CN113595715A - Logistic-based double-pixel rectangular mapping color image encryption and decryption method - Google Patents
Logistic-based double-pixel rectangular mapping color image encryption and decryption method Download PDFInfo
- Publication number
- CN113595715A CN113595715A CN202110839190.6A CN202110839190A CN113595715A CN 113595715 A CN113595715 A CN 113595715A CN 202110839190 A CN202110839190 A CN 202110839190A CN 113595715 A CN113595715 A CN 113595715A
- Authority
- CN
- China
- Prior art keywords
- image
- color
- logistic
- encryption
- color image
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 28
- 238000013507 mapping Methods 0.000 title claims description 18
- 230000000739 chaotic effect Effects 0.000 claims abstract description 19
- 238000013178 mathematical model Methods 0.000 claims description 3
- 230000000694 effects Effects 0.000 abstract description 3
- 230000005540 biological transmission Effects 0.000 abstract description 2
- 238000012545 processing Methods 0.000 abstract description 2
- 238000007781 pre-processing Methods 0.000 abstract 1
- 238000010586 diagram Methods 0.000 description 4
- 239000013307 optical fiber Substances 0.000 description 4
- 238000010276 construction Methods 0.000 description 3
- 239000011159 matrix material Substances 0.000 description 3
- 238000009792 diffusion process Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000002441 reversible effect Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000009795 derivation Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 230000002349 favourable effect Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000035945 sensitivity Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/001—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/46—Colour picture communication systems
- H04N1/56—Processing of colour picture signals
Abstract
The invention relates to the technical field of information security and image processing, and provides a color image encryption and decryption method. The method can quickly finish the encryption and decryption of various color images, and the encrypted ciphertext image destroys the structure of the plaintext image and can effectively resist the statistical attack of the image pixel frequency. The color image encryption method comprises the steps of firstly constructing a color key image for controlling an encryption algorithm and a decryption algorithm; secondly, preprocessing the plaintext color image by using a Logistic chaotic system, then searching ciphertext pixels in a rectangle formed by the key image by using double pixels as groups in each channel of the plaintext image, and finally outputting the ciphertext color image. The method has high encryption efficiency and strong practicability, can effectively resist frequency statistics attack and plaintext selection attack, has good encryption effect, can be applied to scenes such as generation, storage, transmission and the like of color images, and effectively protects the confidentiality of the color images.
Description
Technical Field
The invention relates to the field of information security, in particular to a method for encrypting and decrypting a color image based on Logistic double-pixel rectangular mapping.
Background
At present, computer networks and multimedia technologies are rapidly developed, and people generally use various images to express information in work and life, wherein color images are used more frequently. The security of color images is challenging due to their widespread use. The encryption algorithms such as AES and RSA commonly used in the field of information security cannot be directly applied to the security implementation of color images. This is due to the fact that on the one hand the amount of color image data is very large, especially for high-resolution color images which are often used today; on the other hand, the traditional encryption algorithm mainly aims at text data during design, so that the encryption algorithm is complex, for example, the DES algorithm needs 16 iterations, the AES algorithm iterates at least 10 iterations, and the public key algorithm such as RSA is less efficient than the DES algorithm.
The attractor dimension of the chaotic system is fractal dimension, has a very complex fractal structure and good unpredictability, and the chaotic system has extreme sensitivity to initial conditions and parameters, so the chaotic system can be used in the field of data confidentiality. The existing chaos-based image security technology generally performs encryption processing on an image on the basis of chaos mapping. For example, patent publication No. CN108234813A discloses a plaintext associated image encryption algorithm based on hyperchaotic Chen system, which generates four pseudo-random sequence matrices through the Chen chaotic system, and then performs operations such as forward diffusion, scrambling and reverse diffusion on a plaintext image, thereby obtaining a final ciphertext image. Although the method solves the problem that the key space of the Logistic chaotic system is small, the process is complex, and the image encryption is not favorable. In general, the problems of the prior art are: the algorithm is complex, so that the efficiency is low when the image is encrypted and decrypted, the time is consumed, and the method is particularly suitable for encrypting the color image; the security of the algorithm needs to be further improved.
Disclosure of Invention
In order to solve the technical problems, the invention provides a method for encrypting a color image based on Logistic double-pixel rectangular mapping, which constructs a rectangular mapping function on the basis of a chaotic system and well balances the relationship between algorithm complexity and safety.
The technical purpose of the invention is realized by the following technical scheme:
a color image encryption method based on Logistic double-pixel rectangular mapping comprises the following steps:
step 101: according to the seed key k ═ k1,k2) K in (1)1Constructing a color key image IK;
Step 102: for the read-in plain text color image IPConverting into RGB color space, and further separating to R, G, B channels to obtain three plaintext subimages
Step 103: according to k2Disturbing the three plaintext sub-images obtained in the step 102 by using a Logistic chaotic system to obtain
Step 104: the sub-image obtained in step 103Respectively executing rectangular mapping operation to obtain respective ciphertext sub-images
Step 105: three ciphertext sub-images obtained in the step 104Synthesized into a final ciphertext image IC。
Preferably, the color key image I is constructed in step 101 according to the seed keyK(ii) a The seed key is composed of integers between 0 and 255, the length of the seed key is variable, the maximum length is 256, which is equivalent to 2048 bits long, and a constructed key image IKExpressed as RGB space of
Preferably, the RGB color model is used to represent the input plaintext color image in step 102, resulting in three component sub-images.
As a preferred scheme, the Logistic chaotic system mathematical model adopted in step 103 is as follows:
xk+1=μxk(1-xk) (1)
wherein x isk,xk+1∈(0,1),μ∈(0,4]When 3.5699456 < mu < 4, the system enters a chaotic state.
Preferably, the plaintext sub-images are processed in step 104Respectively using two pixels as a group, inputting the two pixels into a rectangular function f to respectively obtain three ciphertext sub-imagesThe rectangular function f is defined as:
wherein row and col respectively represent the row number and the column number of the pixel pix; l, U denote pixels immediately to the left and top of the pixel, respectively.
As a preferred scheme, in step 105, the three ciphertext sub-images are synthesized into an image of one channel by using an RGB model, so as to obtain a final ciphertext image.
Preferably, the decryption algorithm is the inverse of the encryption algorithm.
In conclusion, the invention has the following beneficial effects:
1. the method for encrypting the color image based on Logistic double-pixel rectangular mapping can quickly finish encryption and decryption of various color images, and a ciphertext image obtained by encryption destroys the structure of a plaintext image, so that the statistical attack of the image pixel frequency can be effectively resisted;
2. the color image encryption method based on Logistic double-pixel rectangular mapping has high encryption efficiency and strong practicability, can effectively resist frequency statistics attack and plaintext selection attack, has good encryption effect, can be applied to scenes such as generation, storage, transmission and the like of color images, and effectively protects the confidentiality of the color images.
Drawings
FIG. 1 is a schematic diagram of an encryption process according to an embodiment of the present invention;
FIG. 2 is a block diagram illustrating a decryption process according to an embodiment of the present invention;
FIG. 3 is a schematic diagram of key image construction scan in an embodiment of the invention;
fig. 4 is a diagram of encryption effect in the embodiment of the present invention.
Detailed Description
This specification and claims do not intend to distinguish between components that differ in name but not function. In the following description and in the claims, the terms "include" and "comprise" are used in an open-ended fashion, and thus should be interpreted to mean "include, but not limited to. "substantially" means within an acceptable error range, within which a person skilled in the art can solve the technical problem to substantially achieve the technical result.
The present invention will be described in further detail below with reference to the accompanying drawings, but the present invention is not limited thereto.
First, a color key image I is constructed from a seed keyKThe seeds of the optical fiber are composed of integers from 0 to 255, the length of the optical fiber is variable, the longest optical fiber is 256, and the length of the optical fiber is 2048 bits; constructed key image IKCan be expressed as RGB space
Wherein, the color key image IKThe construction method of (2) is as follows:
1. inputting a chaotic initial value;
2. generating a sequence L1 with the size of L (0< L <256) by using a Logistic chaotic system;
3. amplifying each value of the sequence obtained by the chaotic system by 1000 times, and then performing modulus selection on 256 to obtain L2;
4. filling L2 in the matrix of 16 x 16 in the order of FIG. 3 scanning, skipping repeated digits without writing, and filling the rest in the order of small to large in FIG. 3 until the whole matrix position is filled, to obtain the key image I of 16 x 16 sizeK。
Color key image IKThe construction principle of (1) is as follows: the key is a 16-order square matrix consisting of 256 gray-scale pixels. I isKThe derivation depends on the seed key k1, repeated unwritten, with the remainder filled in pixel-wise order from small to large.
Then, starting the image encryption process, and reading in the plaintext color image IPConverting into RGB color space, expressing the input plaintext color image by RGB color model, further separating to R, G and B channels to obtain three plaintext sub-images
Then according to k2Disturbing the three plaintext sub-images obtained in the step 102 by using a Logistic chaotic system to obtainThe Logistic chaotic system mathematical model comprises the following steps:
xk+1=μxk(1-xk) (1)
wherein x isk,xk+1∈(0,1),μ∈(0,4]When 3.5699456<μ<And 4, the system enters a chaotic state.
At the same time, the plaintext subimages are processedRespectively inputting two pixels into a rectangular function f as a group, and respectively executing rectangular mapping operation to obtain respective ciphertext sub-imagesThe rectangular function f is defined as:
wherein row and col respectively represent the row number and the column number of the pixel pix; l, U denote pixels immediately to the left and top of the pixel, respectively.
And finally, obtaining three ciphertext sub-images by adopting an RGB (red, green and blue) model for the three ciphertext sub-imagesSynthesizing into a channel image to obtain the final ciphertext image IC。
The above methods (algorithms) are all reversible, and the decryption algorithm is the inverse process of the above encryption algorithm.
The present embodiment is only for explaining the present invention, and it is not limited to the present invention, and those skilled in the art can make modifications of the present embodiment without inventive contribution as needed after reading the present specification, but all of them are protected by patent law within the scope of the claims of the present invention.
Claims (7)
1. A color image encryption method based on Logistic double-pixel rectangular mapping is characterized by comprising the following steps:
step 101: according to the seed key k ═ k1,k2) K in (1)1Constructing a color key image IK;
Step 102: for the read-in plain text color image IPConverting into RGB color space, and further separating to R, G, B channels to obtain three plaintext subimages
Step 103: according to k2And performing three plaintext sub-images obtained in the step 102 by using a Logistic chaotic systemDisorder to obtain
Step 104: the sub-image obtained in step 103Respectively executing rectangular mapping operation to obtain respective ciphertext sub-images
2. The method for encrypting a color image based on Logistic double-pixel rectangular mapping according to claim 1, wherein the step 101 constructs a color key image I according to a seed keyK(ii) a The seed key is composed of integers ranging from 0 to 255, the length of the seed key is variable, the maximum length is 256, and a constructed key image IKExpressed as RGB space of
3. The method according to claim 1, wherein the step 102 represents the inputted plaintext color image by using an RGB color model to obtain three component sub-images.
4. The method for encrypting the color image based on Logistic double-pixel rectangular mapping according to claim 1, wherein the Logistic chaotic system mathematical model adopted in the step 103 is as follows:
xk+1=μxk(1-xk) (1)
wherein x isk,xk+1∈(0,1),μ∈(0,4]When 3.5699456<μ<And 4, the system enters a chaotic state.
5. The method of claim 1, wherein the plaintext sub-image is encrypted in step 104 according to a Logistic two-pixel rectangular mapping color image encryption methodRespectively using two pixels as a group, inputting the two pixels into a rectangular function f to respectively obtain three ciphertext sub-imagesThe rectangular function f is defined as:
wherein row and col respectively represent the row number and the column number of the pixel pix; l, U denote pixels immediately to the left and top of the pixel, respectively.
6. The method for encrypting the color image based on Logistic double-pixel rectangular mapping according to the claim 1, wherein the three ciphertext sub-images are synthesized into the image of one channel by adopting an RGB model in the step 105, and the final ciphertext image is obtained.
7. The method of encrypting a color image based on Logistic two-pixel rectangular mapping according to claim 1, wherein the decryption algorithm is the inverse process of the encryption algorithm.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110839190.6A CN113595715A (en) | 2021-07-23 | 2021-07-23 | Logistic-based double-pixel rectangular mapping color image encryption and decryption method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110839190.6A CN113595715A (en) | 2021-07-23 | 2021-07-23 | Logistic-based double-pixel rectangular mapping color image encryption and decryption method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113595715A true CN113595715A (en) | 2021-11-02 |
Family
ID=78249535
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110839190.6A Pending CN113595715A (en) | 2021-07-23 | 2021-07-23 | Logistic-based double-pixel rectangular mapping color image encryption and decryption method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113595715A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112417467A (en) * | 2020-10-26 | 2021-02-26 | 南昌大学 | Image encryption method based on anti-neurocryptography and SHA control chaos |
CN114615091A (en) * | 2022-05-10 | 2022-06-10 | 中国空气动力研究与发展中心计算空气动力研究所 | Industrial time sequence measurement and control data rapid encryption and transmission method |
Citations (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040202326A1 (en) * | 2003-04-10 | 2004-10-14 | Guanrong Chen | System and methods for real-time encryption of digital images based on 2D and 3D multi-parametric chaotic maps |
US20100241869A1 (en) * | 2007-09-13 | 2010-09-23 | Karthik Chandrashekar Iyer | Encryption By Pixel Property Separation |
US20110311042A1 (en) * | 2008-10-23 | 2011-12-22 | University Of Ulster | Encryption method |
CN104040934A (en) * | 2011-12-15 | 2014-09-10 | 英特尔公司 | Preserving image privacy when manipulated by cloud services |
CN106855564A (en) * | 2016-12-28 | 2017-06-16 | 华东交通大学 | A kind of efficient micro swirl coagulation flco detecting system |
CN107734208A (en) * | 2017-10-11 | 2018-02-23 | 中共中央办公厅电子科技学院 | A kind of coloured image encipher-decipher method based on HSV space |
CN108133445A (en) * | 2016-12-01 | 2018-06-08 | 钦州市晶通科技有限公司 | A kind of image encryption method for spreading mapping scramble and being combined with chaos system |
CN108322622A (en) * | 2018-02-23 | 2018-07-24 | 哈尔滨理工大学 | A kind of color digital image encryption method based on 2D-VMD and octuple hyperchaotic system |
WO2018153317A1 (en) * | 2017-02-24 | 2018-08-30 | 陈伟 | Chaotic map-based digital chaotic encryption method |
CN108696666A (en) * | 2018-05-16 | 2018-10-23 | 河南大学 | Color image encrypting method based on Latin square scramble |
CN208664501U (en) * | 2018-08-14 | 2019-03-29 | 华东交通大学 | A kind of pair of image carries out the device of watermark encrypting |
US20190207745A1 (en) * | 2017-04-26 | 2019-07-04 | Zhuhai College Of Jilin University | Sequential Encryption Method Based On Multi-Key Stream Ciphers |
KR20190104728A (en) * | 2018-03-02 | 2019-09-11 | 인천대학교 산학협력단 | Apparatus and Method for Encrypting Based on Combined Chaos in Body Area Network |
CN110417539A (en) * | 2019-08-02 | 2019-11-05 | 齐齐哈尔大学 | A kind of color image encrypting method of dynamic chaos and matrix convolution operation |
CN112637441A (en) * | 2020-12-14 | 2021-04-09 | 天津大学 | Color image compression encryption method based on compressed sensing |
-
2021
- 2021-07-23 CN CN202110839190.6A patent/CN113595715A/en active Pending
Patent Citations (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040202326A1 (en) * | 2003-04-10 | 2004-10-14 | Guanrong Chen | System and methods for real-time encryption of digital images based on 2D and 3D multi-parametric chaotic maps |
US20100241869A1 (en) * | 2007-09-13 | 2010-09-23 | Karthik Chandrashekar Iyer | Encryption By Pixel Property Separation |
US20110311042A1 (en) * | 2008-10-23 | 2011-12-22 | University Of Ulster | Encryption method |
CN104040934A (en) * | 2011-12-15 | 2014-09-10 | 英特尔公司 | Preserving image privacy when manipulated by cloud services |
CN108133445A (en) * | 2016-12-01 | 2018-06-08 | 钦州市晶通科技有限公司 | A kind of image encryption method for spreading mapping scramble and being combined with chaos system |
CN106855564A (en) * | 2016-12-28 | 2017-06-16 | 华东交通大学 | A kind of efficient micro swirl coagulation flco detecting system |
WO2018153317A1 (en) * | 2017-02-24 | 2018-08-30 | 陈伟 | Chaotic map-based digital chaotic encryption method |
US20190207745A1 (en) * | 2017-04-26 | 2019-07-04 | Zhuhai College Of Jilin University | Sequential Encryption Method Based On Multi-Key Stream Ciphers |
CN107734208A (en) * | 2017-10-11 | 2018-02-23 | 中共中央办公厅电子科技学院 | A kind of coloured image encipher-decipher method based on HSV space |
CN108322622A (en) * | 2018-02-23 | 2018-07-24 | 哈尔滨理工大学 | A kind of color digital image encryption method based on 2D-VMD and octuple hyperchaotic system |
KR20190104728A (en) * | 2018-03-02 | 2019-09-11 | 인천대학교 산학협력단 | Apparatus and Method for Encrypting Based on Combined Chaos in Body Area Network |
CN108696666A (en) * | 2018-05-16 | 2018-10-23 | 河南大学 | Color image encrypting method based on Latin square scramble |
CN208664501U (en) * | 2018-08-14 | 2019-03-29 | 华东交通大学 | A kind of pair of image carries out the device of watermark encrypting |
CN110417539A (en) * | 2019-08-02 | 2019-11-05 | 齐齐哈尔大学 | A kind of color image encrypting method of dynamic chaos and matrix convolution operation |
CN112637441A (en) * | 2020-12-14 | 2021-04-09 | 天津大学 | Color image compression encryption method based on compressed sensing |
Non-Patent Citations (2)
Title |
---|
ZHAO LI-LI: "Decimal Counter Based on Redundancy-Restraining Technique", IEEE * |
谢国波;朱润盈;: "复合级联混沌的彩色图像加密算法", 计算机工程与应用, no. 08 * |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112417467A (en) * | 2020-10-26 | 2021-02-26 | 南昌大学 | Image encryption method based on anti-neurocryptography and SHA control chaos |
CN114615091A (en) * | 2022-05-10 | 2022-06-10 | 中国空气动力研究与发展中心计算空气动力研究所 | Industrial time sequence measurement and control data rapid encryption and transmission method |
CN114615091B (en) * | 2022-05-10 | 2022-07-22 | 中国空气动力研究与发展中心计算空气动力研究所 | Industrial time sequence measurement and control data rapid encryption and transmission method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Li et al. | Improvements of a two-in-one image secret sharing scheme based on gray mixing model | |
Hou et al. | A visual cryptographic technique for chromatic images using multi-pixel encoding method | |
Lukac et al. | Colour image secret sharing | |
Chang et al. | Attacks on image encryption schemes for privacy-preserving deep neural networks | |
CN113595715A (en) | Logistic-based double-pixel rectangular mapping color image encryption and decryption method | |
Chang et al. | A sudoku-based secret image sharing scheme with reversibility | |
Youmaran et al. | An improved visual cryptography scheme for secret hiding | |
CN113067696B (en) | Multi-round symmetrical digital image encryption method and system based on bit grouping | |
CN110535624A (en) | A kind of medical image method for secret protection applied to DICOM format | |
Maurya et al. | An extended visual cryptography technique for medical image security | |
Albahrani et al. | New chaotic substation and permutation method for image encryption | |
CN113992810B (en) | Agile image encryption method based on deep learning | |
Jithi et al. | Progressive visual cryptography with watermarking for meaningful shares | |
CN112152775A (en) | Image encryption method based on two-dimensional Henon-Chebyshev chaotic mapping and gene operation | |
Sharma et al. | A new image encryption using modified aes algorithm and its comparision with AES | |
CN114401351B (en) | Image encryption and decryption method based on two-dimensional fractional order chaotic mapping | |
Tabash et al. | Image encryption algorithm based on chaotic map | |
CN112788196B (en) | Double-image encryption method based on convolution neural network dynamic self-adaptive diffusion | |
Shi et al. | A (t, n) secret sharing scheme for image encryption | |
Wu et al. | Threshold visual cryptography scheme for color images with no pixel expansion | |
Marañón et al. | Sharing secret color images using cellular automata with memory | |
Hsiao et al. | Enhancing image quality in Visual Cryptography with colors | |
CN111479032B (en) | Color image encryption method, device and storage medium | |
CN109920015B (en) | Image visual meaningful encryption method based on fractal graph generation | |
Albdour | Image encryption methodology based on cellular automata |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |