CN107563950A - A kind of safe and efficient digital image encryption method - Google Patents

A kind of safe and efficient digital image encryption method Download PDF

Info

Publication number
CN107563950A
CN107563950A CN201710807215.8A CN201710807215A CN107563950A CN 107563950 A CN107563950 A CN 107563950A CN 201710807215 A CN201710807215 A CN 201710807215A CN 107563950 A CN107563950 A CN 107563950A
Authority
CN
China
Prior art keywords
mrow
ciphertext
msub
mtr
mtd
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201710807215.8A
Other languages
Chinese (zh)
Inventor
陈俊鑫
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Northeastern University China
Original Assignee
Northeastern University China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Northeastern University China filed Critical Northeastern University China
Priority to CN201710807215.8A priority Critical patent/CN107563950A/en
Publication of CN107563950A publication Critical patent/CN107563950A/en
Withdrawn legal-status Critical Current

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The present invention relates to a kind of safe and efficient digital image encryption method, comprise the following steps:1) using the first~tri- group of required chaos state variable of three-dimensional Chen systems generation encryption;2) scrambling encryption is carried out to original text using first group of chaos state variable, upsets the position of pixel, produce scramble ciphertext;3) encryption is diffused to scramble ciphertext using the second~tri- group of chaos state variable, generates final ciphertext.Invention introduces Chen systems, Chen systems are three-dimensional chaotic systems, possess excellent chaotic characteristic, higher key sensitiveness and unpredictability, and bigger key space, by can effective lifting system encryption performance;The related parameter of original text is introduced to upset the generation process of Scrambling Matrix, introduces high intensity diffusion equation, the security of energy effective guarantee encryption system.

Description

A kind of safe and efficient digital image encryption method
Technical field
The present invention relates to a kind of digital image encryption field, specially a kind of safe and efficient digital image encryption method.
Background technology
It is the multimedia messages of representative because of it using digital picture along with the rapid development of computer and modern communication technology It is directly perceived, lively, vivid to have the characteristics that, it has also become a kind of most commonly seen expression way in internet information, penetrate into bank, The every aspect of the lives such as medical treatment, traffic, shopping, social activity.Incident with the importance that becomes increasingly conspicuous is severe all the more Security threat, because image information often relates to the sensitive information of the various fields such as military, politics, finance, medical treatment, business, its In opening and interconnecting transmission off the net and storage there is huge potential safety hazard, easily by unauthorized access, steal, distort, hinder Cut and wait network security attacks.39th time《China Internet network state of development statistical report》It has been shown that, met with safe thing in 2016 User's accounting of part reaches the 70.5% of whole netizens, it is believed that user's ratio of online environment " less safe " and " very dangerous " Up to 20.3%;The PC quantity that viral trojan horse program was infected in the whole nation is 2.47 hundred million, is monthly influenceed by viral trojan horse program PC quantity at 40,000,000 between fifty-five million platform;According to another ASSOCIATE STATISTICS, 2015 because of disparate networks information security events Caused by loss up to 91,500,000,000 yuan.In addition, as a kind of important strategic resource, information security is concerning national politics safety, warp Ji safety, social safety, cultural security and national defense safety, turn into the important battlefield of 21 century international competition, the guarantor of information security Barrier ability also turns into an important factor for weighing a national comprehensive strength.Encryption be ensure information safety it is most simple and most effective Mode.The contemporary cryptology of current main-stream is characterized based on algorithm complexity theory more, and typical algorithm has DES (Data Encryption Standard), AES (Advanced Encryption Standard) and IDEA (International Data Encryption Algorithm).But compared with text message, image information has that data volume is huge, important information point Dissipating, the features such as information redundance is high, above classics AES considers these particularity of image information, therefore not It is suitable for image encryption.Academia adds image is carried out using such as DES, AES scheduling algorithm for being conventionally used to one-dimensional data encryption It is close to be referred to as " naivety encryption " (Naive Encryption), it is believed that although this method can also protect the safety of image, source In the internal characteristicses of digital picture, this method does not simultaneously have practical value.Since the 1980s, some scholar lands Supervention is existing, and there is be closely connected between chaology and cryptography.Some essential characteristics of chaos system, such as ergodic (Ergodicity), Combination (Mixing), certainty (Exactness), the sensitiveness to primary condition (Sensitivity), can get up with chaotic (Confusion) in cryptography and the concept connection of diffusion (Diffusion), Thus nearly Chaos Immune Algorithm during the last ten years has obtained extensive research.Specific in terms of New chaotic image encryption, the U.S. is learned within 1998 The elaboration of the characteristics of person's Fridrich combinations digital picture itself and Shannon on cryptography, it is proposed that have founder The replacement of meaning-diffusion image Encryption Architecture, as shown in figure 1, causing industry extensive concern;Subsequent Lian et al. is developed For classics scramble-diffusion framework, as shown in Fig. 2 in this framework scramble module upset pixel position but keep its pixel It is worth constant, and spreads module and mask is then carried out to pixel value and spreads the difference of original text, attacked with strengthening system resistance known-plaintext Hit the ability with chosen -plain attact.Researcher is based on this, it is proposed that a large amount of new and effective resume images, Pixel-level Chaotic Technology, modified diffusion scheme, scramble diffusion integrated processes, original text related key parameter and bit-level figure As scramble etc. has emerged a large amount of achievements.
It is corresponding to be, the security of Chaotic Image Encryption Algorithm with the sustainable development of cryptoanalysis and constantly by To threat, substantial amounts of Chaotic Image Encryption Algorithm is cracked successively.In the resume image that these are cracked, three below Safety defect often occurs.
First, in traditional Chaotic Image Encryption Algorithm, typically become using One Dimensional Chaotic Maps grey iterative generation chaos state Amount, and further quantify produce encryption needed for key stream, but the general simple structure of One Dimensional Chaotic Maps, key space it is small, with Machine performance is relatively poor, and these state variables are often moved back when being quantified as and encrypting required key stream with a certain degree of performance Change, so that the randomness of caused key stream substantially reduces, and further influence the overall security performance of system;
Secondly, in traditional Chaotic Image Encryption Algorithm, required key stream (such as Scrambling Matrix or diffusion mask) is encrypted Only determined by input key, and unrelated with encrypted original text, it is such the characteristics of system is produced when encrypting different original texts Raw key stream is duplicate, so that attacker can obtain this by chosen -plain attact and known plain text attack Key stream, in this, as equivalent key, and then crack whole system;
Again, existing achievement in research is it has been proved that the only encryption method of scramble (Permutation-only), no matter it is put How complicated random process is, can not all resist chosen -plain attact and known plain text attack, so needing one after scramble Module is spread, with the statistical nature of covering system and spreads original text difference simultaneously, but common diffusion equation is with password The development of analytics and cracked successively.
The content of the invention
For the deficiency of existing Chaotic Image Encryption Algorithm, the problem to be solved in the present invention be to provide it is a kind of possess it is excellent The safety of chaotic characteristic, higher key sensitiveness and unpredictability, bigger key space and safer diffusion property Efficient digital image encryption method.
In order to solve the above technical problems, the technical solution adopted by the present invention is:
A kind of safe and efficient digital image encryption method of the present invention, comprises the following steps:
1) using the first~tri- group of required chaos state variable of three-dimensional Chen systems generation encryption;
2) scrambling encryption is carried out to original text using first group of chaos state variable, upsets the position of pixel, produce scramble Ciphertext;
3) encryption is diffused to scramble ciphertext using the second~tri- group of chaos state variable, generates final ciphertext.
In step 1), Chen system equations are as follows:
Wherein, a, b, c are the first~tri- control parameter, and x, y, z is the first~tri- system variable;Work as a=35, b=3, c ∈ When [20,28.4], system is in chaos state, the first~tri- system variable inputted when the 3rd control parameter c and first iteration x0、y0、z0As system key, i.e. system key is (x0,y0,z0,c);
If image to be encrypted is P, its size is the length and width of M × N, M and N difference representative image;Three-dimensional Chen Chaos state variable needed for system generation encryption includes procedure below:
101) 3 arrays are established, are designated as X, Y and Z respectively, array length is M × N, and its element is set to X (i), Y (i) With Z (i) (0≤i≤M × N-1), for storing the numerical value of x, y and z caused by chaos system iteration;
102) input system key (x0,y0,z0, c), iteration Chen systems are formula (1) N0It is secondary, make system well into mixed Ignorant state;
103) continue iterative chaotic system M × n times, and x caused by iteration, y and z value are respectively put into array X, Y and Z In, as the first~tri- group of chaos state variable.
N0For constant, N0≥300。
In step 2), using first group of chaos state variable, i.e. array X, scrambling encryption is carried out to original text, upsets pixel Position, produce scramble ciphertext, original text and scramble ciphertext be regarded as one-dimensional sequence in scrambling process, P={ P are respectively adopted (0), P (1) ..., P (M × N-1) }, C={ C (0), C (1) ..., C (M × N-1) } represents original text and the pixel of scramble ciphertext;
201) average pixel value of original text all pixels is calculated, i.e.,
G=mean (P), (2)
For wherein mean functions to take mean value function, g is the average value of original text pixel;
202) array X is quantified, produces scrambling sequence, quantifying equation is:
K1(i)=i+mod [(abs (X (i))-floor (abs (X (i)))) × g × 1015,MN-i)](0≤i≤M×N- 1) (3)
Wherein, abs (x) is takes absolute value function, and floor (x) returns to the nearest integer less than or equal to x, mod (x, Y) it is to take the remainder function;
203) from front to back, i.e., terminate since i=0 to i=M × N-1, exchange P (i) and P (K1(i) numerical value), and P (i) after exchange is entered as C (i), i.e.,:
Wherein, temp is the temporary variable set, is often once exchanged, and original text one point P (i) of disappearance, ciphertext increases One point C (i), after end to be encrypted, original text all disappears, and ciphertext produces simultaneously.
In step 3), using the second~tri- group of chaos state variable, i.e. array Y and array Z, scramble ciphertext is diffused Encryption, generates final ciphertext, including procedure below:
301) array Y and array Z are quantified, produces diffusion mask K2And K3, quantifying equation is:
Wherein, L is the grey level of image to be encrypted;
302) from front to back, i.e., terminate since i=0 to i=M × N-1, scramble ciphertext C (i) is diffused added successively Close, diffusion equation is:
Wherein,Bit-level step-by-step XOR is represented, it is constant to set D (- 1)=seed, for encrypting first pixel.
Present invention additionally comprises step 4) according to demand for security, repeat step 1) -3), carry out more wheel encryptions.
The invention has the advantages that and advantage:
1. the present invention uses the more preferable chaos system of random performance:Invention introduces Chen systems, Chen systems are three Chaos system is tieed up, possesses excellent chaotic characteristic, higher key sensitiveness and unpredictability, and bigger key sky Between, by can effective lifting system encryption performance;
2. the present invention is using the related disorder method of original text:Invention introduces the related parameter of original text to upset scramble The generation process of matrix, so that the Scrambling Matrix that system generates when encrypting different original texts is different, lifting system is supported The ability of anti-chosen -plain attact and known plain text attack;
3. the present invention is using the higher diffusion equation of security performance:Invention introduces the expansion of the high intensity as shown in formula (5) Equation is dissipated, the decryption complexity of the equation has been verified as 2n-2, very close 2nThe theoretical value of (n is the number of bits of pixel), The security of energy effective guarantee encryption system.
Brief description of the drawings
Fig. 1 is the New chaotic image encryption Organization Chart that Fridrich is proposed in the prior art;
Fig. 2 is scramble-diffusion Encryption Architecture figure classical in the prior art;
Fig. 3 is encryption frame diagram of the present invention;
Fig. 4 is original document image used in example;
Fig. 5 is the ciphertext graph picture after scramble in example;
Fig. 6 is final encrypted cipher text image in example.
Embodiment
With reference to Figure of description, the present invention is further elaborated.
As shown in figure 3, the present invention is a kind of safe and efficient digital image encryption method, comprise the following steps:
1) using the first~tri- group of required chaos state variable of three-dimensional Chen systems generation encryption;
2) first group of chaos state variable is utilized, be i.e. array X, scrambling encryption is carried out to original text, upsets the position of pixel, Produce scramble ciphertext;
3) the second~tri- group of chaos state variable, i.e. array Y and array Z are utilized, encryption is diffused to scramble ciphertext, it is raw Into final encrypted cipher text.
In the present invention, original text and ciphertext are regarded as one-dimensional sequence, and P={ P (0), P (1) ..., P (M × N- is respectively adopted 1) }, C={ C (0), C (1) ..., C (M × N-1) }, D={ D (0), D (1) ..., D (M × N-1) } represent original text, scramble ciphertext And final encrypted cipher text, L represent the number of greyscale levels of image to be encrypted.In the present embodiment, original text to be encrypted is shown in Fig. 4 Gray level image, size M=N=512, M and N distinguish the length and width of representative image, N0=300, number of greyscale levels L=256, Key (x0,y0,z0, c)=(1.5839,2.4912,3.2013,28), constant seed=123;Encrypting step is as follows:
In step 1), Chen system equations are as follows:
Wherein, a, b, c are the first~tri- control parameter, and x, y, z is the first~tri- system variable;Work as a=35, b=3, c ∈ When [20,28.4], system is in chaos state, the first~tri- system variable inputted when the 3rd control parameter c and first iteration x0,y0,z0As system key, i.e. system key is (x0,y0,z0,c);
In step 1), if image to be encrypted is P, it is sized to M × N, and three-dimensional Chen systems generation is encrypted required Chaos state variable includes procedure below:
101) 3 arrays are established, are designated as X, Y and Z respectively, array length is M × N, and its element is set to X (i), Y (i) With Z (i) (0≤i≤M × N-1), for storing the numerical value of x, y and z caused by chaos system iteration;
102) input system key (x0,y0,z0, c), iteration Chen systems (formula 1) N0Secondary (N0For constant, N0>=300), Make system well into chaos state;
103) continue iterative chaotic system M × n times, and x caused by iteration, y and z value are respectively put into array X, Y and Z In, as the first~tri- group of chaos state variable.
In the present embodiment, step 101) establishes 3 arrays, and array length is M × N=262144, the element X of corresponding array (i), Y (i), Z (i) (0≤i≤262143) are respectively used to store the value of x, y and z caused by chaos system iteration;
Step 102) input system key (1.5839,2.4912,3.2013,28), by the chaos system shown in formula (1) Iteration 300 times, makes system well into chaos state;
Step 103) continues iterative chaotic system 262144 times, and x caused by iteration, y and z value are respectively put into array In X, Y and Z, the array of generation is:X=27.3192836636065,27.394015208521 ... ,- 1.17506957145386, Y={ 31.6978918478302,31.5553258428948 ..., 1.15389486747088 }, Z=35.6037382011979,35.9826618322906 ..., 21.7926706779081 };
Invention introduces Chen systems, the system is three-dimensional chaotic system, possesses excellent chaotic characteristic, higher close Key sensitiveness and unpredictability, and bigger key space, by can effective lifting system encryption performance.
In step 2), using first group of chaos state variable, i.e. array X, scrambling encryption is carried out to original text, upsets pixel Position, produce scramble ciphertext;
201) average pixel value of original text all pixels is calculated, i.e.,
G=mean (P), (2)
Wherein, for mean functions to take mean value function, g is the average value of original text pixel;
202) array X is quantified, produces scrambling sequence, quantifying equation is:
K1(i)=i+mod [(abs (X (i))-floor (abs (X (i)))) × g × 1015,MN-i)](0≤i≤M×N- 1)(3)
Wherein, abs (x) is takes absolute value function, and floor (x) returns to the nearest integer less than or equal to x, mod (x, Y) it is to take the remainder function;
203) from front to back, i.e., terminate since i=0 to i=M × N-1, exchange P (i) and P (K1(i) numerical value), and P (i) after exchange is entered as C (i), i.e.,:
Wherein, temp is the temporary variable set, is often once exchanged, and original text one point P (i) of disappearance, ciphertext increases One point C (i), after end to be encrypted, original text all disappears, and ciphertext produces simultaneously.
In the present embodiment, scrambling encryption is carried out to original text, upsets the position of pixel, generation scramble ciphertext C={ C (0), C (1),…,C(262143)};
Step 201) calculates the average pixel value of original text all pixels, i.e.,
G=mean (P)=112.446754455566,
Step 202) quantifies to array X, quantifies shown in equation such as formula (3), caused scrambling sequence is K1= {253784,70961,…,262143};
Step 203) from front to back, i.e., terminates since i=0 to i=262143, exchanges P (i) and P (K1(i) number) Value, with first point, namely P (0), exemplified by, ciphering process is:
The ciphertext ultimately generated is C={ 75,146 ..., 38 }, as shown in Figure 5.
Invention introduces the generation process that the related parameter g of original text upsets Scrambling Matrix, so that encrypting different originals The Scrambling Matrix that system generates when literary changes, the ability of lifting system resistance chosen -plain attact and known plain text attack.
In step 3), using the second~tri- group of chaos state variable, i.e. array Y and array Z, scramble ciphertext is diffused Encryption, generates final ciphertext, including procedure below:
301) array Y and array Z are quantified, produces diffusion mask K2And K3, quantifying equation is:
Wherein, L is the grey level of image to be encrypted;
302) from front to back, i.e., terminate since i=0 to i=M × N-1, scramble ciphertext C (i) is diffused added successively Close, diffusion equation is:
Wherein,Bit-level step-by-step XOR is represented, D (- 1)=123 is set, for encrypting first pixel.
In the present embodiment, encryption is diffused to scramble ciphertext C, and generates final ciphertext D={ D (0), D (1) ..., D (262143)};
Step 301) is quantified with equation (4) to array Y and array Z, the mask needed for diffusion phase is produced, after quantization Caused array is K2={ 154,164 ..., 30 }, K3=82,71 ..., 152 };
Step 302) from front to back, i.e., terminates since i=0 to i=262143, and scramble ciphertext C (i) is added successively It is close, shown in diffusion equation such as formula (5), with first point, namely exemplified by C (0):
The ciphertext ultimately generated is D={ 16,130 ..., 157 }, as shown in Figure 6.
Invention introduces the high intensity diffusion equation as shown in formula (5), the decryption complexity of the equation has been verified as 2n-2, very close 2nThe theoretical value of (n is the number of bits of pixel), the security of energy effective guarantee encryption system.
Required present invention additionally comprises step 4) according to Cipher Strength, 1) -3), carry out more wheel encryptions.In the present invention, encryption is strong Degree includes but is not limited to violence attacking ability, anti-known-plaintext/chosen -plain attact ability and resisting differential attacking ability.

Claims (6)

1. a kind of safe and efficient digital image encryption method, it is characterised in that comprise the following steps:
1) using the first~tri- group of required chaos state variable of three-dimensional Chen systems generation encryption;
2) scrambling encryption is carried out to original text using first group of chaos state variable, upsets the position of pixel, produce scramble ciphertext;
3) encryption is diffused to scramble ciphertext using the second~tri- group of chaos state variable, generates final ciphertext.
2. the safe and efficient digital image encryption method as described in claim 1, it is characterised in that:In step 1), Chen systems Equation of uniting is as follows:
<mrow> <mfenced open = "{" close = ""> <mtable> <mtr> <mtd> <mrow> <mfrac> <mrow> <mi>d</mi> <mi>x</mi> </mrow> <mrow> <mi>d</mi> <mi>t</mi> </mrow> </mfrac> <mo>=</mo> <mi>a</mi> <mrow> <mo>(</mo> <mi>y</mi> <mo>-</mo> <mi>x</mi> <mo>)</mo> </mrow> <mo>,</mo> </mrow> </mtd> </mtr> <mtr> <mtd> <mrow> <mfrac> <mrow> <mi>d</mi> <mi>y</mi> </mrow> <mrow> <mi>d</mi> <mi>t</mi> </mrow> </mfrac> <mo>=</mo> <mrow> <mo>(</mo> <mi>c</mi> <mo>-</mo> <mi>a</mi> <mo>)</mo> </mrow> <mi>x</mi> <mo>-</mo> <mi>x</mi> <mi>z</mi> <mo>+</mo> <mi>c</mi> <mi>y</mi> <mo>,</mo> </mrow> </mtd> </mtr> <mtr> <mtd> <mrow> <mfrac> <mrow> <mi>d</mi> <mi>z</mi> </mrow> <mrow> <mi>d</mi> <mi>t</mi> </mrow> </mfrac> <mo>=</mo> <mi>x</mi> <mi>y</mi> <mo>-</mo> <mi>b</mi> <mi>z</mi> </mrow> </mtd> </mtr> </mtable> </mfenced> <mo>-</mo> <mo>-</mo> <mo>-</mo> <mrow> <mo>(</mo> <mn>1</mn> <mo>)</mo> </mrow> </mrow>
Wherein, a, b, c are the first~tri- control parameter, and x, y, z is the first~tri- system variable;Work as a=35, b=3, c ∈ [20, When 28.4], system is in chaos state, the first~tri- system variable x inputted when the 3rd control parameter c and first iteration0、y0、 z0As system key, i.e. system key is (x0,y0,z0,c);
If image to be encrypted is P, its size is the length and width of M × N, M and N difference representative image;Three-dimensional Chen systems Chaos state variable needed for generation encryption includes procedure below:
101) 3 arrays are established, are designated as X, Y and Z respectively, array length is M × N, and its element is set to X (i), Y (i) and Z (i) (0≤i≤M × N-1), for storing the numerical value of x, y and z caused by chaos system iteration;
102) input system key (x0,y0,z0, c), iteration Chen systems are formula (1) N0It is secondary, make system well into chaos shape State;
103) continue iterative chaotic system M × n times, and x caused by iteration, y and z value be respectively put into array X, Y and Z, As the first~tri- group of chaos state variable.
3. the safe and efficient digital image encryption method as described in claim 2, it is characterised in that:N0For constant, N0≥300。
4. the safe and efficient digital image encryption method as described in claim 1, it is characterised in that:In step 2), is utilized One group of chaos state variable, i.e. array X, scrambling encryption is carried out to original text, upsets the position of pixel, scramble ciphertext is produced, puts Original text and scramble ciphertext are regarded as one-dimensional sequence during unrest, P={ P (0), P (1) ..., P (M × N-1) }, C is respectively adopted =C (0), C (1) ..., and C (M × N-1) } represent original text and the pixel of scramble ciphertext;
201) average pixel value of original text all pixels is calculated, i.e.,
G=mean (P), (2)
For wherein mean functions to take mean value function, g is the average value of original text pixel;
202) array X is quantified, produces scrambling sequence, quantifying equation is:
K1(i)=i+mod [(abs (X (i))-floor (abs (X (i)))) × g × 1015,MN-i)](0≤i≤M×N-1)(3)
Wherein, abs (x) is the function that takes absolute value, and floor (x) returns to the nearest integer less than or equal to x, and mod (x, y) is Take the remainder function;
203) from front to back, i.e., terminate since i=0 to i=M × N-1, exchange P (i) and P (K1(i) numerical value), and exchange P (i) afterwards is entered as C (i), i.e.,:
<mrow> <mtable> <mtr> <mtd> <mrow> <mi>t</mi> <mi>e</mi> <mi>m</mi> <mi>p</mi> <mo>=</mo> <mi>P</mi> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> </mrow> </mtd> </mtr> <mtr> <mtd> <mrow> <mi>C</mi> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <mo>=</mo> <mi>P</mi> <mrow> <mo>(</mo> <msub> <mi>K</mi> <mn>1</mn> </msub> <mo>(</mo> <mi>i</mi> <mo>)</mo> <mo>)</mo> </mrow> </mrow> </mtd> </mtr> <mtr> <mtd> <mrow> <mi>P</mi> <mrow> <mo>(</mo> <msub> <mi>K</mi> <mn>1</mn> </msub> <mo>(</mo> <mi>i</mi> <mo>)</mo> <mo>)</mo> </mrow> <mo>=</mo> <mi>t</mi> <mi>e</mi> <mi>m</mi> <mi>p</mi> </mrow> </mtd> </mtr> </mtable> <mo>,</mo> </mrow>
Wherein, temp is the temporary variable set, is often once exchanged, and original text one point P (i) of disappearance, ciphertext increases by one Point C (i), after end to be encrypted, original text all disappears, and ciphertext produces simultaneously.
5. the safe and efficient digital image encryption method as described in claim 1, it is characterised in that:In step 3), is utilized Two~tri- groups of chaos state variables, i.e. array Y and array Z, encryption is diffused to scramble ciphertext, generates final ciphertext, wrapped Include procedure below:
301) array Y and array Z are quantified, produces diffusion mask K2And K3, quantifying equation is:
<mrow> <mtable> <mtr> <mtd> <mrow> <msub> <mi>K</mi> <mn>2</mn> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <mo>=</mo> <mi>mod</mi> <mo>&amp;lsqb;</mo> <mrow> <mo>(</mo> <mi>a</mi> <mi>b</mi> <mi>s</mi> <mo>(</mo> <mrow> <mi>Y</mi> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> </mrow> <mo>)</mo> <mo>-</mo> <mi>l</mi> <mi>f</mi> <mi>o</mi> <mi>o</mi> <mi>s</mi> <mo>(</mo> <mrow> <mi>a</mi> <mi>b</mi> <mi>s</mi> <mrow> <mo>(</mo> <mrow> <mi>Y</mi> <mrow> <mo>(</mo> <mi>u</mi> <mo>)</mo> </mrow> </mrow> <mo>)</mo> </mrow> </mrow> <mo>)</mo> <mo>)</mo> </mrow> <mo>&amp;times;</mo> <msup> <mn>10</mn> <mn>15</mn> </msup> <mo>,</mo> <mi>L</mi> <mo>)</mo> <mo>&amp;rsqb;</mo> <mrow> <mo>(</mo> <mn>0</mn> <mo>&amp;le;</mo> <mi>i</mi> <mo>&amp;le;</mo> <mi>M</mi> <mo>&amp;times;</mo> <mi>N</mi> <mo>-</mo> <mn>1</mn> <mo>)</mo> </mrow> </mrow> </mtd> </mtr> <mtr> <mtd> <mrow> <msub> <mi>K</mi> <mn>3</mn> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <mo>=</mo> <mi>mod</mi> <mo>&amp;lsqb;</mo> <mrow> <mo>(</mo> <mi>a</mi> <mi>b</mi> <mi>s</mi> <mo>(</mo> <mi>Z</mi> <mo>(</mo> <mi>i</mi> <mo>)</mo> <mo>)</mo> </mrow> <mo>-</mo> <mi>f</mi> <mi>l</mi> <mi>o</mi> <mi>o</mi> <mi>r</mi> <mo>(</mo> <mrow> <mi>a</mi> <mi>b</mi> <mi>s</mi> <mrow> <mo>(</mo> <mrow> <mi>Z</mi> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> </mrow> <mo>)</mo> </mrow> </mrow> <mo>)</mo> <mo>)</mo> <mo>&amp;times;</mo> <msup> <mn>10</mn> <mn>15</mn> </msup> <mo>,</mo> <mi>L</mi> <mo>&amp;rsqb;</mo> <mrow> <mo>(</mo> <mn>0</mn> <mo>&amp;le;</mo> <mi>i</mi> <mo>&amp;le;</mo> <mi>M</mi> <mo>&amp;times;</mo> <mi>N</mi> <mo>-</mo> <mn>1</mn> <mo>)</mo> </mrow> </mrow> </mtd> </mtr> </mtable> <mo>,</mo> <mo>-</mo> <mo>-</mo> <mo>-</mo> <mrow> <mo>(</mo> <mn>4</mn> <mo>)</mo> </mrow> </mrow>
Wherein, L is the grey level of image to be encrypted;
302) from front to back, i.e., terminate since i=0 to i=M × N-1, be diffused encryption to scramble ciphertext C (i) successively, Diffusion equation is:
<mrow> <mi>D</mi> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <mo>=</mo> <mi>mod</mi> <mo>&amp;lsqb;</mo> <msub> <mi>K</mi> <mn>2</mn> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <mo>+</mo> <msub> <mi>K</mi> <mn>3</mn> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <mo>,</mo> <mi>L</mi> <mo>&amp;rsqb;</mo> <mo>&amp;CirclePlus;</mo> <mi>mod</mi> <mo>&amp;lsqb;</mo> <msub> <mi>K</mi> <mn>2</mn> </msub> <mrow> <mo>(</mo> <mi>i</mi> <mo>)</mo> </mrow> <mo>+</mo> <mrow> <mo>(</mo> <msub> <mi>K</mi> <mn>3</mn> </msub> <mo>(</mo> <mi>i</mi> <mo>)</mo> <mo>&amp;CirclePlus;</mo> <mi>C</mi> <mo>(</mo> <mi>i</mi> <mo>)</mo> <mo>&amp;CirclePlus;</mo> <mi>D</mi> <mo>(</mo> <mrow> <mi>i</mi> <mo>-</mo> <mn>1</mn> </mrow> <mo>)</mo> <mo>)</mo> </mrow> <mo>,</mo> <mi>L</mi> <mo>&amp;rsqb;</mo> <mo>,</mo> <mo>-</mo> <mo>-</mo> <mo>-</mo> <mrow> <mo>(</mo> <mn>5</mn> <mo>)</mo> </mrow> </mrow>
Wherein,Bit-level step-by-step XOR is represented, it is constant to set D (- 1)=seed, for encrypting first pixel.
6. the safe and efficient digital image encryption method as described in claim 1, it is characterised in that also including step 4) basis Demand for security, repeat step 1) -3), carry out more wheel encryptions.
CN201710807215.8A 2017-09-08 2017-09-08 A kind of safe and efficient digital image encryption method Withdrawn CN107563950A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710807215.8A CN107563950A (en) 2017-09-08 2017-09-08 A kind of safe and efficient digital image encryption method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710807215.8A CN107563950A (en) 2017-09-08 2017-09-08 A kind of safe and efficient digital image encryption method

Publications (1)

Publication Number Publication Date
CN107563950A true CN107563950A (en) 2018-01-09

Family

ID=60980032

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710807215.8A Withdrawn CN107563950A (en) 2017-09-08 2017-09-08 A kind of safe and efficient digital image encryption method

Country Status (1)

Country Link
CN (1) CN107563950A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108229194A (en) * 2018-01-18 2018-06-29 东北大学 Method for Digital Image Scrambling based on multithreading model and multistage scramble
CN111310215A (en) * 2020-02-26 2020-06-19 海南大学 Multilayer digital veil design method for image content safety and privacy protection

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104851071A (en) * 2015-05-21 2015-08-19 东北大学 Digital image encryption method based on three-dimensional chaotic system
US20160105276A1 (en) * 2014-10-10 2016-04-14 Qualcomm Incorporated Rotation-based cipher

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160105276A1 (en) * 2014-10-10 2016-04-14 Qualcomm Incorporated Rotation-based cipher
CN104851071A (en) * 2015-05-21 2015-08-19 东北大学 Digital image encryption method based on three-dimensional chaotic system

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
JUN-XIN CHEN 等: "An image encryption scheme using nonlinear inter-pixel", 《COMMUN NONLINEAR SCI NUMER SIMULAT》 *
JUN-XIN CHEN等: "Optical image encryption scheme using 3-D chaotic map based joint image scrambling and random encoding in gyrator domains", 《OPTICS COMMUNICATIONS》 *
邓晓衡 等: "像素位置与比特双重置乱的图像混沌加密算法", 《通信学报》 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108229194A (en) * 2018-01-18 2018-06-29 东北大学 Method for Digital Image Scrambling based on multithreading model and multistage scramble
CN111310215A (en) * 2020-02-26 2020-06-19 海南大学 Multilayer digital veil design method for image content safety and privacy protection
CN111310215B (en) * 2020-02-26 2020-12-11 海南大学 Multilayer digital veil design method for image content safety and privacy protection
WO2021169436A1 (en) * 2020-02-26 2021-09-02 海南大学 Multi-layer digital veil design method for image content security and privacy protection

Similar Documents

Publication Publication Date Title
Huang et al. On symmetric color image encryption system with permutation-diffusion simultaneous operation
Zhou et al. Image encryption algorithm with circle index table scrambling and partition diffusion
Ye et al. A secure image encryption algorithm based on chaotic maps and SHA‐3
Pisarchik et al. Image encryption with chaotically coupled chaotic maps
Ye et al. An efficient chaotic image encryption algorithm based on a generalized Arnold map
Chen et al. Cryptanalysis and improvement in an image encryption scheme using combination of the 1D chaotic map
Chen et al. Projective synchronization with different scale factors in a driven–response complex network and its application in image encryption
Li et al. A novel plaintext-related chaotic image encryption scheme with no additional plaintext information
CN108898025A (en) New chaotic image encryption method based on dual scramble and DNA encoding
Kumar et al. IEHC: An efficient image encryption technique using hybrid chaotic map
Seyedzade et al. A novel image encryption algorithm based on hash function
Mandal et al. Symmetric key image encryption using chaotic Rossler system
CN106997606B (en) A kind of image encryption method based on hyperchaotic system Projective Synchronization
Li et al. Color image encryption based on joint permutation and diffusion
CN106339976A (en) Encryption method
CN101739695A (en) Three-dimensional Arnold mapping-based image grouping encryption method
CN109102452A (en) A kind of image encryption method based on Latin square scramble and directional diffusion
CN107094072A (en) A kind of mixed chaos encryption method based on general Henon Map
Yang et al. Image encryption using the chaotic Josephus matrix
CN107292802A (en) A kind of parallel image encryption method of quantum chaos
CN107392970A (en) A kind of digital image encryption algorithm based on bit plane and high-dimension chaotic system
Kanwal et al. Analytic study of a novel color image encryption method based on the chaos system and color codes
Huang et al. Chaotic image encryption algorithm based on circulant operation
Luo et al. A self-adapting image encryption algorithm based on spatiotemporal chaos and ergodic matrix
Ye A novel image encryption scheme based on generalized multi-sawtooth maps

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20180109