CN110602346A - Lossless color image encryption method based on hyperchaotic system - Google Patents
Lossless color image encryption method based on hyperchaotic system Download PDFInfo
- Publication number
- CN110602346A CN110602346A CN201910684228.XA CN201910684228A CN110602346A CN 110602346 A CN110602346 A CN 110602346A CN 201910684228 A CN201910684228 A CN 201910684228A CN 110602346 A CN110602346 A CN 110602346A
- Authority
- CN
- China
- Prior art keywords
- sequence
- color image
- encrypted
- primary
- image
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 34
- 230000000739 chaotic effect Effects 0.000 claims abstract description 37
- 239000011159 matrix material Substances 0.000 claims abstract description 31
- 238000013528 artificial neural network Methods 0.000 claims abstract description 17
- 230000009466 transformation Effects 0.000 claims abstract description 7
- 230000001052 transient effect Effects 0.000 claims abstract description 7
- 238000012549 training Methods 0.000 claims abstract description 5
- 238000013507 mapping Methods 0.000 claims description 7
- 238000004364 calculation method Methods 0.000 claims description 6
- 230000008569 process Effects 0.000 claims description 5
- 239000003086 colorant Substances 0.000 claims description 4
- 238000013461 design Methods 0.000 claims description 4
- 125000004122 cyclic group Chemical group 0.000 claims description 3
- 238000003780 insertion Methods 0.000 claims description 3
- 230000037431 insertion Effects 0.000 claims description 3
- 239000000126 substance Substances 0.000 claims description 3
- 238000006467 substitution reaction Methods 0.000 claims description 3
- 238000004422 calculation algorithm Methods 0.000 abstract description 12
- 230000000875 corresponding effect Effects 0.000 description 11
- 230000006870 function Effects 0.000 description 8
- 210000002569 neuron Anatomy 0.000 description 6
- 230000006835 compression Effects 0.000 description 2
- 238000007906 compression Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 238000009792 diffusion process Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 230000002411 adverse Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000005291 chaos (dynamical) Methods 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 230000002596 correlated effect Effects 0.000 description 1
- 238000005336 cracking Methods 0.000 description 1
- 238000000354 decomposition reaction Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 230000005284 excitation Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 238000010587 phase diagram Methods 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 238000012163 sequencing technique Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/001—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32144—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
- H04N1/32149—Methods relating to embedding, encoding, decoding, detection or retrieval operations
- H04N1/32267—Methods relating to embedding, encoding, decoding, detection or retrieval operations combined with processing of the image
- H04N1/32272—Encryption or ciphering
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/44—Secrecy systems
- H04N1/448—Rendering the image unintelligible, e.g. scrambling
- H04N1/4486—Rendering the image unintelligible, e.g. scrambling using digital data encryption
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Multimedia (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Image Analysis (AREA)
- Compression Of Band Width Or Redundancy In Fax (AREA)
Abstract
The invention discloses a lossless color image encryption method based on a hyperchaotic system, which comprises the following steps: separating a color image to be encrypted into three primary color component matrixes; obtaining an original chaotic sequence by the three-primary-color component matrix through a hyperchaotic system; training the original chaotic sequence by using a BP neural network, and outputting a new chaotic sequence; eliminating the transient effect by combining the new chaotic sequence and encrypting; converting the image encrypted in the step (4) into a frequency domain space through two-dimensional discrete wavelet transform to obtain a corresponding sub-band; scrambling and encrypting the sub-bands of the frequency domain space; performing two-dimensional discrete wavelet inverse transformation on the scrambled and encrypted sub-band to convert the scrambled and encrypted sub-band into a space domain to obtain a three-primary-color ciphertext image; and combining the three-primary-color ciphertext images to obtain the encrypted color image. The method effectively improves the safety of the image encryption algorithm, and can effectively resist the attack means which is difficult to resist at present, such as plaintext attack.
Description
Technical Field
The invention relates to a color image encryption technology, in particular to a lossless color image encryption method based on a novel hyper-chaotic system.
Background
To solve the security problem in digital image transmission, many scholars are continuously improving on encryption algorithms. Because digital images are stored in a two-dimensional array form, the traditional DES, AES and RSA cannot meet the current encryption requirements. Based on the Edward Lorenz, the chaos theory is applied to a computer system for the first time in 1963 and is widely applied, the method for obtaining the encrypted image based on Shannon scrambling and diffusion rules is increasingly applied to systems such as secret communication and image encryption, but with the continuous improvement of computer capacity, the previously proposed low-dimensional chaos system cannot meet the requirement of the current cryptography and the safety of the low-dimensional chaos system is reduced continuously. Therefore, the learners propose two-dimensional and even higher-dimensional chaotic systems, but the effect on resisting chosen plaintext attack is still not ideal, so that more and more novel encryption algorithms combining various encryption algorithms are proposed successively at present.
The space domain encryption and the frequency domain encryption are used as two current main image encryption modes and have the characteristics respectively. The spatial domain encryption is based on the traditional idea of changing pixel positions to perform scrambling and diffusion. To break the correlation between the pixels of the image, spatial encryption algorithms usually act directly on the pixels of the image, but the resulting encrypted image is not compressible and at the same time very sensitive to errors. Based on this, the researchers at home and abroad are moving the research direction to the frequency domain encryption method. The main method of frequency domain encryption comprises the steps of converting an image into a frequency domain by utilizing discrete Cosine transform (DWT), Fourier Transform (FT), Discrete Wavelet Transform (DWT), discrete Wavelet transform (transform) and the like, scrambling and encrypting the obtained frequency domain sub-bands by utilizing a generated chaotic random sequence to obtain a final ciphertext image. By combining the two types of encryption algorithms, the security of the whole algorithm is effectively improved, and simultaneously, lossless decrypted images can be obtained, so that the method has higher value in the fields with real-time performance such as medical treatment, military affairs and the like.
Disclosure of Invention
The invention provides a novel hyper-chaotic system aiming at the defects of small phase space and easy cracking of the traditional Qi chaotic system, and provides a lossless color image encryption method on the basis of the novel hyper-chaotic system so as to further improve the safety of a color image encryption algorithm.
In order to realize the task, the invention adopts the following technical scheme:
a lossless color image encryption method based on a hyperchaotic system comprises the following steps:
step 1, separating a color image to be encrypted into three primary color component matrixes;
step 2, obtaining an original chaotic sequence by the three-primary-color component matrix through a hyperchaotic system;
step 3, training the original chaotic sequence by using a BP neural network, and outputting a new chaotic sequence;
step 4, eliminating the transient effect by combining the new chaotic sequence and encrypting;
step 5, converting the image encrypted in the step 4 into a frequency domain space through two-dimensional discrete wavelet transform to obtain a corresponding sub-band;
step 6, scrambling and encrypting the sub-bands of the frequency domain space;
step 7, performing two-dimensional discrete wavelet inverse transformation on the scrambled and encrypted sub-band to convert the scrambled and encrypted sub-band into a space domain to obtain a three-primary-color ciphertext image; and combining the three-primary-color ciphertext images to obtain the encrypted color image.
Further, the separating the color image to be encrypted into three primary color component matrices includes:
setting a plaintext color image I to be encrypted0Size M × N, I0R, G, B, three primary colors are separated to obtain three component matrixes PR, PG and PB with the size of M multiplied by N.
Further, the obtaining of the original chaotic sequence by the three-primary-color component matrix through the hyperchaotic system includes:
the hyperchaotic system is expressed as follows:
in the above formula, x1,x2x3,x4Each of which represents an initial value of the signal,each represents x1,x2x3,x4The result of the iteration of (1), parameter a 50,b=10,c=13,d=5,e=12;
set the initial value x of the system1,x2x3,x4All 1, the cycle number len, the four-order Runge Kutta formula is utilized to solve the hyperchaotic system, and the obtained iteration result isSubstituting the obtained iteration result into the following formula to calculate the variable r:
after the variable r is obtained by calculation, the variable at the next iteration is selected according to the following rule:
when r is equal to 0, willAs variable x at the next iteration1,x2x3,x4;
When r is 1, willAs variable x at the next iteration1,x2x3,x4;
When r is 2, willAs variable x at the next iteration1,x2x3,x4;
When r is 3, willAs variable x at the next iteration1,x2x3,x4。
Substituting the determined variables into the system for the next iteration, iterating len times according to the same method, and recording the last iteration result as a sequence D0I.e. the original chaotic sequence.
Further, the loss function of the BP neural network is:
wherein the content of the first and second substances,representing the correlation, p, of the actual output sequenceYIndicating the correlation of the desired output sequence.
Further, the eliminating the transient effect by combining the new chaotic sequence and encrypting comprises:
step 4.1, calculating control parameters t of the three component matrixes PR, PG and PB, and respectively recording the control parameters t as t1,t2,t3(ii) a In sequence from t1,t2,t3Beginning to intercept chaotic sequence D1To obtain a new 256-bit sequence Dr,Dg,Db(ii) a The calculation method of the control parameter t comprises the following steps:
for an image with a pixel size of M × N, assuming that S is the sum of pixel values and avg is the average value of pixels, the method for calculating the control parameter t is as follows:
t=M×N+mod(avg×1012,8×(M+N))
step 4.2, respectively using Dr,Dg,DbDesigning a corresponding S box, and encrypting each primary color image by using the S box to obtain an encrypted image R1,G1,B1。
Further, the technical design method of the S-box comprises the following steps:
creating a 256-length empty array Seq, circularly reading the numerical value of the new sequence and simultaneously inserting the numerical value into the Seq corresponding to the index value; if the inserting position is empty, inserting operation is carried out; if the inserted position has elements, the empty position of the Seq is inquired backwards, and the insertion operation is carried out after the empty position is inquired;
after each value of the new sequence is inserted into Seq, the inserted index values are combined into a new sequence, and the new sequence is then converted into a 16 x 16S-box.
Further, the encrypting each primary color image by using the S-box includes:
firstly, carrying out XOR operation on the component matrix and the target key to obtain a state matrix, and then carrying out two rounds of circular encryption, wherein each round of encryption process is as follows:
(1) byte substitution: mapping the element value in the state matrix into a new byte, wherein the specific mapping rule is as follows: the high 4 bits of each element byte are used as row coordinates, and the low 4 bits are used as column coordinates, so that the value corresponding to the S box is inquired for replacement;
(2) line shifting: performing left cyclic shift operation on the state matrix;
(3) mixing: matrix multiplication is carried out on a group of fixed matrixes and a state matrix;
(4) carrying out round dense phase addition: and carrying out bitwise exclusive-or operation of the matrix on the state matrix and the target key.
On the basis of providing a novel hyper-chaotic system, the invention simultaneously combines a BP neural network, designs a loss function suitable for the algorithm to carry out secondary scrambling on the chaotic sequence obtained by the hyper-chaotic system, and carries out first round encryption on a plaintext image by combining the chaotic sequence obtained based on the secondary scrambling with an encryption algorithm redesigned from an S box. Meanwhile, aiming at the problem that the current ciphertext image can not be compressed, the image is converted into a frequency domain for encryption by combining two-dimensional discrete wavelet transform, and the final encrypted image is obtained through inverse transformation, so that the safety of an image encryption algorithm is effectively improved, and the attack means which is difficult to resist at present, such as plaintext attack selection, can be effectively resisted.
Drawings
FIG. 1 is a schematic flow diagram of the process of the present invention;
FIG. 2 is a three-dimensional phase diagram of the novel hyper-chaotic system provided by the invention;
FIG. 3 is a Lyapunov index graph of a hyper-chaotic system along with time t;
FIG. 4 is a diagram of a BP neural network architecture;
FIG. 5 is a schematic flow chart of the encryption of each primary color image;
fig. 6 (a) shows a color image to be encrypted, (b) shows an encrypted image, and (c) shows a decrypted image.
Detailed Description
The invention provides a lossless color image encryption method based on a hyperchaotic system, which comprises the steps of firstly separating a color image into R, G, B three layers, further randomizing the chaotic sequence generated by the novel hyperchaotic system through a neural network, and then scrambling and diffusing the image; then, converting a round of encrypted images into a frequency domain through DWT, and scrambling each sub-band by combining with a chaos sequence generated before; and finally, the IDWT is utilized to reversely convert the sub-band data into a space domain to obtain a ciphertext image. The method comprises the following specific steps:
step 1, separating a color image to be encrypted into three primary color component matrixes
Setting a plaintext color image I to be encrypted0Size M × N, I0R, G, B, three primary colors are separated to obtain three component matrixes PR, PG and PB with the size of M multiplied by N.
Step 2, obtaining an original chaotic sequence by the three-primary-color component matrix through a hyperchaotic system
The scheme provides a novel hyperchaotic system which specifically comprises the following steps:
compared with the traditional chaotic system, the four-wing hyper-chaotic system has larger phase space and can provide larger encryption space, the scheme is improved on the traditional Qi chaotic system, and the improved hyper-chaotic system has the following expression:
in the above formula, x1,x2x3,x4Respectively represents the initial values of the four-wing chaotic attractor in four directions,respectively representx1,x2x3,x4The iteration result of (2). When the parameters a is 50, b is 10, c is 13, d is 5, e is 12, and f is 30, the Lyapunov indexes of the system are respectively: l is1=3.82,L2=1.62,L3=-15.21,L4-48.23, the system satisfies L1>L2>0>L3>L4Having hyperchaotic characteristics, as shown in fig. 2; meanwhile, the system can generate a real four-wing chaotic attractor as shown in figure 3.
In this embodiment, when the system parameter a is 50, b is 10, c is 13, d is 5, e is 12, and f is 30, the initial value x of the system is set1,x2x3,x4All 1, the cycle number len is 8 multiplied by 256, the four-order Runge Kutta formula is utilized to solve the hyperchaotic system, and the iteration result is obtainedSubstituting the obtained iteration result into the following formula to calculate the variable r:
in the above equation, mod () represents the remainder and floor represents the rounding down.
After the variable r is obtained by calculation, the variable at the next iteration is selected according to the following rule:
when r is equal to 0, willAs variable x at the next iteration1,x2x3,x4;
When r is 1, willAs variable x at the next iteration1,x2x3,x4;
When r is 2, willAs variable x at the next iteration1,x2x3,x4;
When r is 3, willAs variable x at the next iteration1,x2x3,x4。
Substituting the determined variables into the system for the next iteration, iterating len times according to the same method, and recording the last iteration result as a sequence D0I.e. the original chaotic sequence.
Step 3, training the original chaotic sequence by using the BP neural network
The BP neural network is the simplest neural network architecture and is composed of at least three connection layers, and feedforward full connection is realized through a plurality of neurons in each layer. The basic model of BP neural network mainly includes three parts of input layer, hidden layer and output layer, and through nonlinear mapping change between a large number of inputs and outputs, and according to forward and backward propagation through comparison loss function, the weight is continuously and automatically adjusted to minimize output error and output final result. The structure of the three-layer BP neural network is shown in figure 4.
Wherein the input layer is a sequence X ═ X1,x2,x3...xn) The output layer is likewise a sequence Y ═ Y (Y)1,y2,y3...ym) Each connection between layers has a weight W ═ W (W)1,w2,w3...wn) The excitation function herein employs a sigmoid function, which is defined as:
g(x)=1/(1+e-x)
the standard training mode of the BP neural network is:
in the formula, WkRepresents the weight of the kth neuron, W0=W0Expressed as initial weight assignment, h > 0 as learning step, E (W)k) Representing the error under the weight of the kth neuron,is E (W)k) At point WkOf the gradient of (c).
According to the scheme, a new loss function is designed according to the correlation of the generated chaotic sequence to train a neural network, and since the sequence is considered to be weakly correlated when the correlation of a group of sequences is between 0.2 and 0.4, the new loss function is designed:
wherein the content of the first and second substances,representing the correlation, p, of the actual output sequenceYExpressing the correlation of the expected output sequence, the calculation formula is as follows:
wherein, XiRepresenting the input of the ith neuron, YiRepresents the output of the ith neuron,which represents the average of all the inputs and,represents the average of all outputs, and n represents the number of neurons. Can be calculated by the above formulaAnd ρY。
In this step, the correlation ρ of the desired output sequence in the loss function is setYThe weights of the network are all initialized randomly 0.3. Will be originalChaotic sequence D0As the input of the neural network, a new chaotic sequence D is output after 10000 rounds of neural network iteration1。
Step 4, eliminating the transient effect by combining the new chaotic sequence and encrypting
For an image of pixel size M × N, let S be the sum of its pixel values and avg be its pixel average, then t is a control parameter closely related to the plaintext pixels, where:
t=M×N+mod(avg×1012,8×(M+N))
step 4.1, in the step, calculating the control parameter t of the three component matrixes PR, PG and PB obtained in the step 1 according to the above two formulas, and respectively recording the control parameter t as t1,t2,t3(ii) a In sequence from t1,t2,t3Beginning to intercept chaotic sequence D1In order to eliminate the adverse effect caused by transient effect, 256-bit new sequence D is obtainedr,Dg,Db. E.g. t1500, then represents D1256 bits are selected as a sequence D from the 501 th bitr。
Step 4.2, respectively using Dr,Dg,DbDesigning a corresponding S box, and encrypting each primary color image by using the S box to obtain an encrypted image R1,G1,B1。
In the scheme, in order to remove the elements which are repeated in the sequence for generating the S box and keep the randomness of the sequence, a novel S box design method is provided, and the method specifically comprises the following steps:
creating a null array Seq of length 256, reading cyclically said new sequence (D)rOr DgOr Db) The numerical value of (2) is simultaneously inserted into the Seq of the corresponding index value; if the inserting position is empty, inserting operation is carried out; if the inserted position has elements, the empty position of the Seq is inquired backwards, and the insertion operation is carried out after the empty position is inquired;
after each value of the new sequence is inserted into Seq, the inserted index values are combined into a new sequence, and the new sequence is then converted into a 16 x 16S-box.
After the S-boxes are designed, the encryption of each primary image is performed using the following algorithm, as shown in fig. 5:
firstly, carrying out XOR operation on a component matrix (PR or PG or PB) and a target key to obtain a state matrix, and then carrying out two rounds of cyclic encryption, wherein each round of encryption process is as follows:
(1) byte substitution: mapping the element value in the state matrix into a new byte, wherein the specific mapping rule is as follows: and the high 4 bits of each element byte are used as row coordinates, and the low 4 bits are used as column coordinates, so that the value corresponding to the S box is inquired for replacement.
(2) Line shifting: the state matrix is left cyclically shifted.
(3) Mixing: matrix multiplication is performed by using a set of fixed matrices and a state matrix, wherein the matrix multiplication is defined in binary operation based on GF (2^ 8).
(4) Carrying out round dense phase addition: and carrying out bitwise exclusive-or operation of the matrix on the state matrix and the target key.
Respectively carrying out the encryption process on the component matrixes PR, PG and PB of the primary colors to obtain an encrypted image R1,G1,B1。
Step 5, the image R encrypted in the step 4 is transformed by two-dimensional discrete wavelet1,G1,B1Converting to a frequency domain space to obtain a corresponding sub-band;
two-dimensional discrete wavelet transform is a frequency domain processing technology for decomposing and compressing signals, and has characteristics of multi-resolution, local time-frequency and frequency compression, so that the two-dimensional discrete wavelet transform is widely favored in the fields of picture coding, image processing, image compression and the like. The core working principle is as follows: firstly, for the input signal source LL0And performing wavelet decomposition on the obtained intermediate data according to rows and columns. To the input signal source LL0After one-level discrete wavelet transform, the signal source is divided into four sub-bands: low frequency sub-band (LL)1) And high frequency sub-bands(HL1、LH1、HH1). Such as: for the low frequency sub-band LL1The discrete wavelet transform is continuously executed to obtain four sub-bands LL2、HL2、LH2、HH2The result of n-level transformation can be obtained by continuously performing n times of similar operations on the low-frequency sub-band, and the reconstruction of the image can be realized by performing IDWT (inverse discrete wavelet transform) on the decomposed sub-band, so as to obtain the original image.
In this step, the first round encrypted image R is processed by the following formula1,G1,B1And performing two-dimensional discrete wavelet transform to respectively obtain four corresponding wavelet sub-bands.
In the above formula, dwt2(X, 'Haar') denotes performing a two-dimensional discrete wavelet transform on X; r, G, B are images R after the first round of encryption1,G1,B1,LL1、HL1、LH1、HH1Is R1And performing wavelet transformation on the corresponding four wavelet sub-bands.
Step 6, scrambling and encrypting the sub-band of the frequency domain space
Step 6.1, the chaos sequence D obtained in the step 4 is processedr,Dg,DbThe sequence T is converted into (0, M.times.N) by using the following formular,Tg,Tb:
In the above formula:
max(x)=max(x(k)|k=1,2,...ml×nl)
min(x)=min(x(k)|k=1,2,...,ml×nl)
x (k) (1, 2,3.. ml.. nl), representing the kth number of sequences; k represents the sequence position, 1 being the first of the sequence; m, N represents the image length and width; ml × nl indicates the mth of the sequence; round means rounded and randomly rounded, possibly rounded up and possibly rounded down; mod represents the remainder.
Step 6.2, respectively sequencing the sequences Tr,Tg,TbSequence T in order of arrival from childhoodr′,Tg′,Tb', will sequence Tr′,Tg′,Tb' adding the two sub-bands respectively with corresponding positions of the sub-bands to obtain scrambled and encrypted sub-bands:
step 7, performing two-dimensional discrete wavelet inverse transformation on the scrambled and encrypted sub-band to convert the scrambled and encrypted sub-band into a space domain to obtain a three-primary-color ciphertext image; and combining the three-primary-color ciphertext images to obtain the encrypted color image.
In the above equation, idwt2(Y, 'Haar') denotes that the two-dimensional inverse discrete wavelet transform is performed on the sub-band Y, and C1, C2, and C3 are three primary-color ciphertext images. As shown in fig. 6, the image after color image encryption and an example of restoration are shown.
Claims (7)
1. A lossless color image encryption method based on a hyperchaotic system is characterized by comprising the following steps:
step 1, separating a color image to be encrypted into three primary color component matrixes;
step 2, obtaining an original chaotic sequence by the three-primary-color component matrix through a hyperchaotic system;
step 3, training the original chaotic sequence by using a BP neural network, and outputting a new chaotic sequence;
step 4, eliminating the transient effect by combining the new chaotic sequence and encrypting;
step 5, converting the image encrypted in the step 4 into a frequency domain space through two-dimensional discrete wavelet transform to obtain a corresponding sub-band;
step 6, scrambling and encrypting the sub-bands of the frequency domain space;
step 7, performing two-dimensional discrete wavelet inverse transformation on the scrambled and encrypted sub-band to convert the scrambled and encrypted sub-band into a space domain to obtain a three-primary-color ciphertext image; and combining the three-primary-color ciphertext images to obtain the encrypted color image.
2. The lossless color image encryption method based on the hyperchaotic system as claimed in claim 1, wherein the separating the color image to be encrypted into three primary color component matrices comprises:
setting a plaintext color image I to be encrypted0Size M × N, I0R, G, B, three primary colors are separated to obtain three component matrixes PR, PG and PB with the size of M multiplied by N.
3. The lossless color image encryption method based on the hyperchaotic system as claimed in claim 1, wherein the obtaining of the original chaotic sequence by the three primary color component matrix through the hyperchaotic system comprises:
the hyperchaotic system is expressed as follows:
in the above formula, x1,x2 x3,x4Each of which represents an initial value of the signal,each represents x1,x2 x3,x4The iteration result of (1) is that the parameters a is 50, b is 10, c is 13, d is 5, and e is 12;
set the initial value x of the system1,x2 x3,x4All 1, the cycle number len, the four-order Runge Kutta formula is utilized to solve the hyperchaotic system, and the obtained iteration result isGenerating the obtained iteration resultThe variable r is calculated by the following formula:
after the variable r is obtained by calculation, the variable at the next iteration is selected according to the following rule:
when r is equal to 0, willAs variable x at the next iteration1,x2x3,x4;
When r is 1, willAs variable x at the next iteration1,x2x3,x4;
When r is 2, willAs variable x at the next iteration1,x2x3,x4;
When r is 3, willAs variable x at the next iteration1,x2x3,x4。
Substituting the determined variables into the system for the next iteration, iterating len times according to the same method, and recording the last iteration result as a sequence D0I.e. the original chaotic sequence.
4. The lossless color image encryption method based on the hyperchaotic system as claimed in claim 1, wherein the loss function of the BP neural network is:
wherein the content of the first and second substances,representing the correlation, p, of the actual output sequenceYIndicating the correlation of the desired output sequence.
5. The lossless color image encryption method based on the hyperchaotic system as claimed in claim 1, wherein said eliminating the transient effect and encrypting by combining the new chaotic sequence comprises:
step 4.1, calculating control parameters t of the three component matrixes PR, PG and PB, and respectively recording the control parameters t as t1,t2,t3(ii) a In sequence from t1,t2,t3Beginning to intercept chaotic sequence D1To obtain a new 256-bit sequence Dr,Dg,Db(ii) a The calculation method of the control parameter t comprises the following steps:
for an image with a pixel size of M × N, assuming that S is the sum of pixel values and avg is the average value of pixels, the method for calculating the control parameter t is as follows:
t=M×N+mod(avg×1012,8×(M+N))
step 4.2, respectively using Dr,Dg,DbDesigning a corresponding S box, and encrypting each primary color image by using the S box to obtain an encrypted image R1,G1,B1。
6. The lossless color image encryption method based on the hyperchaotic system as claimed in claim 5, wherein the technical design method of the S-box is as follows:
creating a 256-length empty array Seq, circularly reading the numerical value of the new sequence and simultaneously inserting the numerical value into the Seq corresponding to the index value; if the inserting position is empty, inserting operation is carried out; if the inserted position has elements, the empty position of the Seq is inquired backwards, and the insertion operation is carried out after the empty position is inquired;
after each value of the new sequence is inserted into Seq, the inserted index values are combined into a new sequence, and the new sequence is then converted into a 16 x 16S-box.
7. The lossless color image encryption method based on the hyperchaotic system as claimed in claim 5, wherein the encrypting each primary color image by using S-box comprises:
firstly, carrying out XOR operation on the component matrix and the target key to obtain a state matrix, and then carrying out two rounds of circular encryption, wherein each round of encryption process is as follows:
(1) byte substitution: mapping the element value in the state matrix into a new byte, wherein the specific mapping rule is as follows: the high 4 bits of each element byte are used as row coordinates, and the low 4 bits are used as column coordinates, so that the value corresponding to the S box is inquired for replacement;
(2) line shifting: performing left cyclic shift operation on the state matrix;
(3) mixing: matrix multiplication is carried out on a group of fixed matrixes and a state matrix;
(4) carrying out round dense phase addition: and carrying out bitwise exclusive-or operation of the matrix on the state matrix and the target key.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910684228.XA CN110602346B (en) | 2019-07-26 | 2019-07-26 | Lossless color image encryption method based on hyperchaotic system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910684228.XA CN110602346B (en) | 2019-07-26 | 2019-07-26 | Lossless color image encryption method based on hyperchaotic system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110602346A true CN110602346A (en) | 2019-12-20 |
CN110602346B CN110602346B (en) | 2021-08-24 |
Family
ID=68853209
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910684228.XA Expired - Fee Related CN110602346B (en) | 2019-07-26 | 2019-07-26 | Lossless color image encryption method based on hyperchaotic system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110602346B (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111611604A (en) * | 2020-05-15 | 2020-09-01 | 山东科技大学 | Encrypted image reversible information hiding method based on integer wavelet transformation |
CN111639351A (en) * | 2020-05-20 | 2020-09-08 | 燕山大学 | Battery tracing management coding encryption and decryption method based on self-encoder and Henon mapping |
CN111723386A (en) * | 2020-06-08 | 2020-09-29 | 大连大学 | Dynamic DNA color image encryption method based on SHA-512 |
CN111800251A (en) * | 2020-05-21 | 2020-10-20 | 北京邮电大学 | Image compressed sensing encryption and decryption method, device and system based on chaotic source |
CN114268423A (en) * | 2021-12-02 | 2022-04-01 | 电子科技大学 | MTCNN-based S box generation method |
CN116827519A (en) * | 2023-07-28 | 2023-09-29 | 常州大学 | Hyperchaotic memristor Chialvo neuron mapping encryption method and system |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103491279A (en) * | 2013-09-25 | 2014-01-01 | 上海理工大学 | 4-neighborhood exclusive or image encryption method based on hyper-chaos Lorenz system |
CN103489151A (en) * | 2013-09-11 | 2014-01-01 | 河南大学 | Color image encryption method based on chaos sequence and hyper-chaos system |
CN108898024A (en) * | 2018-06-04 | 2018-11-27 | 河南师范大学 | A kind of decryption method of the encrypted image based on hyperchaotic system and automated cell machine |
CN109918923A (en) * | 2019-01-25 | 2019-06-21 | 哈尔滨理工大学 | A kind of multichannel color image chaos encrypting method based on DNA encoding |
CN110046513A (en) * | 2019-04-11 | 2019-07-23 | 长安大学 | Plaintext associated images encryption method based on Hopfield chaotic neural network |
-
2019
- 2019-07-26 CN CN201910684228.XA patent/CN110602346B/en not_active Expired - Fee Related
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103489151A (en) * | 2013-09-11 | 2014-01-01 | 河南大学 | Color image encryption method based on chaos sequence and hyper-chaos system |
CN103491279A (en) * | 2013-09-25 | 2014-01-01 | 上海理工大学 | 4-neighborhood exclusive or image encryption method based on hyper-chaos Lorenz system |
CN108898024A (en) * | 2018-06-04 | 2018-11-27 | 河南师范大学 | A kind of decryption method of the encrypted image based on hyperchaotic system and automated cell machine |
CN109918923A (en) * | 2019-01-25 | 2019-06-21 | 哈尔滨理工大学 | A kind of multichannel color image chaos encrypting method based on DNA encoding |
CN110046513A (en) * | 2019-04-11 | 2019-07-23 | 长安大学 | Plaintext associated images encryption method based on Hopfield chaotic neural network |
Non-Patent Citations (2)
Title |
---|
CHANIL PAK 等: "A new color image encryption using combination of the 1D chaotic map", 《SIGNAL PROCESSING》 * |
战凯 等: "一个新四翼超混沌系统及其在图像加密中应用", 《计算机工程与应用》 * |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111611604A (en) * | 2020-05-15 | 2020-09-01 | 山东科技大学 | Encrypted image reversible information hiding method based on integer wavelet transformation |
CN111639351A (en) * | 2020-05-20 | 2020-09-08 | 燕山大学 | Battery tracing management coding encryption and decryption method based on self-encoder and Henon mapping |
CN111639351B (en) * | 2020-05-20 | 2022-03-15 | 燕山大学 | Battery tracing management coding encryption and decryption method based on self-encoder and Henon mapping |
CN111800251A (en) * | 2020-05-21 | 2020-10-20 | 北京邮电大学 | Image compressed sensing encryption and decryption method, device and system based on chaotic source |
CN111723386A (en) * | 2020-06-08 | 2020-09-29 | 大连大学 | Dynamic DNA color image encryption method based on SHA-512 |
CN111723386B (en) * | 2020-06-08 | 2023-09-26 | 大连大学 | SHA-512-based dynamic DNA color image encryption method |
CN114268423A (en) * | 2021-12-02 | 2022-04-01 | 电子科技大学 | MTCNN-based S box generation method |
CN114268423B (en) * | 2021-12-02 | 2023-04-07 | 电子科技大学 | MTCNN-based S box generation method |
CN116827519A (en) * | 2023-07-28 | 2023-09-29 | 常州大学 | Hyperchaotic memristor Chialvo neuron mapping encryption method and system |
CN116827519B (en) * | 2023-07-28 | 2024-05-28 | 常州大学 | Hyperchaos memristor Chialvo neuron mapping encryption method and system |
Also Published As
Publication number | Publication date |
---|---|
CN110602346B (en) | 2021-08-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110602346B (en) | Lossless color image encryption method based on hyperchaotic system | |
CN106600518B (en) | Compressed sensing based visual security and the image encryption of data safety, decryption method | |
CN111031193B (en) | Image encryption method based on three-dimensional composite scrambling model and chaos | |
CN109241755B (en) | Image encryption method based on three-dimensional scrambling model and chaos | |
Soleymani et al. | A chaotic cryptosystem for images based on Henon and Arnold cat map | |
CN108537716B (en) | Color image encryption embedding method based on discrete domain | |
CN107292184B (en) | Image encryption method, device and key stream generating method and key stream generator | |
CN107659751B (en) | Multi-image encryption method based on DNA coding and chaos | |
CN109660696B (en) | New image encryption method | |
CN106791872A (en) | Information concealing method based on SVD | |
Anbarasi et al. | Secured secret color image sharing with steganography | |
CN108898024B (en) | Encrypted image decryption method based on hyperchaotic system and automatic cell machine | |
CN110572252A (en) | image encryption and decryption method based on fractional order translation chaotic system | |
CN106600517A (en) | Multi-carrier secret image separate storage and reconstruction method based on EMD-3 | |
Gabr et al. | A combination of decimal-and bit-level secure multimedia transmission | |
CN112838922B (en) | DICOM image asymmetric encryption method based on chaotic mapping and selective Signcryption | |
CN113076551B (en) | Color image encryption method based on lifting scheme and cross-component scrambling | |
CN112152775A (en) | Image encryption method based on two-dimensional Henon-Chebyshev chaotic mapping and gene operation | |
CN114157771B (en) | Asymmetric reversible image hiding method based on compressed sensing | |
CN111737712B (en) | Color image encryption method based on three-dimensional dynamic integer tent mapping | |
CN113973161A (en) | Novel image encryption method of compressed sensing and chaotic system based on deep learning | |
Harkins et al. | Encryption schemes using finite frames and Hadamard arrays | |
CN110069901B (en) | Space domain multi-image encryption algorithm based on chaotic system | |
CN112887075A (en) | Encryption method of similar full-connection network image based on plaintext correlation | |
Vanamala et al. | Genetic algorithm and chaotic maps based visually meaningful image encryption |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20210824 |