CN106570814B - Hyperchaotic image encryption method - Google Patents
Hyperchaotic image encryption method Download PDFInfo
- Publication number
- CN106570814B CN106570814B CN201610908104.1A CN201610908104A CN106570814B CN 106570814 B CN106570814 B CN 106570814B CN 201610908104 A CN201610908104 A CN 201610908104A CN 106570814 B CN106570814 B CN 106570814B
- Authority
- CN
- China
- Prior art keywords
- key
- column vector
- ciphertext
- hyperchaotic
- multiplied
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06T—IMAGE DATA PROCESSING OR GENERATION, IN GENERAL
- G06T1/00—General purpose image data processing
- G06T1/0021—Image watermarking
Abstract
The invention provides a hyperchaotic image encryption method which is mainly applied to the field of gray level image encryption. The algorithm mainly comprises the following contents: firstly, a plaintext image with the size of N multiplied by M is divided into M column vector groups, pixels in the obtained vector groups are subjected to bit conversion to obtain 8 multiplied by M vector groups, and then scrambling operation is carried out. And then remapping the obtained scrambled pixel values to the positions between [0, 255] to obtain an intermediate ciphertext. And finally, performing diffusion operation on the chaotic sequence generated by the Hyperhenon chaotic system and the intermediate ciphertext to obtain a final ciphertext. Experimental simulation shows that the algorithm can not only improve the defects of a low-dimensional chaotic system and resist statistical characteristic attack and differential attack, but also effectively resist four kinds of classical attack, well hide plaintext information and achieve a good encryption effect.
Description
Technical Field
The invention belongs to a gray level image encryption method, and particularly relates to a hyperchaotic image encryption method.
Background
With the rapid development of computer networks, the number of pictures transmitted in the networks is increasing, which brings about the attention of people to the safe transmission of pictures, and nowadays, scholars at home and abroad give high attention to how to encrypt pictures during image transmission.
Due to the characteristics of strong correlation of pixels of the image, high redundancy, large data volume and the like, the traditional text encryption method is difficult to be applied to image encryption. In recent years, experts point out that chaotic systems have the characteristics of high sensitivity to initial conditions, positive Lyapunov indexes, fractal and the like, can be applied to image encryption, and gradually provide some chaotic image encryption methods: such as one-time pad, bit encryption, mathematical model encryption and DNA sequence encryption
However, the above-identified methods have significant disadvantages:
such as the one-time pad key, presents great difficulties in delivery and distribution; the bit encryption method needs to convert all pixel values into binary system for image encryption during encryption, so that the encryption efficiency is low and time is consumed; the mathematical model encryption method is not beneficial to the realization of the encryption algorithm due to the comparison of factors which need to be considered; the pixel correlation coefficient in the DNA sequence encryption method is high and easy to be decrypted by an attacker.
Disclosure of Invention
Aiming at the defects of the encryption method, the invention provides a hyperchaotic image encryption method. The invention directly encrypts and generates the key according to the pixel value of the plaintext, can well solve the problems of image encryption efficiency and key transmission, and introduces the Hyperhenon hyper-chaotic system for encryption, thereby not only simplifying the realization of an encryption system, but also reducing the correlation of the pixel of the ciphertext image. Besides, the invention can effectively resist four classic attack methods and achieve good encryption effect.
The hyperchaotic image encryption method is characterized by comprising a key initialization process and a key encryption device
A chaotic transformation process and a Hyperhenon hyper-chaotic mapping diffusion process.
(1) Key initialization procedure
The encryption key K is mainly composed of a binary auxiliary key K with the length of 400 bits1Inputting a secret key X0,Y0The three parts are as follows.
Step 1: firstly, a binary auxiliary secret K with the length of 400 bits is used1Is divided into ten binary units of 40 bits in length, each of which is K10,K11,...,K19。
Step 2: will input the key X0,Y0As an initial key of the Hyperhenon map, as shown in formula (1), where c is made 1.76, d is made 0.1, and X0,Y0And taking values between (0,1) to generate a group of hyperchaotic sequences for diffusion operation.
k=0,1,2,... (1)
(2) Scrambling transformation process
Step 1: first, an N × M plaintext image is divided into M column vector groups, and pixels of each vector group are represented by 8-bit binary, so that 8 × M column vector groups can be obtained.
Step 2: according to the auxiliary key matrix K10,K11,...,K19Two control parameters v and w in the cat map are calculated as shown in equation (2):
and step 3: combining v and w obtained in step 2, and substituting each column vector subscript as an input variable into an Arnold mapping, and obtaining s and t as shown in formula (3), wherein r is 0,1, 2. s is 0,1, 2.., 8 × M represents a new position scalar after the column vector is subjected to Arnold transformation; t is expressed as the number of bits of the column vector bit group that are rotationally shifted up.
And 4, step 4: and moving the column vector group represented by r into the column vector group represented by s according to the s obtained in the step 3. And circularly moving each element of the column vector group moved to the s position upwards by t according to the t obtained in the step 3.
And 5: and (5) repeating the steps 3 and 4 for 8 times multiplied by M times to obtain an intermediate ciphertext B.
(3) Hyperhenon hyper-chaotic map diffusion process
Step 1: and changing the obtained binary intermediate ciphertext B into a decimal ciphertext P with the size of N multiplied by M.
Step 2: setting an initial value X0Is x1,Y0Is y1Substituting the chaos sequence into a Hyperhenon hyperchaotic mapping system, discarding the previous 200 iteration results, and performing N × M iteration to obtain a chaos sequence L with the length of N × M ═ L1,l2,...,lN×MSubstituting the obtained chaotic sequence L into formula (4) to transform the element value range to [0, 255 }]Get a new chaotic sequence Q ═ { Q ═ Q1,q2,...,qN×M}。
qi=mod(li×105,256)1≤i≤N×M (4)
And step 3: performing formula (5) operation on each pixel of the intermediate ciphertext P, and enabling c0Is composed ofThe average value of the pixel values of the ciphertext P is increased, so that the correlation between the plaintext and the ciphertext is increased to achieve the pixel diffusion effect, and the final ciphertext C is obtained as { C {1,c2,...,cN×M}。
The invention has the beneficial effects that:
the invention increases the length and combination of the key by forming the encryption key by the auxiliary key with the length of 400 bits and the input key, and makes exhaustive attack impossible. Then, plaintext scrambling operation is performed by means of the auxiliary key information, and plaintext (ciphertext attack) can be effectively resisted. And carrying out XOR operation on the obtained intermediate ciphertext and a hyper-henon hyperchaotic mapping to generate a chaotic sequence, and improving the poor characteristics of periodic windows and the like in the low-dimensional chaotic transformation. The invention can effectively resist classical attacks, ensures the security of channel transmission and has wide application prospect in the field of digital multimedia information security.
Drawings
FIG. 1 is an encryption flow diagram of the present invention
FIG. 2 shows a key K1Composition diagram of
FIG. 3 is a block diagram of the intermediate ciphertext bit
FIG. 4(a) is a 256X 256 gray scale Lena diagram
FIG. 4(b) is the final encrypted image
FIG. 5(a) clear text grayscale histogram
FIG. 5(b) Gray histogram of ciphertext image
FIG. 6(a) is a plain text relationship diagram
FIG. 6(b) ciphertext relational graph
FIG. 7(a) K2Decryption graph
FIG. 7(b) K3Decryption graph
FIG. 7(c) K4Decryption graph
Detailed Description
The specific implementation steps are shown in the encryption flowchart of fig. 1.
To implement image encryption, the present invention first implements a key initialization process, as shown in fig. 2.
The encryption key K is mainly composed of a binary auxiliary key K with the length of 400 bits1Inputting a secret key X0,Y0The three parts are as follows.
Step 1: firstly, a binary auxiliary secret K with the length of 400 bits is used1Is divided into ten binary units of 40 bits in length, each of which is K10,K11,...,K19。
Step 2: will input the key X0,Y0As an initial key of the Hyperhenon map, as shown in formula (1), where c is made 1.76, d is made 0.1, and X0,Y0And taking values between (0,1) to generate a group of hyperchaotic sequences for diffusion operation.
k=0,1,2,... (1)
After the key initialization process of fig. 2 is completed, the image encryption process of fig. 1 is performed, during which an intermediate bit cipher text matrix is also generated, as shown in fig. 3.
Step 1: first, an N × M plaintext image is divided into M column vector groups, and pixels of each vector group are represented by 8-bit binary, so that 8 × M column vector groups can be obtained.
Step 2: according to the auxiliary key matrix K10,K11,...,K19Two control parameters v and w in the cat map are calculated as shown in equation (2):
and step 3: combining v and w obtained in step 2, and substituting each column vector subscript as an input variable into an Arnold mapping, and obtaining s and t as shown in formula (3), wherein r is 0,1, 2. s is 0,1, 2.., 8 × M represents a new position scalar after the column vector is subjected to Arnold transformation; t is expressed as the number of bits of the column vector bit group that are rotationally shifted up.
And 4, step 4: and moving the column vector group represented by r into the column vector group represented by s according to the s obtained in the step 3. And circularly moving each element of the column vector group moved to the s position upwards by t according to the t obtained in the step 3.
And 5: and (5) repeating the steps 3 and 4 for 8 times multiplied by M times to obtain an intermediate ciphertext B.
Step 6: and changing the obtained binary intermediate ciphertext B into a decimal ciphertext P with the size of N multiplied by M.
And 7: setting an initial value X0Is x1,Y0Is y1Substituting the chaos sequence into a Hyperhenon hyperchaotic mapping system, discarding the previous 200 iteration results, and performing N × M iteration to obtain a chaos sequence L with the length of N × M ═ L1,l2,...,lN×MSubstituting the obtained chaotic sequence L into formula (4) to transform the element value range to [0, 255 }]Get a new chaotic sequence Q ═ { Q ═ Q1,q2,...,qN×M}。
qi=mod(li×105,256)1≤i≤N×M (4)
And 8: performing formula (5) operation on each pixel of the intermediate ciphertext P, and enabling c0Is the average value of the pixel values of the intermediate ciphertext P, so that the correlation between the plaintext and the ciphertext is increased to achieve the pixel diffusion effect, and the final ciphertext C is obtained1,c2,...,cN×M}。
Experimental simulations were performed using matlab 2014 on a gray scale Lena map of size 256 × 256, the plaintext image being shown in fig. 4(a), in whichThe system input keys are respectively: x0=0.314 852 2456,Y00.4258527320. The resulting encrypted image is shown in fig. 4 (b).
The image encryption method of the present invention is analyzed in terms of security as follows.
1. Histogram analysis
Fig. 5(a) and (b) are histogram diagrams of plaintext and ciphertext, respectively. As can be seen from the figure, the pixel value distribution of the image with the plaintext histogram distribution is quite uneven, and an attacker can obtain the image information according to the pixel distribution information. After the image is encrypted by the method, the histogram of the ciphertext image is distributed quite uniformly, the pixel value information is well hidden, and the encryption effect is achieved.
2. Statistical analysis
And randomly and respectively selecting two groups of adjacent pixel points in the horizontal direction, the vertical direction and the diagonal direction in the plaintext image and the ciphertext image to draw a pixel correlation diagram. Fig. 7(a) shows a plain text relationship diagram, fig. 7(b) shows a cipher text relationship diagram, and correlation coefficients between pixels are calculated according to equations (6) to (9).
Where x and y represent gray values of adjacent pixel groups of the image, E (.) -represents mathematical expectation, cov (.) -represents covariance, and γ representsxyRepresented as the relation coefficient of the neighboring pixels. The calculation results are shown in table 1, and a correlation coefficient closer to 1 indicates stronger correlation, and a smaller correlation indicates less correlation.
TABLE 1 neighboring Pixel correlation coefficient Table
3. Sensitivity analysis of initial values
The decryption key K of the invention is composed of K ═ K1,X0,Y0]In which the correct decryption key K is2=[K1,X0,Y0]In which K is1For a given 400-bit binary bit group, X0=0.314 852 2456,Y00.4258527320 when key X is input0,Y0The decryption keys K are respectively obtained by respectively changing slightly3,K4In which K is3In (C) X0Other values do not become a solution, K0.31485224574Middle Y0Other values do not change to another solution, 0.4258527321. As can be seen from fig. 6, provided that the decryption key occurs 10-10The small change of the data can not be decrypted successfully, and the method has extremely strong sensitivity to the initial value and can effectively resist differential attack.
4. Attack of classical type
The following four types are defined as classical attacks according to the Kerckhoff principle:
(1) ciphertext-only attack (Ciphertext only attack): the attacker has no other auxiliary information except the intercepted ciphertext.
(2) Known plaintext attack (knock plain attack): besides mastering the ciphertext, the attacker also masters the corresponding relation between partial plaintext and the ciphertext.
(3) Choose plaintext attack (Chosen plaintextattack): the attacker knows the encryption algorithm and can select the plaintext and obtain the ciphertext corresponding to the corresponding plaintext.
(4) Ciphertext attack (Chosen cipertext attack) was Chosen: the attacker knows the encryption algorithm and can select the ciphertext and obtain the corresponding plaintext.
Obviously, the plaintext attack is the most effective attack method, and the attack of the method can be effectively resisted by adding the encryption algorithm, and the attack of other methods can also be effectively resisted.
However, choosing a plaintext attack is not effective for the present invention, mainly for the following two reasons: firstly, the invention has extremely high sensitivity to the key, and the input key can not be decrypted normally as long as the input key has slight change; secondly, plaintext information is introduced when the diffusion operation is carried out, so that cracking through a two-dimensional matrix of all 0 is impossible. In conclusion, the invention can effectively resist the classical attack.
5. Clear text sensitivity analysis
Sensitivity to plaintext means that when the pixel values in an image change slightly, a distinct ciphertext image is obtained. Analysis is generally performed using two parameters, NPCR (pixel rate of change) and UACI (normalized average change in pixels).
And inputting the same key to obtain two identical ciphertexts. One of the ciphertext images is taken, and the pixel value 174 of (438,337) is changed to 173, which can be obtained from equations (10) and (11), where NPCR is 99.64% and UACI is 33.78%. The result shows that the method has strong sensitivity to the plaintext and can effectively resist differential attack.
6. Key space analysis
The input keys of the invention are all of double-precision floating point type, and the effective bits reach 16 bits, so the key space reaches 1032If the length of the key space is considered in the 400-bit binary bit group in the auxiliary key, the key space of the invention becomes larger, and it is almost impossible to obtain the plaintext image information through exhaustive attack. Therefore, the key space of the invention can effectively resist exhaustive attack, achieve the effect of safe transmission and ensure that the image information is not leaked.
Claims (1)
1. A hyperchaotic image encryption method sequentially comprises a key initialization process, a scrambling transformation process and a Hyperhenon hyperchaotic mapping diffusion process, and is characterized in that,
(1) key initialization procedure
The encryption key K is composed of a binary auxiliary key K with the length of 400 bits1Inputting a secret key X0,Y0The three parts are as follows;
step 1: firstly, a binary auxiliary secret K with the length of 400 bits is used1Cutting into ten binary units with the length of 40 bits to obtain an auxiliary key matrix K10,K11,...,K19;
Step 2: will input the key X0,Y0As an initial key of the Hyperhenon map, the following formula (1) is shown, where c is 1.76, d is 0.1, and X0,Y0Taking values between (0,1), and generating a group of hyperchaotic sequences for diffusion operation;
(2) scrambling transformation process
Step 1: dividing the N multiplied by M plaintext image into M column vector groups, and expressing the pixels of each vector group by 8-bit binary to obtain 8 multiplied by M column vector groups;
step 2: according to the auxiliary key matrix K10,K11,...,K19Two control parameters v and w in the cat map are calculated as shown in equation (2) below:
and step 3: combining v and w obtained in step 2, and substituting each column vector subscript as an input variable into an Arnold mapping, as shown in the following formula (3), obtaining s and t, wherein r is 0,1, 2. s ═ 0,1, 2.., 8 × M denotes a new position scalar after the column vector is subjected to Arnold transform; t represents the number of bits rotationally shifted up the column vector bit group;
and 4, step 4: moving the column vector group represented by r into the column vector group represented by s according to the s obtained in the step 3, and circularly moving each element of the column vector group moved to the position of s upwards by t according to the t obtained in the step 3;
and 5: repeating the steps 3 and 4 for 8 times multiplied by M times to obtain an intermediate ciphertext B;
(3) hyperhenon hyper-chaotic map diffusion process
Step 1: changing the obtained binary intermediate cryptograph B into a decimal cryptograph P with the size of N multiplied by M;
step 2: setting an initial value X0Is x1,Y0Is y1Substituting the chaos sequence into a Hyperhenon hyperchaotic mapping system, discarding the previous 200 iteration results, and performing N × M iteration to obtain a chaos sequence L with the length of N × M ═ L1,l2,...,lN×MSubstituting the obtained chaotic sequence L into the following formula (4) to transform the element value range to [0, 255 }]Get a new chaotic sequence
Q={q1,q2,...,qN×M}
qi=mod(li×105,256) 1≤i≤N×M (4)
And step 3: the following equation (5) is applied to each pixel of the intermediate ciphertext P, let c0Is the average value of the pixel values of the intermediate ciphertext P, so that the correlation between the plaintext and the ciphertext is increased to achieve the pixel diffusion effect, and the final ciphertext C is obtained1,c2,...,cN×M}。
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610908104.1A CN106570814B (en) | 2016-10-17 | 2016-10-17 | Hyperchaotic image encryption method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610908104.1A CN106570814B (en) | 2016-10-17 | 2016-10-17 | Hyperchaotic image encryption method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106570814A CN106570814A (en) | 2017-04-19 |
CN106570814B true CN106570814B (en) | 2020-09-29 |
Family
ID=58533101
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610908104.1A Active CN106570814B (en) | 2016-10-17 | 2016-10-17 | Hyperchaotic image encryption method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106570814B (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107292802A (en) * | 2017-05-10 | 2017-10-24 | 广东工业大学 | A kind of parallel image encryption method of quantum chaos |
CN112383523B (en) * | 2020-11-02 | 2022-02-22 | 国网电子商务有限公司 | Image encryption method, related device and storage medium |
CN115499557B (en) * | 2022-09-13 | 2023-07-21 | 洛阳师范学院 | Arnold mapping and multi-shift mapping function-based delayed chaotic image encryption method |
CN116582247B (en) * | 2023-07-13 | 2023-09-26 | 深圳市柏英特电子科技有限公司 | Intelligent encryption method and system for home security camera shooting data |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6094483A (en) * | 1997-08-06 | 2000-07-25 | Research Foundation Of State University Of New York | Secure encryption and hiding of data and messages in images |
CN103167213A (en) * | 2013-02-07 | 2013-06-19 | 东北大学 | Digital image encryption method based on Cat mapping and hyper-chaos Lorenz system |
CN103440613A (en) * | 2013-09-04 | 2013-12-11 | 上海理工大学 | Color-image encryption method for hyperchaotic Rossler system |
CN103489151A (en) * | 2013-09-11 | 2014-01-01 | 河南大学 | Color image encryption method based on chaos sequence and hyper-chaos system |
CN104680475A (en) * | 2015-02-27 | 2015-06-03 | 柳州职业技术学院 | Image hybrid encrypting method based on hyperchaotic system |
-
2016
- 2016-10-17 CN CN201610908104.1A patent/CN106570814B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6094483A (en) * | 1997-08-06 | 2000-07-25 | Research Foundation Of State University Of New York | Secure encryption and hiding of data and messages in images |
CN103167213A (en) * | 2013-02-07 | 2013-06-19 | 东北大学 | Digital image encryption method based on Cat mapping and hyper-chaos Lorenz system |
CN103440613A (en) * | 2013-09-04 | 2013-12-11 | 上海理工大学 | Color-image encryption method for hyperchaotic Rossler system |
CN103489151A (en) * | 2013-09-11 | 2014-01-01 | 河南大学 | Color image encryption method based on chaos sequence and hyper-chaos system |
CN104680475A (en) * | 2015-02-27 | 2015-06-03 | 柳州职业技术学院 | Image hybrid encrypting method based on hyperchaotic system |
Also Published As
Publication number | Publication date |
---|---|
CN106570814A (en) | 2017-04-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108898025B (en) | Chaotic image encryption method based on double scrambling and DNA coding | |
Wang et al. | Image encryption algorithm with random scrambling based on one-dimensional logistic self-embedding chaotic map | |
CN108322622B (en) | Color digital image encryption method based on 2D-VMD and eight-dimensional hyper-chaotic system | |
Liu et al. | Color image encryption using three-dimensional sine ICMIC modulation map and DNA sequence operations | |
CN107094072B (en) | Mixed chaotic encryption method based on generalized Henon mapping | |
CN109660696B (en) | New image encryption method | |
CN106570814B (en) | Hyperchaotic image encryption method | |
CN107292184B (en) | Image encryption method, device and key stream generating method and key stream generator | |
CN111597574B (en) | Parallel image encryption system and method based on spatial diffusion structure | |
CN105046161A (en) | DNA dynamic coding based colored image encryption method | |
CN110889877A (en) | Image encryption method based on L-F cascade chaos and 3D bit scrambling | |
CN105956991B (en) | Resume image based on dynamic DNA encoding and double chaotic maps | |
CN105447396A (en) | Fractional domain image encryption method based on Arnold transformation and compound chaos | |
CN108566501B (en) | Color image encryption method based on mixed domain and LSS type coupling mapping grid | |
CN110149200A (en) | A kind of color image encrypting method based on dynamic DNA and 4D chaos | |
CN111934846A (en) | Multi-chaos Arnold image encryption method based on fractional Fourier transform | |
CN109586895B (en) | Novel color image encryption method | |
Wang et al. | Image encryption algorithm based on bit-level permutation and dynamic overlap diffusion | |
CN111783116A (en) | Lightweight hyperchaotic rapid image encryption algorithm | |
CN114389788B (en) | Image encryption algorithm with mixed chaos and block scrambling | |
Ramli et al. | Novel image encryption using a pseudoset generated by chaotic permutation multicircular shrinking with a gradual deletion of the input set | |
CN103310157B (en) | Based on the image encryption method of RT-DNA cellular automaton | |
CN116886270B (en) | Three-band encryption method based on national encryption algorithm and double-chaotic system | |
CN111683191B (en) | Chaotic image encryption method capable of realizing rapid simultaneous scrambling and diffusion of rows and columns | |
CN111682932B (en) | Single-round image encryption method based on mixed chaotic mapping |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |