CN111127292B - Multi-image encryption method based on stereo scrambling model and fractional Fourier transform - Google Patents

Multi-image encryption method based on stereo scrambling model and fractional Fourier transform Download PDF

Info

Publication number
CN111127292B
CN111127292B CN202010008577.2A CN202010008577A CN111127292B CN 111127292 B CN111127292 B CN 111127292B CN 202010008577 A CN202010008577 A CN 202010008577A CN 111127292 B CN111127292 B CN 111127292B
Authority
CN
China
Prior art keywords
scrambling
image
dimensional
rpm
frft
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010008577.2A
Other languages
Chinese (zh)
Other versions
CN111127292A (en
Inventor
张晓强
胡杨明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China University of Mining and Technology CUMT
Original Assignee
China University of Mining and Technology CUMT
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China University of Mining and Technology CUMT filed Critical China University of Mining and Technology CUMT
Priority to CN202010008577.2A priority Critical patent/CN111127292B/en
Publication of CN111127292A publication Critical patent/CN111127292A/en
Application granted granted Critical
Publication of CN111127292B publication Critical patent/CN111127292B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06TIMAGE DATA PROCESSING OR GENERATION, IN GENERAL
    • G06T1/00General purpose image data processing
    • G06T1/0021Image watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
  • Image Processing (AREA)

Abstract

A multi-image encryption method based on a stereo scrambling model and fractional Fourier transform (Fractional Fourier Transform, frFT) belongs to the field of information encryption. At present, the data volume of network information interaction is increased, and the requirements for batch transmission and storage of images are increased. In order to protect the safety of network transmission of a plurality of image contents, the invention provides a multi-image encryption method based on a three-dimensional scrambling model and a FRFT. Inspired by the scrambling and restoration of the three-dimensional magic cube, a plurality of images form an image cube structure, a three-dimensional row, column and layer scrambling mode is designed, and a three-dimensional scrambling model is established. Using the scrambling model pairkScrambling the original image, and performing FrFT transformation on the scrambled image set to generatekThe image is encrypted. Experiments show that: the method can encrypt a plurality of interactive images at the same time, and has good encryption effect, high safety and high efficiency.

Description

Multi-image encryption method based on stereo scrambling model and fractional Fourier transform
Technical Field
The present invention relates to information encryption technology, and more particularly, to a multi-image encryption method.
Background
In the big data age, huge image information is generated every day in various fields such as military systems, e-government affairs, financial systems, daily life and the like. In order to ensure that the information content is not stolen, image encryption technology has attracted a great deal of attention in scientific research and industry. As a new multimedia security technology, multi-image encryption has high-efficiency characteristics, and gradually attracts attention of researchers, and researchers have proposed a few multi-image encryption methods. Some of these methods have been broken, some have poor security, some have low efficiency, some have limited numbers of encrypted images, and the like, which are unsatisfactory.
Inspired by scrambling and restoration of a magic cube, a three-dimensional scrambling model is established by utilizing three-dimensional characteristics of multiple images and a hyperchaotic system. In order to improve the safety and efficiency of multi-image encryption and ensure the safe and efficient transmission of images, a multi-image encryption method is designed by utilizing the model and fractional Fourier transform (Fractional Fourier Transform, frFT). The method utilizes good scrambling effect and good nonlinearity and robustness of FrFT, and effectively protects the security of transmission and storage of a plurality of interactive image networks.
Disclosure of Invention
The purpose of the invention is that: aiming at the problems of weak security, low encryption efficiency and the like of the existing multi-image encryption method, the multi-image encryption method based on the three-dimensional scrambling model and the FrFT is provided.
The technical scheme of the invention is as follows: in order to achieve the aim of the invention, the technical scheme adopted is a multi-image encryption method based on a three-dimensional scrambling model and FrFT, wherein a sender is Alice, and a receiver is Bob; the encryption step of Alice is described in detail as follows:
step 1: image cube construction: let k original images respectively be I 1 1 ,I 1 2 ,…,I 1 k All of size m x n, which are superimposed into a k-layer image cube B 1 The size is m multiplied by n multiplied by k;
step 2: chaotic sequence generation: randomly selecting an initial value x of the five-dimensional hyper-chaotic system shown in formula (3) 1 ,x 2 ,x 3 ,x 4 ,x 5 The system is iterated m times and n times, five chaotic sequences X can be obtained 1 ={x 1 i } mn ,X 2 ={x 2 i } mn ,X 3 ={x 3 i } mn ,X 4 ={x 4 i } mn And X 5 ={x 5 i } mn
Step 3: full alignment results in: take X at will 3 Subsequence X of length m 1 3 For X 1 3 The elements are arranged in ascending order or descending order to obtain a new sequence X 2 3 By X 1 3 All elements in X 2 3 The position relation of the two parts can obtain a full array Q 1 The method comprises the steps of carrying out a first treatment on the surface of the Similarly, take X 4 Subsequence X of length n 1 4 Can obtain the full arrangement Q 2 The method comprises the steps of carrying out a first treatment on the surface of the Take X at will 5 Subsequence X of length k 1 5 Can obtain the full arrangement Q 3
Step 4: random phase mask (Random Phase Mask, RPM) generation: x is to be 1 ,X 2 Cut off sequentially according to the length n, and sequentially arranged into a matrix C with the size of m multiplied by n 1 ,C 2 And (3) calculating:
RPM 1 =e jp , (1)
RPM 2 =e jq (2) wherein p=2pi×c 1 ,q=2π×C 2 And j is an imaginary unit;
step 5: image stereo scrambling: by using the full arrangement Q 1 ,Q 2 And Q 3 In turn to B 1 Performing three-dimensional row scrambling, three-dimensional column scrambling and three-dimensional layer scrambling to obtain a final scrambling result B 2
Step 6: additional RPM and FrFT transforms: pair B 2 All layers I in (1) 2 1 ,I 2 2 ,…,I 2 k Additional RPM 1 I.e. I 3 i =I 2 i ×RPM 1 I=1, 2, …, k; randomly select gamma 12 ∈[-2,2]By gamma 1 Order FrFT, pair I 3 1 ,I 3 2 ,…,I 3 k The linear integration is carried out to obtain the result I 4 1 ,I 4 2 ,…,I 4 k The method comprises the steps of carrying out a first treatment on the surface of the Adding RPM thereto 2 I.e. I 5 i =I 4 i ×RPM 2 I=1, 2, …, k; using gamma 2 Order FrFT, pair I 5 1 ,I 5 2 ,…,I 5 k Linear integration is carried out to obtain k encrypted images which are respectively I 6 1 ,I 6 2 ,…,I 6 k
Further, in the step 1, the equation of the five-dimensional hyper-chaotic system is:
wherein a=10, b=8/3, c=28 and d= -6 are control parameters of the five-dimensional hyper-chaotic system, and X is the control parameter of the five-dimensional hyper-chaotic system 1 ,X 2 ,X 3 ,X 4 ,X 5 Is a variable of the five-dimensional hyper-chaotic system.
Further, in the step 5, the stereo row scrambling refers to: by Q 1 Scrambling B 1 The positions of all the row planes in (a); a schematic representation of the i (i=1, 2, …, m) th row plane is shown in fig. 1.
Further, in the step 5, the stereo column scrambling refers to: by Q 2 Scrambling B 1 The positions of all column planes in the column; a schematic representation of the j (j=1, 2, …, n) th column plane is shown in fig. 2.
Further, in the step 5, the stereo layer scrambling refers to: by Q 3 Scrambling B 1 The position of all layer planes in the middle; a schematic representation of the layer plane of the t (t=1, 2, …, k) th layer is shown in fig. 3.
Further, in the step 6, frFT is defined as:
wherein K is p (u, t) is a kernel function of FrFT, α=ppi/2, p+.2pi is the rotation angle.
In the decryption process, the same chaotic sequence is utilized to decrypt k encrypted images, so that k original interactive images can be recovered; bob's decryption process is the inverse of Alice's encryption.
The beneficial effects are that: aiming at the defects of poor safety, low encryption efficiency and the like of the existing multi-image encryption method, the invention provides a multi-image encryption method based on a three-dimensional scrambling model and FrFT; the main contributions are: (1) Inspired by scrambling and restoration of a magic cube, a three-dimensional scrambling model is established by utilizing three-dimensional characteristics of multiple images and a hyperchaotic system; (2) The multi-image encryption method based on the three-dimensional scrambling model and the FrFT is provided; (3) The method utilizes the good scrambling effect of the three-dimensional scrambling model, and effectively improves the security of the encryption method; (4) The method utilizes the nonlinearity and the robustness of the FrFT and improves the encryption effect of the image. Therefore, the proposed multi-image encryption method has the characteristics of high efficiency, safety and good encryption effect, and can effectively protect the security of transmission and storage of a plurality of interactive image networks.
Drawings
Fig. 1: a line plan view schematic;
fig. 2: a column plan view schematic;
fig. 3: a layer plan view schematic;
fig. 4: a multi-image encryption flow chart based on a stereo scrambling model and FrFT;
fig. 5: an original image set;
fig. 6: the image set is encrypted.
Detailed Description
The practice of the invention is described in further detail below with reference to the attached drawings and examples.
Fig. 4 is an encryption flow chart of the present method.
The programming software used was Matlab R2016a, and 9 images of size 512 x 512 shown in fig. 5 were selected as the original image set. With this method, alice's encryption process is detailed below.
Step 1: image cube construction: let 9 original images be I 1 1 ,I 1 2 ,…,I 1 9 The sizes of the original images are 512 multiplied by 512, and 9 original images are overlapped into a 9-layer image cube B 1 The size is 512×512×9.
Step 2: randomly selecting initial value x of five-dimensional hyper-chaotic system 1 =0.236542532712,x 2 =0.361425721124,x 3 =0.625121457935,x 4 = 0.152365227495 and x 5 = 0.812165374593; the system is iterated 262626144 times, 5 chaotic sequences X can be obtained 1 ={x 1 i } 262144 ,X 2 ={x 2 i } 262144 ,X 3 ={x 3 i } 262144 ,X 4 ={x 4 i } 262144 And X 5 ={x 5 i } 262144
Step 3: full alignment results in: take X at will 3 Subsequence X of length 512 1 3 For X 1 3 The elements are arranged in ascending order or descending order to obtain a new sequence X 2 3 By X 1 3 All elements in X 2 3 The position relation of the two parts can obtain a full array Q 1 The method comprises the steps of carrying out a first treatment on the surface of the Similarly, take X 4 Sub-sequence X with medium length of 512 1 4 Can obtain the full arrangement Q 2 The method comprises the steps of carrying out a first treatment on the surface of the Take X at will 5 Subsequence X of length 9 1 5 Can obtain the full arrangement Q 3
Step 4: RPM generation: x is to be 1 ,X 2 Cut off sequentially according to length 512, and sequentially arranged into matrix C with size of 512×512 1 ,C 2 And calculate RPM using equations (1) and (2), respectively 1 And RPM (revolutions per minute) 2
Step 5: image stereo scrambling: by using the full arrangement Q 1 ,Q 2 And Q 3 In turn to B 1 Performing three-dimensional row scrambling, three-dimensional column scrambling and three-dimensional layer scrambling to obtain a final scrambling result B 2
Step 6: additional RPM and FrFT transforms: pair B 2 All layers I in (1) 2 1 ,I 2 2 ,…,I 2 9 Additional RPM, i.e. I 3 i =I 2 i ×RPM 1 I=1, 2, …,9; randomly select gamma 1 =0.31,γ 2 =0.21, using γ 1 Order FrFT, pair I 3 1 ,I 3 2 ,…,I 3 9 The linear integration is carried out to obtain the result I 4 1 ,I 4 2 ,…,I 4 9 The method comprises the steps of carrying out a first treatment on the surface of the To which is added RPM, i.e. I 5 i =I 4 i ×RPM 2 I=1, 2, …,9; using gamma 2 Order FrFT, pair I 5 1 ,I 5 2 ,…,I 5 9 The linear integration is performed to obtain 9 encrypted images, as shown in fig. 6.
In the decryption process, the same chaotic sequence, frFT order and a corresponding decryption method are used for acting on the encrypted image set, so that the decrypted image set can be obtained, and the decryption image set is the same as that shown in fig. 5. Bob's decryption process is the inverse of Alice's encryption.

Claims (4)

1. The multi-image encryption method based on the stereo scrambling model and fractional Fourier transform (Fractional Fourier Transform, frFT) is characterized in that the encryption process comprises the following steps:
step 1: image cube construction: let k original images respectively be I 1 1 ,I 1 2 ,…,I 1 k All of size m x n, which are superimposed into a k-layer image cube B 1 The size is m multiplied by n multiplied by k;
step 2: chaotic sequence generation: randomly selecting an initial value x of the five-dimensional hyper-chaotic system shown in formula (1) 1 ,x 2 ,x 3 ,x 4 ,x 5 The system is iterated m times n times to obtain 5 chaotic sequences X 1 ={x 1 i } mn ,X 2 ={x 2 i } mn ,X 3 ={x 3 i } mn ,X 4 ={x 4 i } mn And X 5 ={x 5 i } mn
Wherein a=10, b=8 +.3, c=28 and d= -6 are control parameters of the five-dimensional hyper-chaotic system, X 1 ,X 2 ,X 3 ,X 4 ,X 5 A variable of the five-dimensional hyper-chaotic system;
step 3: full alignment results in: take X at will 3 Subsequence X of length m 1 3 For X 1 3 The elements are arranged in ascending order or descending order to obtain a new sequence X 2 3 The method comprises the steps of carrying out a first treatment on the surface of the By X 1 3 All elements in X 2 3 The position relation of the two parts can obtain a full array Q 1 The method comprises the steps of carrying out a first treatment on the surface of the Similarly, take X 4 Subsequence X of length n 1 4 Can obtain the full arrangement Q 2 The method comprises the steps of carrying out a first treatment on the surface of the Take X at will 5 Subsequence X of length k 1 5 Can obtain the full arrangement Q 3
Step 4: random phase mask (Random Phase Mask, RPM) generation: x is to be 1 ,X 2 Cut off sequentially according to the length n, and sequentially arranged into a matrix C with the size of m multiplied by n 1 ,C 2 And (3) calculating:
RPM 1 =e jp , (2)
RPM 2 =e jq , (3)
wherein p=2pi×c 1 ,q=2π×C 2 And j is an imaginary unit;
step 5: image stereo scrambling: by using the full arrangement Q 1 ,Q 2 And Q 3 In turn to B 1 Performing three-dimensional row scrambling, three-dimensional column scrambling and three-dimensional layer scrambling to obtain a final scrambling result B 2
Step 6: additional RPM and FrFT transforms: pair B 2 All layers I in (1) 2 1 ,I 2 2 ,…,I 2 k Additional RPM, i.e. I 3 i =I 2 i ×RPM 1 I=1, 2, …, k; randomly select gamma 12 ∈[-2,2]By gamma 1 Order FrFT, pair I 3 1 ,I 3 2 ,…,I 3 k The linear integration is carried out to obtain the result I 4 1 ,I 4 2 ,…,I 4 k The method comprises the steps of carrying out a first treatment on the surface of the To which is added RPM, i.e. I 5 i =I 4 i ×RPM 2 I=1, 2, …, k; using gamma 2 Order FrFT, pair I 5 1 ,I 5 2 ,…,I 5 k Linear integration is carried out to obtain k encrypted images which are respectively I 6 1 ,I 6 2 ,…,I 6 k
2. The method according to claim 1, wherein in the step 5, the stereo row scrambling refers to: by Q 1 Scrambling B 1 Is located in the plane of all rows.
3. The method according to claim 1, characterized in that: in the step 5, the stereo-column scrambling refers to: by Q 2 Scrambling B 1 Is defined in the column plane.
4. The method according to claim 1, characterized in that: in the step 5, the stereo layer scrambling refers to: by Q 3 Scrambling B 1 Is used for the positioning of all layer planes.
CN202010008577.2A 2020-01-06 2020-01-06 Multi-image encryption method based on stereo scrambling model and fractional Fourier transform Active CN111127292B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010008577.2A CN111127292B (en) 2020-01-06 2020-01-06 Multi-image encryption method based on stereo scrambling model and fractional Fourier transform

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010008577.2A CN111127292B (en) 2020-01-06 2020-01-06 Multi-image encryption method based on stereo scrambling model and fractional Fourier transform

Publications (2)

Publication Number Publication Date
CN111127292A CN111127292A (en) 2020-05-08
CN111127292B true CN111127292B (en) 2023-08-11

Family

ID=70486852

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010008577.2A Active CN111127292B (en) 2020-01-06 2020-01-06 Multi-image encryption method based on stereo scrambling model and fractional Fourier transform

Country Status (1)

Country Link
CN (1) CN111127292B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112968762B (en) * 2021-04-12 2022-04-01 中国矿业大学 Multi-image scrambling method based on chaos and block rotation

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102800042A (en) * 2012-06-14 2012-11-28 南昌大学 Multi-image encryption method based on log-polar transform
CN109150492A (en) * 2018-08-17 2019-01-04 中国矿业大学 More image encryption methods based on three-dimensional scramble model and chaos

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102800042A (en) * 2012-06-14 2012-11-28 南昌大学 Multi-image encryption method based on log-polar transform
CN109150492A (en) * 2018-08-17 2019-01-04 中国矿业大学 More image encryption methods based on three-dimensional scramble model and chaos

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
郝敏.基于混沌理论的身份认证技术研究.中国优秀硕士学位论文全文数据库(电子期刊) 基础科学辑.2011,全文. *

Also Published As

Publication number Publication date
CN111127292A (en) 2020-05-08

Similar Documents

Publication Publication Date Title
CN109241755B (en) Image encryption method based on three-dimensional scrambling model and chaos
Hosny et al. Novel encryption for color images using fractional-order hyperchaotic system
CN109150492B (en) Multi-image encryption method based on three-dimensional scrambling model and chaos
CN111031193B (en) Image encryption method based on three-dimensional composite scrambling model and chaos
CN110324135B (en) Homomorphic encryption matrix determinant security outsourcing method based on cloud computing
CN107659751B (en) Multi-image encryption method based on DNA coding and chaos
CN107659752B (en) Multi-image encryption method based on DNA coding and chaos
CN111080506B (en) Multi-image encryption method based on bit plane and chaos
CN111934846B (en) Multi-chaos Arnold image encryption method based on fractional Fourier transform
CN111263026B (en) Multi-image encryption method based on stereo scrambling model and fractional Fourier transform
CN112202545B (en) Image encryption method based on Y-type filling curve and variable-step Joseph traversal
CN115580687B (en) Multi-image encryption method based on variable parameter hyperchaotic system and S-shaped diffusion
CN111008383A (en) Image encryption method based on multidirectional diffusion and DNA coding
CN111127292B (en) Multi-image encryption method based on stereo scrambling model and fractional Fourier transform
CN106127669B (en) Based on the New chaotic image encryption method for protecting area B aker mapping
CN115102699A (en) Data security deduplication and data recovery method, system, medium, device and terminal
CN111682932B (en) Single-round image encryption method based on mixed chaotic mapping
Sun et al. An image encryption algorithm utilizing Mandelbrot set
CN111147688B (en) Color image encryption method based on stereo scrambling model and chaos
CN113099069A (en) Multi-image encryption method based on three-dimensional spiral model
CN116827509A (en) Image encryption method based on five-dimensional conserved hyperchaotic system and bit plane segmentation diffusion
CN112968762B (en) Multi-image scrambling method based on chaos and block rotation
CN113779611A (en) Vector geographic data encryption method and decryption method based on three-dimensional Arnold transformation
CN111460488A (en) Multi-image rapid encryption method based on pre-storage and n-dimensional Arnold transformation
CN109214199B (en) Image encryption method and system and decryption method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant