialization procedure
The encryption key K is composed of a binary auxiliary key K with the length of 400 bits1Inputting a secret key X0,Y0The three parts are as follows;
step 1: firstly, a binary auxiliary secret K with the length of 400 bits is used1Cutting into ten binary units with the length of 40 bits to obtain an auxiliary key matrix K10,K11,...,K19
Step 2: will input the key X0,Y0As an initial key of the Hyperhenon map, the following formula (1) is shown, where c is 1.76, d is 0.1, and X0,Y0Taking values between (0,1), and generating a group of hyperchaotic sequences for diffusion operation;
Figure FDA0001132676410000011
(2) scrambling transformation process
Step 1: dividing the N multiplied by M plaintext image into M column vector groups, and expressing the pixels of each vector group by 8-bit binary to obtain 8 multiplied by M column vector groups;
step 2: according to the auxiliary key matrix K10,K11,...,K19Two control parameters v and w in the cat map are calculated as shown in equation (2) below:
Figure FDA0001132676410000012
and step 3: combining v and w obtained in step 2, and substituting each column vector subscript as an input variable into an Arnold mapping, as shown in the following formula (3), obtaining s and t, wherein r is 0,1, 2. s ═ 0,1, 2.., 8 × M denotes a new position scalar after the column vector is subjected to Arnold transform; t represents the number of bits rotationally shifted up the column vector bit group;
Figure FDA0001132676410000013
and 4, step 4: moving the column vector group represented by r into the column vector group represented by s according to the s obtained in the step 3, and circularly moving each element of the column vector group moved to the position of s upwards by t according to the t obtained in the step 3;
and 5: repeating the steps 3 and 4 for 8 times multiplied by M times to obtain an intermediate ciphertext B;
(3) hyperhenon hyper-chaotic map diffusion process
Step 1: changing the obtained binary intermediate cryptograph B into a decimal cryptograph P with the size of N multiplied by M;
step 2: setting an initial value X0Is x1,Y0Is y1Substituting the chaos sequence into a Hyperhenon hyperchaotic mapping system, discarding the previous 200 iteration results, and performing N × M iteration to obtain a chaos sequence L with the length of N × M ═ L1,l2,...,lN×MSubstituting the obtained chaotic sequence L into the following formula (4) to transform the element value range to [0, 255 }]Get a new chaotic sequence
Q={q1,q2,...,qN×M}
qi=mod(li×105,256) 1≤i≤N×M (4)
And step 3: the following equation (5) is applied to each pixel of the intermediate ciphertext P, let c0Is the average value of the pixel values of the intermediate ciphertext P, so that the correlation between the plaintext and the ciphertext is increased to achieve the pixel diffusion effect, and the final ciphertext C is obtained1,c2,...,cN×M}。
Figure FDA0001132676410000021
CN201610908104.1A 2016-10-17 2016-10-17 Hyperchaotic image encryption method Active CN106570814B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610908104.1A CN106570814B (en) 2016-10-17 2016-10-17 Hyperchaotic image encryption method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610908104.1A CN106570814B (en) 2016-10-17 2016-10-17 Hyperchaotic image encryption method

Publications (2)

Publication Number Publication Date
CN106570814A CN106570814A (en) 2017-04-19
CN106570814B true CN106570814B (en) 2020-09-29

Family

ID=58533101

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610908104.1A Active CN106570814B (en) 2016-10-17 2016-10-17 Hyperchaotic image encryption method

Country Status (1)

Country Link
CN (1) CN106570814B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107292802A (en) * 2017-05-10 2017-10-24 广东工业大学 A kind of parallel image encryption method of quantum chaos
CN112383523B (en) * 2020-11-02 2022-02-22 国网电子商务有限公司 Image encryption method, related device and storage medium
CN115499557B (en) * 2022-09-13 2023-07-21 洛阳师范学院 Arnold mapping and multi-shift mapping function-based delayed chaotic image encryption method
CN116582247B (en) * 2023-07-13 2023-09-26 深圳市柏英特电子科技有限公司 Intelligent encryption method and system for home security camera shooting data

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6094483A (en) * 1997-08-06 2000-07-25 Research Foundation Of State University Of New York Secure encryption and hiding of data and messages in images
CN103167213A (en) * 2013-02-07 2013-06-19 东北大学 Digital image encryption method based on Cat mapping and hyper-chaos Lorenz system
CN103440613A (en) * 2013-09-04 2013-12-11 上海理工大学 Color-image encryption method for hyperchaotic Rossler system
CN103489151A (en) * 2013-09-11 2014-01-01 河南大学 Color image encryption method based on chaos sequence and hyper-chaos system
CN104680475A (en) * 2015-02-27 2015-06-03 柳州职业技术学院 Image hybrid encrypting method based on hyperchaotic system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6094483A (en) * 1997-08-06 2000-07-25 Research Foundation Of State University Of New York Secure encryption and hiding of data and messages in images
CN103167213A (en) * 2013-02-07 2013-06-19 东北大学 Digital image encryption method based on Cat mapping and hyper-chaos Lorenz system
CN103440613A (en) * 2013-09-04 2013-12-11 上海理工大学 Color-image encryption method for hyperchaotic Rossler system
CN103489151A (en) * 2013-09-11 2014-01-01 河南大学 Color image encryption method based on chaos sequence and hyper-chaos system
CN104680475A (en) * 2015-02-27 2015-06-03 柳州职业技术学院 Image hybrid encrypting method based on hyperchaotic system

Also Published As

Publication number Publication date
CN106570814A (en) 2017-04-19

Similar Documents

Publication Publication Date Title
CN108898025B (en) Chaotic image encryption method based on double scrambling and DNA coding
Wang et al. Image encryption algorithm with random scrambling based on one-dimensional logistic self-embedding chaotic map
CN108322622B (en) Color digital image encryption method based on 2D-VMD and eight-dimensional hyper-chaotic system
Liu et al. Color image encryption using three-dimensional sine ICMIC modulation map and DNA sequence operations
CN107094072B (en) Mixed chaotic encryption method based on generalized Henon mapping
CN109660696B (en) New image encryption method
CN106570814B (en) Hyperchaotic image encryption method
CN107292184B (en) Image encryption method, device and key stream generating method and key stream generator
CN111597574B (en) Parallel image encryption system and method based on spatial diffusion structure
CN105046161A (en) DNA dynamic coding based colored image encryption method
CN110889877A (en) Image encryption method based on L-F cascade chaos and 3D bit scrambling
CN105956991B (en) Resume image based on dynamic DNA encoding and double chaotic maps
CN105447396A (en) Fractional domain image encryption method based on Arnold transformation and compound chaos
CN108566501B (en) Color image encryption method based on mixed domain and LSS type coupling mapping grid
CN110149200A (en) A kind of color image encrypting method based on dynamic DNA and 4D chaos
CN111934846A (en) Multi-chaos Arnold image encryption method based on fractional Fourier transform
CN109586895B (en) Novel color image encryption method
Wang et al. Image encryption algorithm based on bit-level permutation and dynamic overlap diffusion
CN111783116A (en) Lightweight hyperchaotic rapid image encryption algorithm
CN114389788B (en) Image encryption algorithm with mixed chaos and block scrambling
Ramli et al. Novel image encryption using a pseudoset generated by chaotic permutation multicircular shrinking with a gradual deletion of the input set
CN103310157B (en) Based on the image encryption method of RT-DNA cellular automaton
CN116886270B (en) Three-band encryption method based on national encryption algorithm and double-chaotic system
CN111683191B (en) Chaotic image encryption method capable of realizing rapid simultaneous scrambling and diffusion of rows and columns
CN111682932B (en) Single-round image encryption method based on mixed chaotic mapping

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant