CN113595715A - Logistic-based double-pixel rectangular mapping color image encryption and decryption method - Google Patents

Logistic-based double-pixel rectangular mapping color image encryption and decryption method Download PDF

Info

Publication number
CN113595715A
CN113595715A CN202110839190.6A CN202110839190A CN113595715A CN 113595715 A CN113595715 A CN 113595715A CN 202110839190 A CN202110839190 A CN 202110839190A CN 113595715 A CN113595715 A CN 113595715A
Authority
CN
China
Prior art keywords
image
color
logistic
encryption
color image
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110839190.6A
Other languages
Chinese (zh)
Inventor
莫佳
谭素琴
刘美香
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
East China Jiaotong University
Original Assignee
East China Jiaotong University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by East China Jiaotong University filed Critical East China Jiaotong University
Priority to CN202110839190.6A priority Critical patent/CN113595715A/en
Publication of CN113595715A publication Critical patent/CN113595715A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/001Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N1/00Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
    • H04N1/46Colour picture communication systems
    • H04N1/56Processing of colour picture signals

Abstract

The invention relates to the technical field of information security and image processing, and provides a color image encryption and decryption method. The method can quickly finish the encryption and decryption of various color images, and the encrypted ciphertext image destroys the structure of the plaintext image and can effectively resist the statistical attack of the image pixel frequency. The color image encryption method comprises the steps of firstly constructing a color key image for controlling an encryption algorithm and a decryption algorithm; secondly, preprocessing the plaintext color image by using a Logistic chaotic system, then searching ciphertext pixels in a rectangle formed by the key image by using double pixels as groups in each channel of the plaintext image, and finally outputting the ciphertext color image. The method has high encryption efficiency and strong practicability, can effectively resist frequency statistics attack and plaintext selection attack, has good encryption effect, can be applied to scenes such as generation, storage, transmission and the like of color images, and effectively protects the confidentiality of the color images.

Description

Logistic-based double-pixel rectangular mapping color image encryption and decryption method
Technical Field
The invention relates to the field of information security, in particular to a method for encrypting and decrypting a color image based on Logistic double-pixel rectangular mapping.
Background
At present, computer networks and multimedia technologies are rapidly developed, and people generally use various images to express information in work and life, wherein color images are used more frequently. The security of color images is challenging due to their widespread use. The encryption algorithms such as AES and RSA commonly used in the field of information security cannot be directly applied to the security implementation of color images. This is due to the fact that on the one hand the amount of color image data is very large, especially for high-resolution color images which are often used today; on the other hand, the traditional encryption algorithm mainly aims at text data during design, so that the encryption algorithm is complex, for example, the DES algorithm needs 16 iterations, the AES algorithm iterates at least 10 iterations, and the public key algorithm such as RSA is less efficient than the DES algorithm.
The attractor dimension of the chaotic system is fractal dimension, has a very complex fractal structure and good unpredictability, and the chaotic system has extreme sensitivity to initial conditions and parameters, so the chaotic system can be used in the field of data confidentiality. The existing chaos-based image security technology generally performs encryption processing on an image on the basis of chaos mapping. For example, patent publication No. CN108234813A discloses a plaintext associated image encryption algorithm based on hyperchaotic Chen system, which generates four pseudo-random sequence matrices through the Chen chaotic system, and then performs operations such as forward diffusion, scrambling and reverse diffusion on a plaintext image, thereby obtaining a final ciphertext image. Although the method solves the problem that the key space of the Logistic chaotic system is small, the process is complex, and the image encryption is not favorable. In general, the problems of the prior art are: the algorithm is complex, so that the efficiency is low when the image is encrypted and decrypted, the time is consumed, and the method is particularly suitable for encrypting the color image; the security of the algorithm needs to be further improved.
Disclosure of Invention
In order to solve the technical problems, the invention provides a method for encrypting a color image based on Logistic double-pixel rectangular mapping, which constructs a rectangular mapping function on the basis of a chaotic system and well balances the relationship between algorithm complexity and safety.
The technical purpose of the invention is realized by the following technical scheme:
a color image encryption method based on Logistic double-pixel rectangular mapping comprises the following steps:
step 101: according to the seed key k ═ k1,k2) K in (1)1Constructing a color key image IK
Step 102: for the read-in plain text color image IPConverting into RGB color space, and further separating to R, G, B channels to obtain three plaintext subimages
Figure BDA0003178324900000021
Step 103: according to k2Disturbing the three plaintext sub-images obtained in the step 102 by using a Logistic chaotic system to obtain
Figure BDA0003178324900000022
Step 104: the sub-image obtained in step 103
Figure BDA0003178324900000023
Respectively executing rectangular mapping operation to obtain respective ciphertext sub-images
Figure BDA0003178324900000024
Step 105: three ciphertext sub-images obtained in the step 104
Figure BDA0003178324900000025
Synthesized into a final ciphertext image IC
Preferably, the color key image I is constructed in step 101 according to the seed keyK(ii) a The seed key is composed of integers between 0 and 255, the length of the seed key is variable, the maximum length is 256, which is equivalent to 2048 bits long, and a constructed key image IKExpressed as RGB space of
Figure BDA0003178324900000026
Preferably, the RGB color model is used to represent the input plaintext color image in step 102, resulting in three component sub-images.
As a preferred scheme, the Logistic chaotic system mathematical model adopted in step 103 is as follows:
xk+1=μxk(1-xk) (1)
wherein x isk,xk+1∈(0,1),μ∈(0,4]When 3.5699456 < mu < 4, the system enters a chaotic state.
Preferably, the plaintext sub-images are processed in step 104
Figure BDA0003178324900000031
Respectively using two pixels as a group, inputting the two pixels into a rectangular function f to respectively obtain three ciphertext sub-images
Figure BDA0003178324900000032
The rectangular function f is defined as:
Figure BDA0003178324900000033
wherein row and col respectively represent the row number and the column number of the pixel pix; l, U denote pixels immediately to the left and top of the pixel, respectively.
As a preferred scheme, in step 105, the three ciphertext sub-images are synthesized into an image of one channel by using an RGB model, so as to obtain a final ciphertext image.
Preferably, the decryption algorithm is the inverse of the encryption algorithm.
In conclusion, the invention has the following beneficial effects:
1. the method for encrypting the color image based on Logistic double-pixel rectangular mapping can quickly finish encryption and decryption of various color images, and a ciphertext image obtained by encryption destroys the structure of a plaintext image, so that the statistical attack of the image pixel frequency can be effectively resisted;
2. the color image encryption method based on Logistic double-pixel rectangular mapping has high encryption efficiency and strong practicability, can effectively resist frequency statistics attack and plaintext selection attack, has good encryption effect, can be applied to scenes such as generation, storage, transmission and the like of color images, and effectively protects the confidentiality of the color images.
Drawings
FIG. 1 is a schematic diagram of an encryption process according to an embodiment of the present invention;
FIG. 2 is a block diagram illustrating a decryption process according to an embodiment of the present invention;
FIG. 3 is a schematic diagram of key image construction scan in an embodiment of the invention;
fig. 4 is a diagram of encryption effect in the embodiment of the present invention.
Detailed Description
This specification and claims do not intend to distinguish between components that differ in name but not function. In the following description and in the claims, the terms "include" and "comprise" are used in an open-ended fashion, and thus should be interpreted to mean "include, but not limited to. "substantially" means within an acceptable error range, within which a person skilled in the art can solve the technical problem to substantially achieve the technical result.
The present invention will be described in further detail below with reference to the accompanying drawings, but the present invention is not limited thereto.
First, a color key image I is constructed from a seed keyKThe seeds of the optical fiber are composed of integers from 0 to 255, the length of the optical fiber is variable, the longest optical fiber is 256, and the length of the optical fiber is 2048 bits; constructed key image IKCan be expressed as RGB space
Figure BDA0003178324900000041
Wherein, the color key image IKThe construction method of (2) is as follows:
1. inputting a chaotic initial value;
2. generating a sequence L1 with the size of L (0< L <256) by using a Logistic chaotic system;
3. amplifying each value of the sequence obtained by the chaotic system by 1000 times, and then performing modulus selection on 256 to obtain L2;
4. filling L2 in the matrix of 16 x 16 in the order of FIG. 3 scanning, skipping repeated digits without writing, and filling the rest in the order of small to large in FIG. 3 until the whole matrix position is filled, to obtain the key image I of 16 x 16 sizeK
Color key image IKThe construction principle of (1) is as follows: the key is a 16-order square matrix consisting of 256 gray-scale pixels. I isKThe derivation depends on the seed key k1, repeated unwritten, with the remainder filled in pixel-wise order from small to large.
Then, starting the image encryption process, and reading in the plaintext color image IPConverting into RGB color space, expressing the input plaintext color image by RGB color model, further separating to R, G and B channels to obtain three plaintext sub-images
Figure BDA0003178324900000051
Then according to k2Disturbing the three plaintext sub-images obtained in the step 102 by using a Logistic chaotic system to obtain
Figure BDA0003178324900000052
The Logistic chaotic system mathematical model comprises the following steps:
xk+1=μxk(1-xk) (1)
wherein x isk,xk+1∈(0,1),μ∈(0,4]When 3.5699456<μ<And 4, the system enters a chaotic state.
At the same time, the plaintext subimages are processed
Figure BDA0003178324900000053
Respectively inputting two pixels into a rectangular function f as a group, and respectively executing rectangular mapping operation to obtain respective ciphertext sub-images
Figure BDA0003178324900000054
The rectangular function f is defined as:
Figure BDA0003178324900000061
wherein row and col respectively represent the row number and the column number of the pixel pix; l, U denote pixels immediately to the left and top of the pixel, respectively.
And finally, obtaining three ciphertext sub-images by adopting an RGB (red, green and blue) model for the three ciphertext sub-images
Figure BDA0003178324900000062
Synthesizing into a channel image to obtain the final ciphertext image IC
The above methods (algorithms) are all reversible, and the decryption algorithm is the inverse process of the above encryption algorithm.
The present embodiment is only for explaining the present invention, and it is not limited to the present invention, and those skilled in the art can make modifications of the present embodiment without inventive contribution as needed after reading the present specification, but all of them are protected by patent law within the scope of the claims of the present invention.

Claims (7)

1. A color image encryption method based on Logistic double-pixel rectangular mapping is characterized by comprising the following steps:
step 101: according to the seed key k ═ k1,k2) K in (1)1Constructing a color key image IK
Step 102: for the read-in plain text color image IPConverting into RGB color space, and further separating to R, G, B channels to obtain three plaintext subimages
Figure FDA0003178324890000011
Step 103: according to k2And performing three plaintext sub-images obtained in the step 102 by using a Logistic chaotic systemDisorder to obtain
Figure FDA0003178324890000012
Step 104: the sub-image obtained in step 103
Figure FDA0003178324890000013
Respectively executing rectangular mapping operation to obtain respective ciphertext sub-images
Figure FDA0003178324890000014
Step 105: three ciphertext sub-images obtained in the step 104
Figure FDA0003178324890000015
Synthesized into a final ciphertext image IC
2. The method for encrypting a color image based on Logistic double-pixel rectangular mapping according to claim 1, wherein the step 101 constructs a color key image I according to a seed keyK(ii) a The seed key is composed of integers ranging from 0 to 255, the length of the seed key is variable, the maximum length is 256, and a constructed key image IKExpressed as RGB space of
Figure FDA0003178324890000016
3. The method according to claim 1, wherein the step 102 represents the inputted plaintext color image by using an RGB color model to obtain three component sub-images.
4. The method for encrypting the color image based on Logistic double-pixel rectangular mapping according to claim 1, wherein the Logistic chaotic system mathematical model adopted in the step 103 is as follows:
xk+1=μxk(1-xk) (1)
wherein x isk,xk+1∈(0,1),μ∈(0,4]When 3.5699456<μ<And 4, the system enters a chaotic state.
5. The method of claim 1, wherein the plaintext sub-image is encrypted in step 104 according to a Logistic two-pixel rectangular mapping color image encryption method
Figure FDA0003178324890000021
Respectively using two pixels as a group, inputting the two pixels into a rectangular function f to respectively obtain three ciphertext sub-images
Figure FDA0003178324890000022
The rectangular function f is defined as:
Figure FDA0003178324890000023
wherein row and col respectively represent the row number and the column number of the pixel pix; l, U denote pixels immediately to the left and top of the pixel, respectively.
6. The method for encrypting the color image based on Logistic double-pixel rectangular mapping according to the claim 1, wherein the three ciphertext sub-images are synthesized into the image of one channel by adopting an RGB model in the step 105, and the final ciphertext image is obtained.
7. The method of encrypting a color image based on Logistic two-pixel rectangular mapping according to claim 1, wherein the decryption algorithm is the inverse process of the encryption algorithm.
CN202110839190.6A 2021-07-23 2021-07-23 Logistic-based double-pixel rectangular mapping color image encryption and decryption method Pending CN113595715A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110839190.6A CN113595715A (en) 2021-07-23 2021-07-23 Logistic-based double-pixel rectangular mapping color image encryption and decryption method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110839190.6A CN113595715A (en) 2021-07-23 2021-07-23 Logistic-based double-pixel rectangular mapping color image encryption and decryption method

Publications (1)

Publication Number Publication Date
CN113595715A true CN113595715A (en) 2021-11-02

Family

ID=78249535

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110839190.6A Pending CN113595715A (en) 2021-07-23 2021-07-23 Logistic-based double-pixel rectangular mapping color image encryption and decryption method

Country Status (1)

Country Link
CN (1) CN113595715A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112417467A (en) * 2020-10-26 2021-02-26 南昌大学 Image encryption method based on anti-neurocryptography and SHA control chaos
CN114615091A (en) * 2022-05-10 2022-06-10 中国空气动力研究与发展中心计算空气动力研究所 Industrial time sequence measurement and control data rapid encryption and transmission method

Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040202326A1 (en) * 2003-04-10 2004-10-14 Guanrong Chen System and methods for real-time encryption of digital images based on 2D and 3D multi-parametric chaotic maps
US20100241869A1 (en) * 2007-09-13 2010-09-23 Karthik Chandrashekar Iyer Encryption By Pixel Property Separation
US20110311042A1 (en) * 2008-10-23 2011-12-22 University Of Ulster Encryption method
CN104040934A (en) * 2011-12-15 2014-09-10 英特尔公司 Preserving image privacy when manipulated by cloud services
CN106855564A (en) * 2016-12-28 2017-06-16 华东交通大学 A kind of efficient micro swirl coagulation flco detecting system
CN107734208A (en) * 2017-10-11 2018-02-23 中共中央办公厅电子科技学院 A kind of coloured image encipher-decipher method based on HSV space
CN108133445A (en) * 2016-12-01 2018-06-08 钦州市晶通科技有限公司 A kind of image encryption method for spreading mapping scramble and being combined with chaos system
CN108322622A (en) * 2018-02-23 2018-07-24 哈尔滨理工大学 A kind of color digital image encryption method based on 2D-VMD and octuple hyperchaotic system
WO2018153317A1 (en) * 2017-02-24 2018-08-30 陈伟 Chaotic map-based digital chaotic encryption method
CN108696666A (en) * 2018-05-16 2018-10-23 河南大学 Color image encrypting method based on Latin square scramble
CN208664501U (en) * 2018-08-14 2019-03-29 华东交通大学 A kind of pair of image carries out the device of watermark encrypting
US20190207745A1 (en) * 2017-04-26 2019-07-04 Zhuhai College Of Jilin University Sequential Encryption Method Based On Multi-Key Stream Ciphers
KR20190104728A (en) * 2018-03-02 2019-09-11 인천대학교 산학협력단 Apparatus and Method for Encrypting Based on Combined Chaos in Body Area Network
CN110417539A (en) * 2019-08-02 2019-11-05 齐齐哈尔大学 A kind of color image encrypting method of dynamic chaos and matrix convolution operation
CN112637441A (en) * 2020-12-14 2021-04-09 天津大学 Color image compression encryption method based on compressed sensing

Patent Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040202326A1 (en) * 2003-04-10 2004-10-14 Guanrong Chen System and methods for real-time encryption of digital images based on 2D and 3D multi-parametric chaotic maps
US20100241869A1 (en) * 2007-09-13 2010-09-23 Karthik Chandrashekar Iyer Encryption By Pixel Property Separation
US20110311042A1 (en) * 2008-10-23 2011-12-22 University Of Ulster Encryption method
CN104040934A (en) * 2011-12-15 2014-09-10 英特尔公司 Preserving image privacy when manipulated by cloud services
CN108133445A (en) * 2016-12-01 2018-06-08 钦州市晶通科技有限公司 A kind of image encryption method for spreading mapping scramble and being combined with chaos system
CN106855564A (en) * 2016-12-28 2017-06-16 华东交通大学 A kind of efficient micro swirl coagulation flco detecting system
WO2018153317A1 (en) * 2017-02-24 2018-08-30 陈伟 Chaotic map-based digital chaotic encryption method
US20190207745A1 (en) * 2017-04-26 2019-07-04 Zhuhai College Of Jilin University Sequential Encryption Method Based On Multi-Key Stream Ciphers
CN107734208A (en) * 2017-10-11 2018-02-23 中共中央办公厅电子科技学院 A kind of coloured image encipher-decipher method based on HSV space
CN108322622A (en) * 2018-02-23 2018-07-24 哈尔滨理工大学 A kind of color digital image encryption method based on 2D-VMD and octuple hyperchaotic system
KR20190104728A (en) * 2018-03-02 2019-09-11 인천대학교 산학협력단 Apparatus and Method for Encrypting Based on Combined Chaos in Body Area Network
CN108696666A (en) * 2018-05-16 2018-10-23 河南大学 Color image encrypting method based on Latin square scramble
CN208664501U (en) * 2018-08-14 2019-03-29 华东交通大学 A kind of pair of image carries out the device of watermark encrypting
CN110417539A (en) * 2019-08-02 2019-11-05 齐齐哈尔大学 A kind of color image encrypting method of dynamic chaos and matrix convolution operation
CN112637441A (en) * 2020-12-14 2021-04-09 天津大学 Color image compression encryption method based on compressed sensing

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
ZHAO LI-LI: "Decimal Counter Based on Redundancy-Restraining Technique", IEEE *
谢国波;朱润盈;: "复合级联混沌的彩色图像加密算法", 计算机工程与应用, no. 08 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112417467A (en) * 2020-10-26 2021-02-26 南昌大学 Image encryption method based on anti-neurocryptography and SHA control chaos
CN114615091A (en) * 2022-05-10 2022-06-10 中国空气动力研究与发展中心计算空气动力研究所 Industrial time sequence measurement and control data rapid encryption and transmission method
CN114615091B (en) * 2022-05-10 2022-07-22 中国空气动力研究与发展中心计算空气动力研究所 Industrial time sequence measurement and control data rapid encryption and transmission method

Similar Documents

Publication Publication Date Title
Li et al. Improvements of a two-in-one image secret sharing scheme based on gray mixing model
Hou et al. A visual cryptographic technique for chromatic images using multi-pixel encoding method
Lukac et al. Colour image secret sharing
Chang et al. Attacks on image encryption schemes for privacy-preserving deep neural networks
CN113595715A (en) Logistic-based double-pixel rectangular mapping color image encryption and decryption method
Chang et al. A sudoku-based secret image sharing scheme with reversibility
Youmaran et al. An improved visual cryptography scheme for secret hiding
CN113067696B (en) Multi-round symmetrical digital image encryption method and system based on bit grouping
CN110535624A (en) A kind of medical image method for secret protection applied to DICOM format
Maurya et al. An extended visual cryptography technique for medical image security
Albahrani et al. New chaotic substation and permutation method for image encryption
CN113992810B (en) Agile image encryption method based on deep learning
Jithi et al. Progressive visual cryptography with watermarking for meaningful shares
CN112152775A (en) Image encryption method based on two-dimensional Henon-Chebyshev chaotic mapping and gene operation
Sharma et al. A new image encryption using modified aes algorithm and its comparision with AES
CN114401351B (en) Image encryption and decryption method based on two-dimensional fractional order chaotic mapping
Tabash et al. Image encryption algorithm based on chaotic map
CN112788196B (en) Double-image encryption method based on convolution neural network dynamic self-adaptive diffusion
Shi et al. A (t, n) secret sharing scheme for image encryption
Wu et al. Threshold visual cryptography scheme for color images with no pixel expansion
Marañón et al. Sharing secret color images using cellular automata with memory
Hsiao et al. Enhancing image quality in Visual Cryptography with colors
CN111479032B (en) Color image encryption method, device and storage medium
CN109920015B (en) Image visual meaningful encryption method based on fractal graph generation
Albdour Image encryption methodology based on cellular automata

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination