CN106651735A - Chaos theory-based digital image parallel encryption method - Google Patents

Chaos theory-based digital image parallel encryption method Download PDF

Info

Publication number
CN106651735A
CN106651735A CN201610812070.6A CN201610812070A CN106651735A CN 106651735 A CN106651735 A CN 106651735A CN 201610812070 A CN201610812070 A CN 201610812070A CN 106651735 A CN106651735 A CN 106651735A
Authority
CN
China
Prior art keywords
image
sequence
plaintext
chaos
plaintext image
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610812070.6A
Other languages
Chinese (zh)
Inventor
谢国波
王添
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong University of Technology
Original Assignee
Guangdong University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong University of Technology filed Critical Guangdong University of Technology
Priority to CN201610812070.6A priority Critical patent/CN106651735A/en
Publication of CN106651735A publication Critical patent/CN106651735A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking

Abstract

The invention discloses a chaos theory-based digital image parallel encryption method comprising the following steps: a chaotic sequence is used for subjecting a plaintext image to overall position scrambling operation, the plaintext image is divided into a number of parts, each part of the plaintext image is subjected to parallel local dispersal operation, a last pixel of each part of the plaintext image and a first pixel of a next part of the plaintext image are swapped, and the last step is repeated till overall dispersal of the plaintext image is completed. Compared with technologies of the prior art, the chaos theory-based digital image parallel encryption method is advantageous in that differential attacks and statistical characteristic analysis can be well resisted, chose-plaintext or cryptograph attacks can be also effectively resisted, large secret key space and good encryption effect can be exerted, and parallel calculating capability of a computer multinucleated cpu can be effectively used for effectively improving calculating speed and encryption performance.

Description

A kind of digital picture parallel encryption method based on chaology
Technical field
The present invention relates to information security field, more particularly to a kind of digital picture parallel encryption side based on chaology Method.
Background technology
Chaos is one of important discovery of 20th century, the three big physicss arranged side by side with quantum mechanics, the Theory of Relativity, and chaos phenomenon is Refer to it is determined that nonlinear system in, not in addition under conditions of any random factor, due to the interaction table of therein A kind of phenomenon for revealing to be similar to stochastic process.And the inherent various features of chaos meet substantially will in cryptography very much Ask.Such as:First, extreme sensitivity of the chaos system to initial condition so that the key space of cryptographic system is wider and key is quick Perception is extremely strong;Secondly, the chaotic signal that chaos system is produced is aperiodic and non-convergent, has good randomness and multiple again Polygamy, so this characteristic is well suited for allowing it to make Cryptographic random number generator;Finally, chaotic signal has complex structure, class The characteristic such as noise-like causes it to have natural disguise.Therefore, there is the cryptography scheme for being proposed based on chaology tradition to add The good characteristic that secret skill art does not have, and then chaos applications are had a wide range of applications in digital image encryption field.
The resume image research incipient stage based on chaos is based primarily upon obscuring and spreading frame for Shannon propositions Frame.First, chaos sequence that the stage produced using chaos system is being obscured come the position of scramble pixel;Secondly, in diffusion rank Section obtains more preferable cipher round results mainly by the pixel value of change pixel.And Cat maps therein are to obscure the stage Used in the most classical method, it is not only easy to realize, and the speed of service make the features such as fast it so far still by much plus Close algorithm is favored.Guan et al. proposes a kind of by Cat maps and the Chaotic Image Encryption Algorithm of Chen systems;Chen etc. Two-dimentional Cat maps are further generalized to three-dimensional by people, and then draw a kind of Chaotic Image Encryption Algorithm using three-dimensional Cat maps; Gao et al. employs a kind of ranks of the sequence pair image pixel for being referred to as Scrambling Matrix and enters line translation, and it is before this using one-dimensional Logistic mappings produce a pseudorandom chaos sequence, the row again for recycling the sequence to enter pixel every trade respectively What is arranged and arrange rearranges, and as a result shows that this disorder method has higher safety than Cat maps, so also extensive It is applied in image encryption;Zhu Jianliang et al. proposes a kind of chaos of the stochastic parameter change during chaotic signal is generated Pseudo-random series producing method, and based on this method proposing a kind of new resume image;Zhang et al. is proposed and is passed through DNA encoding carries out image encryption.In sum, for New chaotic image encryption technology research either range or depth all takes Obtained very big development and breakthrough, new algorithm is continued to bring out so that New chaotic image encryption technology also increasingly moves to maturity.And Some current image encryption methods are primarily present, And algorithm is essentially all that the serial encryption mode of employing carries out encryption and decryption.
The content of the invention
For above-mentioned safety issue and encryption performance problem, the present invention proposes a kind of digital picture based on chaology Parallel encryption method.
A kind of digital picture parallel encryption method based on chaology of the present invention, including step
S1:Position scramble of overall importance is carried out to plaintext image using chaos sequence;
S2:Plaintext image is divided into into several pieces;
S3:Carry out parallel local diffusion to per part of plaintext image, and by last pixel of every a plaintext image and First pixel of lower a plaintext image is swapped;
S4:Repeat step S3, the global diffusion until completing plaintext image.
Further, chaos sequence described in step S1 is produced using Kent chaos systems.
Further, step S1 includes step:
S11:By former plaintext image according to row major be sequentially converted into a length be m × n one-dimensional sequence L={ l1, l2,l3,…,lm×n, the span of the sequence is [0,255];
S12:It is sum all pixels value of former plaintext image to be added and obtains a total value, then again with sum come divided by figure Total pixel number of picture is m × n, and thus an average pixel value to obtain whole image is avg, by formulaWith formula t=m+n+mod (avg × 108, m+n) and institute in Kent chaos systems can be respectively obtained Control parameter a for needing and iterationses t;
S13:If the system variable initial value of Kent chaos systems is x0, by x0Substitute in Kent chaos systems with a, carry out Kent maps t iteration, is then further continued for iteration m × n time, and one length of generation is the one-dimensional chaos sequence K={ k of m × n1, k2,…,km×n};
S14:K described in chaos sequence is sorted from small to large, one is produced for each in the sequence after record ordering One position sequence K'={ k of individual element position in former sequence K1',k2',…,k'm×n, and by the position sequence Position scramble of overall importance is carried out to plaintext sequence L, scramble image sequence L'={ l are finally given1',l2',…,l'm×n}。
The beneficial effects of the present invention is, compared with prior art, the present invention can not only preferably resist differential attack, system Meter specificity analysises, and be highly resistant to selection plaintext or cipher text and attack, and key space is big, cipher round results are good, while can have Effect effectively improves calculating speed and encryption performance using the computation capability of computer multinuclear cpu.
Description of the drawings
Fig. 1 is digital picture parallel encryption method flow chart of the present invention based on chaology.
Fig. 2 is grey level histogram before and after former plaintext image encryption.
Fig. 3 is the grey level histogram after the plaintext image encryption in Fig. 2.
Fig. 4 is neighbor dependency graph before plaintext image encryption.
Fig. 5 is neighbor dependency graph after plaintext image encryption.
Fig. 6 is the picture after correct decryption.
Fig. 7 is the picture after mistake decryption.
Specific embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation is described, it is clear that described embodiment is only a part of embodiment of the invention, rather than the embodiment of whole.It is based on Embodiment in the present invention, it is every other that those of ordinary skill in the art are obtained under the premise of creative work is not made Embodiment, belongs to the scope of protection of the invention.
Refer to Fig. 1, a kind of digital picture parallel encryption method based on chaology of the present invention, including step
S1:Position scramble of overall importance is carried out to plaintext image using chaos sequence;
S2:Plaintext image is divided into into several pieces;
S3:Carry out parallel local diffusion to per part of plaintext image, and by last pixel of every a plaintext image and First pixel of lower a plaintext image is swapped;
S4:Repeat step S3, the global diffusion until completing plaintext image.
Scramble of the process that step S1 is implemented for image pixel positions.The maximum that this method is different from other encryption methods is special Point is that common resume image is all the serial encryption mode for adopting, in order to make full use of present computer multinuclear cpu Can parallel computation characteristic, in the image dispersion operation stage, former plaintext image is divided into several pieces by the present invention, allows every portion to carry out Parallel local diffusion operation, after each wheel terminates, in order that image can carry out diffusion of overall importance, will be per a Last pixel and lower first a pixel swap, carry out the dispersion operation of next round, such iterative cycles To the last, so reach the global diffusion of image.
If gray level image A sizes are m × n, used as chaos system iterationses, sum is pixel value summation to t, and avg is all The meansigma methodss of pixel, concrete encryption method step are as follows:
Step S11:Original document image A according to row major be sequentially converted into a length be m × n one-dimensional sequence L= {l1,l2,l3,…,lm×n, the span of the sequence is [0,255].
Step S12:The all pixels value of original document image is added and obtains a total value for sum, then again with sum come divided by Total pixel number of image is m × n, and thus an average pixel value to obtain whole image is avg, by formula (1) and formula (2) control parameter a and iterationses t needed for Kent chaos systems can be respectively obtained.
T=m+n+mod (avg × 108,m+n) (2)
Step S13:If the system variable initial value of chaos system is x0, by x0Substitute in formula kent chaos system with a, enter Row Kent maps t iteration and is used for eliminating the harmful effect of transient effect, then with it as starting point continuation iteration m × n time, it will Produce one-dimensional chaos sequence K={ k of the length for m × n1,k2,…,km×n}。
Step S14:Chaos sequence K is sorted from small to large, one is produced for each in the sequence after record ordering One position sequence K'={ k of individual element position in former sequence K1',k2',…,k'm×n, thus come in plain text with it Sequence L carries out position scramble of overall importance, finally gives scramble image sequence L'={ l1',l2',…,l'm×n}。
Step S2-S5 is diffusion parallel to image pixel
The process is that scramble image sequence is divided into several pieces first, and specific formula is respectively adopted per portion then Parallel to each subsequence is diffused operation, after each subsequence circulates certain number of times, then will be sub per adjacent two First of sequence and last value are swapped, and so reach diffusion of overall importance.Then it is further continued for above behaviour Make, the ciphertext sequence after a diffusion will be obtained after so circulating certain number of times, so as to obtain final encrypted cipher text.It is concrete to walk It is rapid as follows:
Step S2:Experiment herein uses the gray level image of 256*256, and cpu is 4 cores, so L' is divided into 4 Part an equal amount of subsequence is respectively p1, p2, p3, p4, creates four threads so that each thread be each responsible for one it is sub Sequence, with reference to formula (3), is calculated once during the value of four subsequences to be updated to formula (3) respectively successively, is obtained first Secondary diffusion effect.For formula (3), c can be made0For Arbitrary Digit in [0,255], therefore c0Also can be used as a key.This step makes It is closely related before and after obtaining intermediate ciphertext, to reach pixel diffusion.
Step S3:Each subsequence continues cycling through calculating 10 times according still further to formula (3), obtains the subsequence after four diffusions P1 ', p2 ', p3 ', p4 ' so that abundant diffusion is obtained inside each subsequence, but can only so cause each height Interior sequences spread, and are local diffusion for whole scrambling sequence, in order to each subsequence can be influenced each other, will First exchange in last sequential value and p2 ' in p1 '
Step S4:The operation of step S3 identical, first in last value of last p4 ' and p1 ' sequence are carried out successively Train value is exchanged, thus, making close ties are generated between them, the change of any one sequence is all changed and has influence on whole sequence Great variety.
Step S5:After each subsequence carries out head and the tail value exchange, the operation of step S2 and step S3 is re-started, so 10 circulate operations are carried out continuously, final ciphertext C={ c is obtained1,c2,......,cm×n}.Ciphertext sequence c is converted to finally Ciphertext graph picture.
The image selected during this paper experiment simulations is the Cameraman gray level images that size is 256 × 256, with this Used as in plain text, the initial key of encryption system China mainly has the x in Kent chaos systems0=0.4561592650, and encryption Parameter c of formula used in process (3)0=250, and control parameter S in Kent chaos systems is then determined by image self-characteristic It is fixed.Experiment simulation shows, encryption method simple possible and encryption/decryption speed is fast, and this method can not only obtain preferably encryption effect Really, also with higher safety.
Fig. 2 is the grey level histogram of the plaintext image before encryption, hence it is evident that presents uneven distribution, therefore can draw figure As the characteristic distributions of pixel value.Fig. 3 is the ciphertext image grey level histogram after encryption, it can be seen which distributes very evenly, therefore Can reach the effect of hiding plaintext image information well.
From 800 groups of consecutive points of horizontal direction are randomly selected with ciphertext graph picture in plain text, with the secondary pass for making image pixel value System's figure, Fig. 4 and two figures of Fig. 5 present the pixel value relation and ciphertext graph of plaintext image level consecutive points respectively as horizontally adjacent point Pixel value relation, thus can obtain, the pixel value after encryption between consecutive points is completely without any relation.
Fig. 6 and Fig. 7 are visible, during to plaintext image decryption, even there is very small change in some decruption key, Finally all cannot get plaintext image.In experiment simulation, after correct decryption, gained decrypted image is Fig. 5, by X0= 0.3234321210 is changed to X0=0.3234321211, and other are all constant, and the decrypted image for obtaining is as shown in Figure 6.Therefore, which I guess 10-10Minor alteration also cannot successful decryption image, illustrate that the method has preferable key sensitivity.
The above is the preferred embodiment of the present invention, it is noted that for those skilled in the art For, under the premise without departing from the principles of the invention, some improvements and modifications can also be made, these improvements and modifications are also considered as Protection scope of the present invention.

Claims (3)

1. a kind of digital picture parallel encryption method based on chaology, it is characterised in that including step
S1:Position scramble of overall importance is carried out to plaintext image using chaos sequence;
S2:Plaintext image is divided into into several pieces;
S3:Carry out parallel local diffusion to per part of plaintext image, and by last pixel of every a plaintext image and next First pixel of part plaintext image is swapped;
S4:Repeat step S3, the global diffusion until completing plaintext image.
2. it is as claimed in claim 1 in the digital picture parallel encryption method of chaology, it is characterised in that institute in step S1 State chaos sequence to produce using Kent chaos systems.
3. it is as claimed in claim 2 in the digital picture parallel encryption method of chaology, it is characterised in that step S1 includes Step:
S11:By former plaintext image according to row major be sequentially converted into a length be m × n one-dimensional sequence L={ l1,l2, l3,…,lm×n, the span of the sequence is [0,255];
S12:It is sum all pixels value of former plaintext image to be added and obtains a total value, then again with sum come divided by image Total pixel number is m × n, and thus an average pixel value to obtain whole image is avg, by formulaWith formula t=m+n+mod (avg × 108, m+n) and institute in Kent chaos systems can be respectively obtained Control parameter a for needing and iterationses t;
S13:If the system variable initial value of Kent chaos systems is x0, by x0Substitute in Kent chaos systems with a, carry out Kent T iteration of mapping, is then further continued for iteration m × n time, and one length of generation is the one-dimensional chaos sequence K={ k of m × n1,k2,…, km×n};
S14:K described in chaos sequence is sorted from small to large, one is produced for each yuan in the sequence after record ordering One position sequence K'={ k of element position in former sequence K1',k2',…,k'm×n, and come right by the position sequence Plaintext sequence L carries out position scramble of overall importance, finally gives scramble image sequence L'={ l1',l2',…,l'm×n}。
CN201610812070.6A 2016-09-08 2016-09-08 Chaos theory-based digital image parallel encryption method Pending CN106651735A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610812070.6A CN106651735A (en) 2016-09-08 2016-09-08 Chaos theory-based digital image parallel encryption method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610812070.6A CN106651735A (en) 2016-09-08 2016-09-08 Chaos theory-based digital image parallel encryption method

Publications (1)

Publication Number Publication Date
CN106651735A true CN106651735A (en) 2017-05-10

Family

ID=58852933

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610812070.6A Pending CN106651735A (en) 2016-09-08 2016-09-08 Chaos theory-based digital image parallel encryption method

Country Status (1)

Country Link
CN (1) CN106651735A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107239709A (en) * 2017-06-07 2017-10-10 广东工业大学 A kind of method of New chaotic image encryption, apparatus and system
CN109933755A (en) * 2019-03-21 2019-06-25 江苏工程职业技术学院 A kind of generation method of garbage classification code
CN110784619A (en) * 2019-10-24 2020-02-11 广西师范大学 Novel parallel image encryption method based on chaos
CN111597574A (en) * 2020-04-16 2020-08-28 南通职业大学 Parallel image encryption system and method based on spatial diffusion structure
CN113067958A (en) * 2021-03-02 2021-07-02 甘肃同兴智能科技发展有限责任公司 Image encryption method and device, electronic equipment and storage medium
CN113297606A (en) * 2021-06-25 2021-08-24 燕山大学 Color quantum image encryption and decryption method based on multiple chaos and DNA operation
CN114338023A (en) * 2022-03-10 2022-04-12 山东云海国创云计算装备产业创新中心有限公司 Image encryption method, image decryption method, image processing apparatus, and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101702117A (en) * 2009-11-09 2010-05-05 东南大学 Method for generating random pseudorandom sequence based on discrete progressive determinacy
CN103679625A (en) * 2013-11-08 2014-03-26 西安理工大学 Single-channel color image encryption method based on chaos and phase retrieval process
CN104574259A (en) * 2015-01-08 2015-04-29 大连大学 Image encryption method based on chaotic system and insertion-deletion model
CN104751401A (en) * 2015-04-16 2015-07-01 大连大学 Novel piecewise linear chaotic mapping image encrypting and encoding method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101702117A (en) * 2009-11-09 2010-05-05 东南大学 Method for generating random pseudorandom sequence based on discrete progressive determinacy
CN103679625A (en) * 2013-11-08 2014-03-26 西安理工大学 Single-channel color image encryption method based on chaos and phase retrieval process
CN104574259A (en) * 2015-01-08 2015-04-29 大连大学 Image encryption method based on chaotic system and insertion-deletion model
CN104751401A (en) * 2015-04-16 2015-07-01 大连大学 Novel piecewise linear chaotic mapping image encrypting and encoding method

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
吴家新: "《混沌数字图像加密算法研究》", 《中国优秀硕士学位论文全文数据库 信息科技辑》 *
朱从旭等: "《基于超混沌系统和密文交错扩散的图像加密新算法》", 《电子与信息学报》 *
王春淋等: "《基于分块置乱与扩散的分数阶混沌彩色图像加密算法》", 《河南大学学报(自然科学版)》 *
谢国波等: "《一种新的基于比特置乱的超混沌图像加密算法》", 《微电子学与计算机》 *
谢国波等: "《基于Logistic映射的可变置乱参数的图像加密算法》", 《微电子学与计算机》 *

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107239709B (en) * 2017-06-07 2020-08-11 广东工业大学 Chaotic image encryption method, device and system
CN107239709A (en) * 2017-06-07 2017-10-10 广东工业大学 A kind of method of New chaotic image encryption, apparatus and system
CN109933755B (en) * 2019-03-21 2021-12-21 江苏工程职业技术学院 Method for generating garbage classification code
CN109933755A (en) * 2019-03-21 2019-06-25 江苏工程职业技术学院 A kind of generation method of garbage classification code
CN110784619A (en) * 2019-10-24 2020-02-11 广西师范大学 Novel parallel image encryption method based on chaos
CN110784619B (en) * 2019-10-24 2021-08-10 广西师范大学 Novel parallel image encryption method based on chaos
CN111597574A (en) * 2020-04-16 2020-08-28 南通职业大学 Parallel image encryption system and method based on spatial diffusion structure
CN111597574B (en) * 2020-04-16 2021-03-23 南通职业大学 Parallel image encryption system and method based on spatial diffusion structure
CN113067958A (en) * 2021-03-02 2021-07-02 甘肃同兴智能科技发展有限责任公司 Image encryption method and device, electronic equipment and storage medium
CN113067958B (en) * 2021-03-02 2023-01-31 甘肃同兴智能科技发展有限责任公司 Image encryption method and device, electronic equipment and storage medium
CN113297606A (en) * 2021-06-25 2021-08-24 燕山大学 Color quantum image encryption and decryption method based on multiple chaos and DNA operation
CN113297606B (en) * 2021-06-25 2022-07-19 燕山大学 Color quantum image encryption and decryption method based on multiple chaos and DNA operation
CN114338023A (en) * 2022-03-10 2022-04-12 山东云海国创云计算装备产业创新中心有限公司 Image encryption method, image decryption method, image processing apparatus, and storage medium
CN114338023B (en) * 2022-03-10 2022-06-07 山东云海国创云计算装备产业创新中心有限公司 Image encryption method, image decryption method, image processing apparatus, and storage medium

Similar Documents

Publication Publication Date Title
CN106651735A (en) Chaos theory-based digital image parallel encryption method
CN111105339B (en) Image encryption method based on multidimensional chaotic system and Joseph scrambling
Zhu et al. A chaos-based symmetric image encryption scheme using a bit-level permutation
CN101739695B (en) Three-dimensional Arnold mapping-based image grouping encryption method
CN104380245B (en) random number generator and stream cipher
CN106910156B (en) A kind of New chaotic image encryption method with plaintext association key stream generting machanism
CN108898025A (en) New chaotic image encryption method based on dual scramble and DNA encoding
CN104766264B (en) A kind of piecemeal two tier adaptive diffusion image encryption method
CN103167213B (en) Digital image encryption method based on Cat mapping and hyper-chaos Lorenz system
Liu et al. Quantum block image encryption based on arnold transform and sine chaotification model
CN110086601A (en) Based on the associated Josephus traversing of pixel value and hyperchaotic system image encryption method
CN107239708A (en) It is a kind of that the image encryption method converted with score field is mapped based on quantum chaos
CN107220923B (en) Digital picture feedback encryption method based on image network
CN103258312B (en) There is the digital image encryption method of fast key stream generting machanism
CN106327414A (en) Plaintext feature-based double-chaos image encryption method
CN106778304A (en) A kind of quick New chaotic image encryption method with related scramble mechanism in plain text
CN112202545B (en) Image encryption method based on Y-type filling curve and variable-step Joseph traversal
CN110120079A (en) Based on three-dimensional Logistic mapping and broad sense Cat mapping color image encryption method
CN109102452A (en) A kind of image encryption method based on Latin square scramble and directional diffusion
CN107094072A (en) A kind of mixed chaos encryption method based on general Henon Map
Zhang et al. An image encryption scheme based on constructing large permutation with chaotic sequence
CN108122188A (en) A kind of image encryption method
CN107590394B (en) A kind of image encryption method based on chaotic maps and bit recombination
CN103281504A (en) Chaotic image encryption method with double-direction diffusion mechanism
CN104050617B (en) Image encryption method based on Liu chaos systems

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170510

RJ01 Rejection of invention patent application after publication