CN108718232A - Image encryption method based on AES and chaos - Google Patents

Image encryption method based on AES and chaos Download PDF

Info

Publication number
CN108718232A
CN108718232A CN201810938159.6A CN201810938159A CN108718232A CN 108718232 A CN108718232 A CN 108718232A CN 201810938159 A CN201810938159 A CN 201810938159A CN 108718232 A CN108718232 A CN 108718232A
Authority
CN
China
Prior art keywords
chaos
aes
image
big integer
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810938159.6A
Other languages
Chinese (zh)
Other versions
CN108718232B (en
Inventor
张晓强
王雪松
程玉虎
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China University of Mining and Technology CUMT
Original Assignee
China University of Mining and Technology CUMT
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China University of Mining and Technology CUMT filed Critical China University of Mining and Technology CUMT
Priority to CN201810938159.6A priority Critical patent/CN108718232B/en
Publication of CN108718232A publication Critical patent/CN108718232A/en
Application granted granted Critical
Publication of CN108718232B publication Critical patent/CN108718232B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/001Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC

Abstract

One kind being based on high-level data encryption standard(Advanced Encryption Standard, AES)With the image encryption method of chaos, belong to information security field.Currently, how the fast development of multimedia communication technology, protect the safety of picture material to cause the common concern of industrial quarters and academia.The present invention proposes a kind of image encryption method based on AES and chaos.First, number is encrypted to reduce, sender converts multiple pixels to a big integer;Secondly, with AES and chaos encryption these big integers;Finally, encrypted image is constituted by encrypting big integer.Experiment shows:This method is safe efficient and cipher round results are good.

Description

Image encryption method based on AES and chaos
Technical field
The present invention relates to a kind of information encryptions, more particularly to a kind of image encryption method.
Background technology
In fields such as military system, E-Government, financial system and daily lifes, a large amount of figure can be all generated daily Picture.To protect these image information contents not to be stolen, image encryption technology causes the extensive concern of academia and industrial quarters. Researcher has proposed a variety of image encryption methods.However, these method some have been decrypted, some safeties are weak, some efficiency The problems such as low, it is difficult to satisfactory.
To improve safety and the efficiency of image encryption, ensures the safe and efficient transmission of image, encrypted in conjunction with high-level data Standard(Advanced Encryption Standard, AES)And chaology, devise a kind of figure based on AES and chaos As encryption method.This process employs AES high securities and the randomnesss and complexity of chaos, are effectively protected interaction The safety of image network transimission and storage.
Invention content
The purpose of the present invention:It is weak or the problems such as encryption efficiency is low for conventional images encryption method safety, it proposes a kind of Image encryption method based on AES and chaos.
Technical scheme of the present invention:For achieving the above object, the technical solution used is the figure based on AES and chaos As encryption method, it is Alice to enable sender, and the encrypting step of recipient Bob, Alice are as follows:
Step 1:Enable plaintext imageISize ism×n, obtained using hash algorithm SHA-256ICorresponding 256 cryptographic HashK=k 1,k 2, …, k i, …, k 32, whereink iIt is 8, enables Piecewise linear chaotic map(Piecewise Linear Chaotic Map, PLCM)Initial valuex 0And parameterq, the iteration mappingm×nIt is secondary, generate a chaos sequenceX={x i } mn
Step 2:Alice willXIt is converted into a new integer chaos sequenceY={y i } mn ;It, will according to element positionYBe converted to one Width size ism×nChaos imageC
Step 3:For gray image, pixel value is usually indicated with 8 binary systems;16 pixel values are merged into one Big integer;Thus can be from plaintext imageIObtain (m×nThe big integer in)/16b 1, b 2, …, b (m×n)/16};Similarly, may be used From chaos imageCObtain (m×nThe big integer of)/16 chaosr 1, r 2, …, r (m×n)/16};
Step 4:It enablesK 1For the encryption key of AES, big integer sequence in plain text is encrypted using AES and the big integer sequence of chaos Operation, can must encrypt big integerc 1, c 2, …, c (m×n)/16};
Step 5:Big integer will each be encryptedc i,i=1, 2, 3, …,(m×n)/16 are divided into 16 equal portions, and they are converted Pixel valuep i 1, p i 2, …, p i 16,};According to location of pixels, converting these pixel values to a width size ism×nPlus Close imageE
Further, in the step 1, PLCM equations are:
,(1).
Further, in the step 1, the initial value of PLCM is:x 0=(k 1k 2⊕…⊕k 16The parameter of)/255, PLCM For:q=(k 17k 18⊕…⊕k 32)/510。
Further, in the step 2, if the precision of computer is 10-16, Alice calculating
y i =mod(x i×1016, 256),(2)
Wherein,x iForX?iA element, it is all y iConstitute a new integer chaos sequenceY={y i } mn
Further, in the step 3, first big integer is:
b 1=I 1,1 I 1,2I 1,16(3)
Wherein,I 1,1 I 1,2I 1,16The binary representation of element value.
Further, in the step 4, cryptographic operation is:
c 1=AES e(K 1 b 1)⊕r 1,(4)
c i =b ic 1r i,i=2, 3, …, (m×n)/16,(5)
Wherein,AES e() is the encryption function of AES.
In decrypting process, using identical chaos sequence and corresponding AES decryption methods to encrypted imageEIt is solved It is close, original interactive graphic picture can be obtained.The decrypting process of Bob is the encrypted inverse process of Alice.
Advantageous effect:The present invention is directed to the disadvantages such as existing image encryption method safety is poor or encryption efficiency is low, proposes A kind of image encryption method based on AES and chaos.Main contributions have:(1)This process employs the high securities of AES, have Improve to effect the safety of encryption method;(2)This process employs the randomness of chaos and complexity, improve adding for image Close effect;(3)This method reduces encryption number, improves encryption efficiency using big integer as encrypted object.It is therefore proposed that Image encryption method has efficient, safety and the good feature of cipher round results, can be effectively protected interaction figure picture network transmission With the safety of storage.
Description of the drawings
Fig. 1:The encryption flow figure of image encryption method based on AES and chaos;
Fig. 2:The decryption flow chart of image encryption method based on AES and chaos;
Fig. 3:Original image;
Fig. 4:Chaos image;
Fig. 5:Encrypted image.
Specific implementation mode
The implementation process of the present invention is further described with reference to specific attached drawing and example.
Fig. 1 is the encryption flow figure of this method, and Fig. 2 is the decryption flow chart of this method.
For the programming software used for 2015 CI of MyEclipse, it is 512 × 512 to choose width size shown in Fig. 3 Lena images are as original interactive graphic picture.Using this method, Alice is described as follows the encrypted detailed process of interaction figure picture:
Step 1:Corresponding 256 cryptographic Hash of original image are obtained using hash algorithm SHA-256K= 9ae48c65bb78a5c6d0 d9496f9364f36efc2bd2f2a3f521763e16edc434977e9e(Hexadecimal table Show), calculation formula(1)Shown in PLCM chaotic maps initial valuex 0=0.447058823529412 and parameterq= 0.352941176470588, iterative formula(1)512 × 512 times, generate a chaos sequenceX={x i }262144
Step 2:Alice is according to formula(2)An integer chaos sequence is calculatedY={y i }262144;According to element position It sets, it willYBe converted to the chaos image that a width size is 512 × 512C, as shown in Figure 4.
Step 3:According to formula(3), 16 pixel values are merged into a big integer;To be obtained from plaintext image 4096 big integerb 1, b 2, …, b 4096};It similarly, also can be from chaos imageCObtain 4096 big integerr 1, r 2, …, r 4096}。
Step 4:Choose the encryption key of AESK 1=84AAC 12F54AB666ECFC2A83C676908C8BBC381 Behaviour is encrypted to big integer sequence in plain text using AES and the big integer sequence of chaos in B1F11EF5B2B433F3962493F52C Make, can must encrypt big integerc 1, c 2, …, c (m×n)/16};
Step 5:By encrypted big integerc i,i=1,2,3 ..., 4096 are divided into 16 equal portions, and convert them to pixel Valuep i 1, p i 2, …, p i 16};According to location of pixels, it converts these pixel values to the encryption that a width size is 512 × 512 Image,As shown in Figure 5.
In decrypting process, encrypted image is acted on using identical chaos sequence and corresponding AES decryption methods, can be obtained Decrypted image is the same as shown in Fig. 3.The decrypting process of Bob is the encrypted inverse process of Alice, and Fig. 2 is the decryption flow chart of this method.

Claims (7)

1. the image encryption method based on AES and chaos, which is characterized in that ciphering process includes the following steps:
Step 1:Enable plaintext imageISize ism×n, obtained using hash algorithm SHA-256ICorresponding 256 cryptographic HashK=k 1,k 2, …, k i, …, k 32, whereink iIt is 8, enables Piecewise linear chaotic map(Piecewise Linear Chaotic Map, PLCM)Initial valuex 0And parameterq, the iteration mappingm×nIt is secondary, generate a chaos sequenceX={x i } mn
Step 2:It willXIt is converted into a new integer chaos sequenceY={y i } mn ;It, will according to element positionYBe converted to a width size Form×nChaos imageC
Step 3:For gray image, pixel value is usually indicated with 8 binary systems;16 pixel values are merged into one Big integer;Thus can be from plaintext imageIObtain (m×nThe big integer in)/16b 1, b 2, …, b (m×n)/16};Similarly, may be used From chaos imageCObtain (m×nThe big integer of)/16 chaosr 1, r 2, …, r (m×n)/16};
Step 4:It enablesK 1For the encryption key of AES, big integer sequence in plain text is encrypted using AES and the big integer sequence of chaos Operation, can must encrypt big integerc 1, c 2, …, c (m×n)/16};
Step 5:Big integer will each be encryptedc i,i=1, 2, 3, …,(m×n)/16 are divided into 16 equal portions, and they are converted Pixel valuep i 1, p i 2, …, p i 16,};According to location of pixels, converting these pixel values to a width size ism×nPlus Close imageE
2. according to the method described in claim 1, it is characterized in that:In the step 1, PLCM equations are:
,(1).
3. according to the method described in claim 1, it is characterized in that:In the step 1, the initial value of PLCM is:x 0=(k 1k 2 ⊕…⊕k 16The parameter of)/255, PLCM is:q=(k 17k 18⊕…⊕k 32)/510。
4. according to the method described in claim 1, it is characterized in that:In the step 2, if the precision of computer is 10-16, Alice is calculated
y i =mod(x i×1016, 256),(2)
Wherein,x iForX?iA element, it is all y iConstitute a new integer chaos sequenceY={y i } mn
5. according to the method described in claim 1, it is characterized in that:In the step 3, first big integer is:
b 1=I 1,1 I 1,2I 1,16(3)
Wherein,I 1,1 I 1,2I 1,16The binary representation of element value.
6. according to the method described in claim 1, it is characterized in that:In the step 4, cryptographic operation is:
c 1=AES e(K 1 b 1)⊕r 1,(4)
c i =b ic 1r i,i=2, 3, …, (m×n)/16,(5)
Wherein,AES e() is the encryption function of AES.
7. the image encryption method based on AES and chaos, it is characterised in that:Decrypting process is encrypted inverse process;Using identical Chaos sequence and corresponding AES decryption methods to encrypted imageEOperation is decrypted, original interactive graphic picture can be obtained.
CN201810938159.6A 2018-08-17 2018-08-17 Image encryption method based on AES and chaos Active CN108718232B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810938159.6A CN108718232B (en) 2018-08-17 2018-08-17 Image encryption method based on AES and chaos

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810938159.6A CN108718232B (en) 2018-08-17 2018-08-17 Image encryption method based on AES and chaos

Publications (2)

Publication Number Publication Date
CN108718232A true CN108718232A (en) 2018-10-30
CN108718232B CN108718232B (en) 2021-03-26

Family

ID=63913877

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810938159.6A Active CN108718232B (en) 2018-08-17 2018-08-17 Image encryption method based on AES and chaos

Country Status (1)

Country Link
CN (1) CN108718232B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109660695A (en) * 2018-12-06 2019-04-19 广西师范大学 A kind of color image encrypting method based on Global Genetic Simulated Annealing Algorithm and chaotic maps
CN110086601A (en) * 2019-04-28 2019-08-02 郑州轻工业学院 Based on the associated Josephus traversing of pixel value and hyperchaotic system image encryption method
CN112953890A (en) * 2021-01-12 2021-06-11 国电南瑞南京控制系统有限公司 Information encryption method and device for client side energy utilization control system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1467514A1 (en) * 2003-04-07 2004-10-13 STMicroelectronics S.r.l. Encryption process employing modified chaotic maps and relative digital signature process
CN104868989A (en) * 2015-06-11 2015-08-26 湘潭大学 Encryption method for image data secure transmission
CN105450899A (en) * 2015-12-07 2016-03-30 中国矿业大学 Multi-image encryption method based on piecewise linear chaotic map (PWLCM)
CN106604040A (en) * 2016-12-12 2017-04-26 中国矿业大学 Multi-image encryption method based on mixed primitives and full permutation
CN108199824A (en) * 2018-01-18 2018-06-22 黑龙江大学 Video encryption method and video flowing method for safety monitoring based on AES-CTR and chaos algorithm

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1467514A1 (en) * 2003-04-07 2004-10-13 STMicroelectronics S.r.l. Encryption process employing modified chaotic maps and relative digital signature process
CN104868989A (en) * 2015-06-11 2015-08-26 湘潭大学 Encryption method for image data secure transmission
CN105450899A (en) * 2015-12-07 2016-03-30 中国矿业大学 Multi-image encryption method based on piecewise linear chaotic map (PWLCM)
CN106604040A (en) * 2016-12-12 2017-04-26 中国矿业大学 Multi-image encryption method based on mixed primitives and full permutation
CN108199824A (en) * 2018-01-18 2018-06-22 黑龙江大学 Video encryption method and video flowing method for safety monitoring based on AES-CTR and chaos algorithm

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
XIAOQIANG ZHANG ET AL.: "Digital Image Encryption Algorithm Based on Elliptic Curve Public Cryptosystem", 《2018 IEEE》 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109660695A (en) * 2018-12-06 2019-04-19 广西师范大学 A kind of color image encrypting method based on Global Genetic Simulated Annealing Algorithm and chaotic maps
CN109660695B (en) * 2018-12-06 2020-03-10 广西师范大学 Color image encryption method based on genetic simulated annealing algorithm and chaotic mapping
CN110086601A (en) * 2019-04-28 2019-08-02 郑州轻工业学院 Based on the associated Josephus traversing of pixel value and hyperchaotic system image encryption method
CN112953890A (en) * 2021-01-12 2021-06-11 国电南瑞南京控制系统有限公司 Information encryption method and device for client side energy utilization control system
CN112953890B (en) * 2021-01-12 2023-11-21 国电南瑞南京控制系统有限公司 Information encryption method and device for client side energy consumption control system

Also Published As

Publication number Publication date
CN108718232B (en) 2021-03-26

Similar Documents

Publication Publication Date Title
CN110235409B (en) Method for protected RSA signature or decryption using homomorphic encryption
CN107657579B (en) Image encryption method based on DNA coding and chaos
US6490353B1 (en) Data encrypting and decrypting apparatus and method
Ali et al. A novel color image encryption scheme based on a new dynamic compound chaotic map and S-box
CN109241755A (en) Image encryption method based on three-dimensional scramble model and chaos
Li Fingerprint-related chaotic image encryption scheme based on blockchain framework
CN105184115A (en) Method For Including An Implicit Integrity Or Authenticity Check Into A White-box Implementation
CN108718232A (en) Image encryption method based on AES and chaos
Abusukhon et al. Secure network communication based on text-to-image encryption
CN105095695A (en) Realizing authorization via incorrect functional behavior of a white-box implementation
EP3226164A1 (en) Watermarking input and output of a white-box implementation
Nazarkevych et al. Data protection based on encryption using Ateb-functions
Yahaya et al. Cryptosystem for secure data transmission using Advance Encryption Standard (AES) and Steganography
Ahmad et al. Distributed text-to-image encryption algorithm
CN105281893A (en) Method for introducing dependence of white-box implementation on a set of strings
US8130949B2 (en) Partially reversible key obfuscation
Karolin et al. Authentic secret share creation techniques using visual cryptography with public key encryption
Sharma et al. Multi-image steganography and authentication using crypto-stego techniques
CN109274856B (en) Asymmetrical image encryption method based on ECC and chaos
CN115765963A (en) Text image audit information recording and extracting method based on reversible steganography of ciphertext domain
Sarmah et al. Cryptography and digital image steganography techniques
Goudar et al. Secure data transmission using steganography based data hiding in TCP/IP
Dweik et al. A survey of lightweight image encryption for IoT
Ferdush et al. A new image encryption technique combining the idea of one time pad with RGB value
Acharya et al. Encryption and decryption of informative image by key image using modified Hill cipher technique based on non-invertible matrices

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant