CN113055545B - Image encryption method based on two-dimensional index-cosine chaotic system - Google Patents

Image encryption method based on two-dimensional index-cosine chaotic system Download PDF

Info

Publication number
CN113055545B
CN113055545B CN202110356974.3A CN202110356974A CN113055545B CN 113055545 B CN113055545 B CN 113055545B CN 202110356974 A CN202110356974 A CN 202110356974A CN 113055545 B CN113055545 B CN 113055545B
Authority
CN
China
Prior art keywords
encryption
image
data
scrambling
sequence
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110356974.3A
Other languages
Chinese (zh)
Other versions
CN113055545A (en
Inventor
刘思聪
彭淑燕
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Institute of Economic and Trade Technology
Original Assignee
Jiangsu Institute of Economic and Trade Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu Institute of Economic and Trade Technology filed Critical Jiangsu Institute of Economic and Trade Technology
Priority to CN202110356974.3A priority Critical patent/CN113055545B/en
Publication of CN113055545A publication Critical patent/CN113055545A/en
Application granted granted Critical
Publication of CN113055545B publication Critical patent/CN113055545B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/32Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
    • H04N1/32101Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
    • H04N1/32144Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title embedded in the image data, i.e. enclosed or integrated in the image, e.g. watermark, super-imposed logo or stamp
    • H04N1/32149Methods relating to embedding, encoding, decoding, detection or retrieval operations
    • H04N1/32267Methods relating to embedding, encoding, decoding, detection or retrieval operations combined with processing of the image
    • H04N1/32272Encryption or ciphering
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/001Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/44Secrecy systems
    • H04N1/448Rendering the image unintelligible, e.g. scrambling
    • H04N1/4486Rendering the image unintelligible, e.g. scrambling using digital data encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Multimedia (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Facsimile Transmission Control (AREA)
  • Complex Calculations (AREA)

Abstract

The invention discloses an image encryption method based on a two-dimensional index-cosine chaotic system, which relates to the technical field of information security and comprises the steps of constructing a 2D-Ecs chaotic system and performing chaotic encryption operation on image information by utilizing the 2D-Ecs chaotic system; the method for carrying out chaotic encryption operation on image information by using the 2D-Ecs chaotic system comprises the following steps: 1) Firstly, RGB multi-channel extraction is carried out on image data; 2) Carrying out chaotic encryption on the extracted single-channel image data by utilizing a 2D-ECs chaotic system; 3) And then rewriting the encrypted single-channel image data back to the image so as to complete the encryption of the image data. The image encryption method designed by the invention has the characteristics of large key space, good encryption effect, strong anti-interference capability and the like. Simulation experiments show that the algorithm can effectively resist exhaustive attacks and differential attacks.

Description

Image encryption method based on two-dimensional index-cosine chaotic system
Technical Field
The invention relates to the technical field of information security, in particular to an image encryption method based on a two-dimensional index-cosine chaotic system.
Background
At present, as the world enters the post epidemic situation era, more and more interpersonal communication is migrated to be carried out on line due to the requirement of epidemic situation protection and the arrival of the 5G era. There is an increasing demand for image encryption for protection of personal privacy and information security.
However, the current image encryption algorithm generally has the defects of complex encryption process, long time consumption and the like. For some fields requiring real-time encryption transmission, the existing encryption algorithm cannot meet the requirements. While the chaos encryption algorithm attracts the attention of researchers after the chaos system is applied to the field of information encryption by Matthews and the like. Up to now, various one-dimensional chaotic systems have been applied to the field of information encryption. Most of the one-dimensional chaotic systems have the characteristics of high iteration speed, simple implementation method and the like. However, the system control parameters of the one-dimensional chaotic system are less, and the phase space orbit distribution is single, so that the system is very easy to be attacked by methods such as phase space reconstruction and the like, and the ciphertext is maliciously cracked. In order to overcome the disadvantages of the one-dimensional chaotic system, researchers propose a series of improvements, such as: researchers have coupled a plurality of control parameters of a one-dimensional chaotic system, so that the chaotic nature of the whole system becomes more complex. Researchers also integrate a plurality of one-dimensional chaotic maps into one system, and the switching or cascading operation is carried out among different chaotic systems in the whole encryption process. By the method, the one-dimensional chaotic system has better iteration efficiency and unpredictability. Meanwhile, researchers try to encrypt information by constructing a one-dimensional chaotic system in a complex field so as to obtain better chaotic characteristics and encryption effects. Although the information encryption strength of the one-dimensional chaotic system is improved by the improvement means at present, the information encryption strength is still to be improved due to the limitation of the structure and parameter characteristics of the one-dimensional chaotic system.
Disclosure of Invention
The invention aims to: the invention aims to construct a new two-dimensional exponent-Cosine chaotic system aiming at the defects of complicated encryption process, long time consumption and the like of the image encryption algorithm in the prior art and the problem of low image encryption intensity of the one-dimensional chaotic system, the dimensionality of the one-dimensional chaotic system is improved by introducing a nonlinear exponent term and a high-order power term into the one-dimensional Cosine chaotic mapping system, and the introduced nonlinear exponent term and the high-order power term are used as chaotic disturbance sources to disturb the iterative process of Cosine chaotic mapping. By researching the chaotic characteristic of the system, the system is found to have the characteristics of chaotic characteristic and complex phase space orbit distribution structure, and on the basis of the system, an image encryption method based on a two-dimensional index-cosine chaotic system is provided.
The technical scheme is as follows: an image encryption method based on a two-dimensional index-cosine chaotic system comprises the steps of constructing a 2D-ECs chaotic system and performing chaotic encryption operation on image information by utilizing the 2D-ECs chaotic system;
the iterative formula of the 2D-ECs chaotic system is shown in the following formula (1):
Figure GDA0004133278480000021
wherein the control parameters a, b and c satisfy a epsilon [0.2,0.4 ∈],b∈[0,1.75],c∈[0.65,0.85]Initial value x 0 ,y 0 Satisfy x 0 ∈[0,1],y 0 ∈[0,2];
The method for carrying out chaotic encryption operation on image information by using the 2D-Ecs chaotic system comprises the following steps:
1) Firstly, RGB multi-channel extraction is carried out on original image data;
2) Carrying out chaotic encryption on the extracted single-channel image data by using a 2D-ECs chaotic system;
3) And then rewriting the encrypted single-channel image data back to the image so as to complete the encryption of the image data.
Furthermore, when the extracted single-channel image data is subjected to chaotic encryption, a scrambling-diffusing-scrambling encryption method is adopted, and the chaotic encryption comprises a first round of scrambling encryption, a diffusing encryption and a second round of scrambling encryption.
Further, the first round of scrambling encryption includes the following steps:
step 1): when scrambling operation is carried out on the extracted single-channel image data, firstly, a 2D-ECs chaotic system is utilized to generate a discrete data sequence (x) n ,y n ) Setting an initial value (x) 0 ,y 0 ) = 0.74,1.38, control parameters (a, b, c) = (0.4,1.75,0.85); the iteration round is M x N +10000, wherein M and N are the width and height values of the original image data, and the data of the first 8000 points in the sequence is not used after iteration;
after the above operation is completed, the generated discrete data sequence (x) is generated n ,y n ) Performing de-duplication treatment to remove the duplicated x n Sequence as a line coordinate, y, of image scrambling n The sequence is used as the column coordinate of image scrambling to perform spatial scrambling operation on single-channel image data, and the specific spatial scrambling operation is shown as formula (2):
p(x i ,y j )=p′(x ni ,y mj ) (2)
step 2) after the operation is finished, expanding the spatially scrambled image data obtained in the step 1) into one-dimensional sequence data along the column direction; reuse is set from the following initial value (x) 0 ,y 0 ) Discrete encryption sequence for first round encryption generated by 2D-ECs chaotic system formed by = (0.15,1.7) and control parameters (a, b, c) = (0.4,1.75,0.85)A column for encrypting the spatially scrambled image data; discrete encryption sequence (x) generated by 2D-ECs chaotic system n ,y n ) The length of the image data is M x N +10000, wherein M and N are width and height values of original image data, and the data of the first 8000 points in the sequence is not used after iteration;
step 3): firstly, carrying out coordinate scrambling on single-channel image data to obtain image data Q; then the discrete encryption sequence (x) obtained in the step 2) is processed n ,y n ) And carrying out double-helix encryption with the image data Q, wherein the specific double-helix encryption steps are shown as a formula (3):
Figure GDA0004133278480000031
wherein x n -1 ,y n -1 By discrete encryption sequences (x) n ,y n ) The data are obtained by reverse order arrangement, and Q' is encrypted image ciphertext data;
through the steps, the first round of scrambling encryption operation can be completed, and the image ciphertext data Q' after the first round of scrambling encryption is obtained.
Further, the diffusion encryption, that is, performing diffusion encryption on the image ciphertext data Q' after the first round of scrambling encryption, includes the following steps:
step 1): firstly, calculating an average pixel value M of single-channel image data, and then carrying out normalization operation on the average value to enable the average value to be in a value range of 0-1; then taking the normalized pixel mean value M' as Kx of the 2D-ECs chaotic system 0 Initial value, and setting Ky 0 The initial value is 1.5, when the control parameters (a, b, c) = (0.4,1.75,0.85); after M × N +10000 iterations, M × N +10000, wherein M and N are the width and height values of the original image data, the first 8000 data points are discarded to obtain a diffusion sequence (Kx) n ,Ky n );
Step 2): expanding image ciphertext data Q' subjected to the first round of scrambling encryption into one-dimensional sequence data along the column direction; and then with the diffusion sequence (Kx) obtained in step 1) n ,Ky n ) Carrying out double-helix diffusion encryption operation; concrete pairThe spiral diffusion encryption formula is shown in formula (4):
Figure GDA0004133278480000032
wherein Kx n -1 ,Ky n -1 From diffusion sequences (Kx) n ,Ky n ) The image ciphertext data is obtained by reverse order arrangement, and G is the image ciphertext data after diffusion encryption;
through the steps, the diffusion operation of the scrambled and encrypted data in the first round is completed, and the image ciphertext data G after diffusion encryption is obtained.
Further, the second round of scrambling encryption, that is, scrambling operation is performed on the diffusion-encrypted image ciphertext data G, and the method includes the following steps:
when scrambling operation is carried out on the image ciphertext data G after diffusion encryption, firstly, a 2D-ECs chaotic system is utilized to generate a discrete data sequence (x) n ,y n ) Setting an initial value (x) 0 ,y 0 ) = 0.74,1.38, control parameters (a, b, c) = (0.4,1.75,0.85); the iteration turn is M × N +10000, wherein M and N are the width and height values of single-channel image data, and the data of the front 9000 points in the sequence is abandoned after iteration to generate a discrete data sequence (x) n ,y n );
After the above operation is completed, the generated discrete data sequence (x) is generated n ,y n ) Performing de-duplication treatment to remove the duplicate x n Sequence as line coordinates for image scrambling, y n The sequence is used as a column coordinate for image scrambling to perform spatial scrambling operation on single-channel image data, and a specific scrambling operation formula is the formula (2);
through the steps, the second round of scrambling encryption operation can be completed.
Has the advantages that: the chaotic encryption operation method for the image information by utilizing the 2D-Ecs chaotic system has the characteristics of large key space, good encryption effect, strong anti-jamming capability and the like, can effectively resist exhaustive attack and differential attack, can effectively eliminate the pixel correlation in a plaintext image, is extremely sensitive to tiny change among pixels in the plaintext, and can completely change the encrypted data due to the tiny change.
Drawings
FIG. 1 is a schematic diagram of an algorithm flow of an encryption method of the present invention;
FIG. 2 is a phase trajectory diagram of a 2D-ECs chaotic system constructed by the invention;
FIG. 3 is a Lyapunov exponential curve of a 2D-ECs chaotic system constructed by the invention;
FIG. 4 is a schematic diagram of an encrypted image and histogram information of the 2D-ECs chaotic system of the present invention.
Detailed Description
The technical solution of the present invention is described in detail below with reference to the accompanying drawings, but the scope of the present invention is not limited to the embodiments.
An image encryption method based on a two-dimensional index-cosine chaotic system comprises the steps of constructing a 2D-ECs chaotic system and performing chaotic encryption operation on image information by utilizing the 2D-ECs chaotic system;
the iterative formula of the 2D-ECs chaotic system is shown in the following formula 1:
Figure GDA0004133278480000051
wherein the control parameters a, b and c satisfy a epsilon [0.2,0.4 ∈],b∈[0,1.75],c∈[0.65,0.85]Initial value x 0 ,y 0 Satisfy x 0 ∈[0,1],y 0 ∈[0,2];
As shown in fig. 1, the method for performing chaotic encryption operation on image information by using a 2D-Ecs chaotic system is as follows:
1) Firstly, RGB multi-channel extraction is carried out on original image data;
2) Carrying out chaotic encryption on the extracted single-channel image data by using a 2D-ECs chaotic system;
3) And then rewriting the encrypted single-channel image data back to the image so as to complete the encryption of the image data.
Furthermore, when the extracted single-channel image data is subjected to chaotic encryption, a scrambling-diffusing-scrambling encryption method is adopted, and the chaotic encryption comprises a first round of scrambling encryption, a diffusing encryption and a second round of scrambling encryption.
Further, the first round of scrambling encryption comprises the following steps:
step 1): when the extracted single-channel image data is subjected to scrambling operation, firstly, a 2D-ECs chaotic system is utilized to generate a discrete data sequence (x) n ,y n ) Setting an initial value (x) 0 ,y 0 ) = 0.74,1.38, control parameters (a, b, c) = (0.4,1.75,0.85); the iteration round is M x N +10000, wherein M and N are the width and height values of the original image data, and the data of the first 8000 points in the sequence is not used after iteration;
after the above operation is completed, the generated discrete data sequence (x) is generated n ,y n ) Performing de-duplication treatment to remove the duplicated x n Sequence as line coordinates for image scrambling, y n The sequence is used as a column coordinate of image scrambling to perform spatial scrambling operation on single-channel image data, and the specific spatial scrambling operation is shown as formula 2:
p(x i ,y j )=p′(x ni ,y mj ) (2)
step 2) after the above operation is completed, expanding the spatially scrambled image data p obtained in step 1) into one-dimensional sequence data in the column direction; the reuse is initialized by the following value (x) 0 ,y 0 ) Encrypting the spatially scrambled image data p by a discrete encryption sequence for the first round of encryption generated by a 2D-ECs chaotic system constituted by = 0.15,1.7 and control parameters (a, b, c) = (0.4,1.75,0.85); discrete encryption sequence (x) generated by 2D-ECs chaotic system n ,y n ) The length of the image data is M x N +10000, wherein M and N are width and height values of original image data, and the data of the first 8000 points in the sequence is not used after iteration;
step 3): firstly, carrying out coordinate scrambling on single-channel image data to obtain image data Q; then the discrete encryption sequence (x) obtained in the step 2) is processed n ,y n ) Performing double-helix encryption with image data Q, wherein the steps of the double-helix encryption are as formula(3) Shown in the specification:
Figure GDA0004133278480000061
wherein x n -1 ,y n -1 By discrete encryption sequences (x) n ,y n ) The data are obtained by reverse order arrangement, and Q' is encrypted image ciphertext data;
through the steps, the first round of scrambling encryption operation can be completed, and the image ciphertext data Q' after the first round of scrambling encryption is obtained.
Further, the diffusion encryption, that is, performing the diffusion encryption on the image ciphertext data Q' after the first round of scrambling encryption, includes the following steps:
step 1): firstly, calculating an average pixel value M of single-channel image data, and then carrying out normalization operation on the average value to enable the average value to be in a value range of 0-1; then taking the normalized pixel mean value M' as x of the 2D-ECs chaotic system 0 Initial value, and set Ky 0 The initial value is 1.5, when the control parameters (a, b, c) = (0.4,1.75,0.85); after M × N +10000 iterations, where M and N are the width and height values of the original image data, the first 8000 data points are discarded to obtain a diffusion sequence (Kx) n ,Ky n );
Step 2): expanding image ciphertext data Q' subjected to the first round of scrambling encryption into one-dimensional sequence data along the column direction; and then with the diffusion sequence (Kx) obtained in step 1) n ,Ky n ) Carrying out double-helix diffusion encryption operation; the specific double-helix diffusion encryption formula is shown in formula 4:
Figure GDA0004133278480000062
wherein Kx n -1 ,Ky n -1 From diffusion sequences (Kx) n ,Ky n ) Obtaining the image ciphertext data after diffusion encryption by reverse order arrangement, wherein G is the image ciphertext data after diffusion encryption;
through the steps, the diffusion operation of the scrambled and encrypted data in the first round is completed, and the image ciphertext data G after diffusion encryption is obtained.
Further, the second round of scrambling encryption, namely scrambling operation is performed on the image ciphertext data G after diffusion encryption, and the method comprises the following steps:
when scrambling operation is carried out on the image ciphertext data G after diffusion encryption, firstly, a 2D-ECs chaotic system is utilized to generate a discrete data sequence (x) n ,y n ) Setting an initial value (x) 0 ,y 0 ) = 0.74,1.38, control parameters (a, b, c) = (0.4,1.75,0.85); the iteration turn is M × N +10000, wherein M and N are the width and height values of single-channel image data, and the data of the front 9000 points in the sequence is abandoned after iteration to generate a discrete data sequence (x) n ,y n );
After the above operation is completed, the generated discrete data sequence (x) is generated n ,y n ) Performing de-duplication treatment to remove the duplicate x n Sequence as a line coordinate, y, of image scrambling n The sequence is used as a column coordinate for image scrambling to perform spatial scrambling operation on single-channel image data, wherein a specific scrambling operation formula is formula 2;
through the steps, the second round of scrambling and encrypting operation can be completed.
Fig. 2 is a phase trajectory diagram of the 2D-ECs chaotic system constructed by the invention, and it can be seen from the diagram that the novel 2D-ECs chaotic system provided by the invention has a larger numerical search space.
FIG. 3 is a Lyapunov exponential curve of a 2D-ECs chaotic system constructed by the invention; as shown in fig. 3, the line a and the line B in the figure refer to Lyapnov exponential curves of the first dimension (x) and the second dimension (y) of the system along with the control variable a, and it can be found that the Lyapnov exponent of the one-dimensional curve (a) is greater than 0 in the range of the control variable a e [0.26,0.4], which indicates that the system is in a chaotic state.
FIG. 4 is a schematic diagram of an encrypted image and histogram information of the 2D-ECs chaotic system of the present invention. As shown in fig. 4, it can be seen visually that after the original picture is encrypted by the encryption method of the present invention, the gray level histogram of the encrypted picture is uniformly distributed, and the effective information of all the images is annihilated in the chaotic noise, thereby demonstrating that the encryption method of the present invention has good encryption characteristics.
The chaotic encryption operation method for the image information by utilizing the 2D-Ecs chaotic system has the characteristics of large key space, good encryption effect, strong anti-jamming capability and the like, can effectively resist exhaustive attack and differential attack, can effectively eliminate the pixel correlation in a plaintext image, is extremely sensitive to tiny change among pixels in the plaintext, and can completely change the encrypted data due to the tiny change.
As noted above, while the present invention has been shown and described with reference to certain preferred embodiments, it is not to be construed as limited thereto. Various changes in form and details may be made therein without departing from the spirit and scope of the invention as defined by the appended claims.

Claims (5)

1. An image encryption method based on a two-dimensional index-cosine chaotic system is characterized by comprising the steps of constructing a 2D-ECs chaotic system and performing chaotic encryption operation on image information by utilizing the 2D-ECs chaotic system;
the iterative formula of the 2D-ECs chaotic system is shown in the following formula (1):
Figure FDA0004133278470000011
wherein the control parameters a, b and c satisfy a epsilon [0.2,0.4 ∈],b∈[0,1.75],c∈[0.65,0.85]Initial value x 0 ,y 0 Satisfy x 0 ∈[0,1],y 0 ∈[0,2];
The method for carrying out chaotic encryption operation on image information by using the 2D-Ecs chaotic system comprises the following steps:
1) Firstly, RGB multi-channel extraction is carried out on original image data;
2) Carrying out chaotic encryption on the extracted single-channel image data by using a 2D-ECs chaotic system;
3) And then rewriting the encrypted single-channel image data back to the image so as to complete the encryption of the image data.
2. The image encryption method based on the two-dimensional exponential-cosine chaotic system as claimed in claim 1, wherein a scrambling-diffusion-scrambling encryption method is adopted when performing chaotic encryption on the extracted single-channel image data, and the chaotic encryption comprises a first round of scrambling encryption, a diffusion encryption and a second round of scrambling encryption.
3. The image encryption method based on the two-dimensional exponential-cosine chaotic system as claimed in claim 2, wherein the first round of scrambling encryption comprises the following steps:
step 1): when the extracted single-channel image data is subjected to scrambling operation, firstly, a 2D-ECs chaotic system is utilized to generate a discrete data sequence (x) n ,y n ) Setting an initial value (x) 0 ,y 0 ) = (0.74,1.38), control parameters (a, b, c) = (0.4,1.75,0.85); the iteration round is M x N +10000, wherein M and N are width and height values of original image data, and the data of the first 8000 points in the sequence is not used after iteration;
after the above operation is completed, the generated discrete data sequence (x) is generated n ,y n ) Performing de-duplication treatment to remove the duplicated x n Sequence as line coordinates for image scrambling, y n The sequence is used as a column coordinate for image scrambling to perform spatial scrambling operation on single-channel data, and the specific spatial scrambling operation is shown as formula (2):
p(x i ,y j )=p′(x ni ,y mj ) (2)
step 2) after the operation is finished, expanding the spatially scrambled image data obtained in the step 1) into one-dimensional sequence data along the column direction; reuse is set from the following initial value (x) 0 ,y 0 ) Encrypting the spatially scrambled image data by a discrete encryption sequence for the first round of encryption generated by a 2D-ECs chaotic system consisting of = 0.15,1.7 and control parameters (a, b, c) = (0.4,1.75,0.85); discrete encryption sequence (x) generated by 2D-ECs chaotic system n ,y n ) The length of the image data is M x N +10000, wherein M and N are width and height values of original image data, and the data of the front 8000 points in the sequence is not used after iteration;
step 3): firstly, carrying out coordinate scrambling on single-channel image data to obtain image data Q; then the discrete encryption sequence (x) obtained in the step 2) is processed n ,y n ) And carrying out double-helix encryption with the image data Q, wherein the specific double-helix encryption steps are shown as a formula (3):
Figure FDA0004133278470000021
wherein x n -1 ,y n -1 By discrete encryption sequences (x) n ,y n ) The data are obtained by reverse order arrangement, and Q' is encrypted image ciphertext data;
through the steps, the first round of scrambling and encrypting operation can be completed, and the image ciphertext data Q' after the first round of scrambling and encrypting is obtained.
4. The image encryption method based on the two-dimensional exponential-cosine chaotic system as claimed in claim 3, wherein the diffusion encryption, that is, the diffusion encryption of the image ciphertext data Q' after the first round of scrambling encryption, comprises the following steps:
step 1): firstly, calculating an average pixel value M of single-channel image data, and then carrying out normalization operation on the average value to enable the average value to be in a value range of 0-1; then taking the normalized pixel mean value M' as Kx of the 2D-ECs chaotic system 0 Initial value, and setting Ky 0 An initial value of 1.5, when the control parameters (a, b, c) = (0.4,1.75,0.85); after M × N +10000 iterations, M × N +10000, wherein M and N are the width and height values of the original image data, the first 8000 data points are discarded to obtain a diffusion sequence (Kx) n ,Ky n );
Step 2): expanding image ciphertext data Q' subjected to the first round of scrambling encryption into one-dimensional sequence data along the column direction; and then with the diffusion sequence (Kx) obtained in step 1) n ,Ky n ) To carry outDouble-helix diffusion encryption operation; the specific double-helix diffusion encryption formula is shown as formula (4):
Figure FDA0004133278470000022
wherein Kx n -1 ,Ky n -1 From diffusion sequences (Kx) n ,Ky n ) The image ciphertext data is obtained by reverse order arrangement, and G is the image ciphertext data after diffusion encryption;
through the steps, the diffusion operation of the scrambled and encrypted data in the first round is completed, and the image ciphertext data G after diffusion encryption is obtained.
5. The image encryption method based on the two-dimensional exponential-cosine chaotic system as claimed in claim 4, wherein the second round of scrambling encryption, namely scrambling operation is performed on the image ciphertext data G after diffusion encryption, comprises the following steps:
when scrambling operation is carried out on the image ciphertext data G after diffusion encryption, firstly, a 2D-ECs chaotic system is utilized to generate a discrete data sequence (x) n ,y n ) Setting an initial value (x) 0 ,y 0 ) = 0.74,1.38, control parameters (a, b, c) = (0.4,1.75,0.85); the iteration turn is M × N +10000, wherein M and N are the width and height values of single-channel image data, and the data of the front 9000 points in the sequence is abandoned after iteration to generate a discrete data sequence (x) n ,y n );
After the above operation is completed, the generated discrete data sequence (x) is generated n ,y n ) Performing de-duplication treatment to remove the duplicated x n Sequence as line coordinates for image scrambling, y n The sequence is used as a column coordinate for image scrambling to perform spatial scrambling operation on single-channel image data, and a specific scrambling operation formula is the formula (2);
through the steps, the second round of scrambling encryption operation can be completed.
CN202110356974.3A 2021-04-01 2021-04-01 Image encryption method based on two-dimensional index-cosine chaotic system Active CN113055545B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110356974.3A CN113055545B (en) 2021-04-01 2021-04-01 Image encryption method based on two-dimensional index-cosine chaotic system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110356974.3A CN113055545B (en) 2021-04-01 2021-04-01 Image encryption method based on two-dimensional index-cosine chaotic system

Publications (2)

Publication Number Publication Date
CN113055545A CN113055545A (en) 2021-06-29
CN113055545B true CN113055545B (en) 2023-04-18

Family

ID=76517354

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110356974.3A Active CN113055545B (en) 2021-04-01 2021-04-01 Image encryption method based on two-dimensional index-cosine chaotic system

Country Status (1)

Country Link
CN (1) CN113055545B (en)

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE60322338D1 (en) * 2003-04-07 2008-09-04 St Microelectronics Srl Encryption method using chaotic mappings and digital signature methods
CN102123026A (en) * 2011-04-12 2011-07-13 南开大学 Chaos and hyperchaos based two-level video streaming media encryption method
CN104680476B (en) * 2015-03-03 2017-11-17 河南大学 The lossless encryption method of coloured image based on two-dimensional discrete wavelet conversion and space-time chaos
CN108133445A (en) * 2016-12-01 2018-06-08 钦州市晶通科技有限公司 A kind of image encryption method for spreading mapping scramble and being combined with chaos system
US20200287704A1 (en) * 2020-05-22 2020-09-10 Qiang Zhang Color Image Encryption Method Based on DNA Strand Displacement Analog Circuit

Also Published As

Publication number Publication date
CN113055545A (en) 2021-06-29

Similar Documents

Publication Publication Date Title
Man et al. Double image encryption algorithm based on neural network and chaos
Zhou et al. Image encryption algorithm with circle index table scrambling and partition diffusion
Zhu et al. A chaos-based symmetric image encryption scheme using a bit-level permutation
CN103473733B (en) Based on DNA encoding and the resume image of chaotic maps
CN107094072B (en) Mixed chaotic encryption method based on generalized Henon mapping
Wang et al. A New V‐Net Convolutional Neural Network Based on Four‐Dimensional Hyperchaotic System for Medical Image Encryption
CN105046161A (en) DNA dynamic coding based colored image encryption method
CN106709854B (en) Image information fusion encryption method based on cat face transformation and chaos
Chen et al. A color image encryption algorithm based on 2D-CIMM chaotic map
CN103167213A (en) Digital image encryption method based on Cat mapping and hyper-chaos Lorenz system
CN111130748A (en) Quantum chaotic parallel image encryption method
CN107292802A (en) A kind of parallel image encryption method of quantum chaos
CN113115053B (en) Image encryption method based on integer wavelet transform and compressed sensing
Yi et al. An algorithm of image encryption based on AES & Rossler hyperchaotic modeling
CN113055545B (en) Image encryption method based on two-dimensional index-cosine chaotic system
Liang et al. Image hybrid encryption based on matrix nonlinear operation and generalized Arnold transformation
Zhang et al. Fast image encryption algorithm based on 2D-FCSM and pseudo-wavelet transform
Liu Quantum image encryption based on Baker map and DNA circular shift operation
CN113079393B (en) Video stream encryption system based on two-dimensional exponential-sinusoidal hyperchaotic system
CN116582623A (en) Color image encryption method based on chaotic system and DNA dynamic coding
CN111682932A (en) Single-round image encryption method based on mixed chaotic mapping
CN116346997A (en) Image encryption method based on sine transformation chaotic system
CN116827509A (en) Image encryption method based on five-dimensional conserved hyperchaotic system and bit plane segmentation diffusion
CN114978466A (en) Fractal-like model and Hilbert synchronous scrambling diffusion encryption method
CN110069901B (en) Space domain multi-image encryption algorithm based on chaotic system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant