CN113904765A - Airborne television guidance transmission image encryption method based on chaotic sequence - Google Patents
Airborne television guidance transmission image encryption method based on chaotic sequence Download PDFInfo
- Publication number
- CN113904765A CN113904765A CN202110716616.9A CN202110716616A CN113904765A CN 113904765 A CN113904765 A CN 113904765A CN 202110716616 A CN202110716616 A CN 202110716616A CN 113904765 A CN113904765 A CN 113904765A
- Authority
- CN
- China
- Prior art keywords
- image
- pixel
- row
- encryption
- matrix
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/001—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using chaotic signals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/50—Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Facsimile Transmission Control (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
- Storage Device Security (AREA)
Abstract
The method for encrypting the airborne television guidance transmission image based on the chaos sequence comprises the following encryption steps: graying and pixel filling of an image, scrambling and encrypting in a row mode, blocking the image, extracting a central image, scrambling and encrypting the central image in a column mode, and performing cat mapping and encrypting on the central image; the decryption step comprises: the image is blocked and a central image is extracted, the generalized cat mapping pixel scrambling and decrypting of the central image, the column decrypting of the central image and the line decrypting of the image are carried out. The method realizes rapidity by adopting a mode of extracting the intermediate image for encryption, reduces the number of keys and reduces the memory occupation.
Description
Technical Field
The invention relates to the technical field of image processing, in particular to an encryption method for an airborne television guidance transmission image based on a chaos sequence.
Background
In the era of rapid development of the internet, digital images are widely applied and researched in various fields due to strong intuition and rich information quantity, and image information becomes one of the important modes for information transmission and communication of modern human beings. Meanwhile, the related security problem of image transmission is also attracting attention. Therefore, more and more scholars are dedicated to research on the subject, and in recent years, various new encryption algorithms and encryption modes are developed, which provides infinite possibility for the encryption mode of image transmission. Each encryption mode has the advantages or short boards of the encryption mode, the effect of making up for the deficiencies of the encryption modes can be achieved through reasonable combination and application of the encryption modes, and the safety performance of image transmission is greatly enhanced. Meanwhile, according to the actual situation, different encryption modes are designed to realize specific functions or endow ideal characteristics. In the military field, information security becomes increasingly important, and the information stealing and anti-stealing technology is mature from the perspective of information battlefields in all countries and military parties.
The air-to-air and air-to-ground missile is used as a main weapon for air-to-air combat and air-to-ground combat, and has irreplaceable effects on capturing air control right and striking ground targets. With the demand of air combat and the change of science and technology, the performance of air-ground missiles is gradually improved, and the air-ground missiles are developed into an air-ground missile family with multiple ranges, seriation, sea, land and air universalization and diversified guidance modes. A composite guidance system or a remote control guidance system used by an airborne television guidance missile needs to issue a control instruction to the missile according to target information of an image returned by a missile seeker at the present stage and control the missile to fly to a target. An enemy can intercept and capture image information returned by the missile through interception, defense and targeted interference are further implemented, an encryption method for the image of the television guidance system needs to be designed for preventing target information in the image from being decoded by the enemy, and particularly, protection for the central area of the image, namely target characteristics needs to be designed for attacking the target.
Missiles are increasingly becoming an important strategic deterrent and primary tactical means in modern warfare. The ground combat service receives the images transmitted back by the missiles in real time so as to ensure that the missiles can hit the target smoothly in the correct flight. The air-ground image transmission is an important ring, and the images must be encrypted in real time in the process so as to avoid missile interception and other conditions caused by interception of image information. Aiming at the characteristic of the transient change of the battlefield condition, the image encryption technology is required to have rapidity and safety.
Disclosure of Invention
Aiming at the problems in the prior art, the invention provides a chaos sequence-based airborne television guidance transmission image encryption method, which specifically comprises the following steps:
first, encryption step
The first step is as follows: image graying and pixel filling
Acquiring the size M N of an original image to be encrypted, wherein M, N is a non-zero natural number which is greater than or equal to 16 and is a multiple of 16; representing pixel points of the image as P (0, 0), P (0, 1).. P (i, j).. P (M, N); i. j represents the horizontal and vertical coordinates of the pixel point, namely the pixel point is positioned in the ith row and the jth column; the original image is processed according to a weighted average formula
P(i,j)=0.299*R(i,j)+0.578G(i,j)+0.114*B(i,j) ①
Carrying out image graying to obtain a grayscale image P0(ii) a Performing a boundary complement 0 operation, wherein 0 represents black, so that the length and the width of the image are equal; the method specifically comprises the following steps: if M is less than or equal to N, supplementing the image into a new image of N x N in a graph supplementing mode; if M is larger than N, supplementing the image into a new image of M by means of graph supplementing; suppose an image P obtained after supplementation1Size M x M, and pixel value matrix denoted A1;
The second step is that: line scrambling encryption
2.1 logical Logistic mapping
Nonlinear iterative equations of the mathematical model of the one-dimensional Logistic mapping:
Xk+1=μXk(1-Xk) ②
wherein, mu belongs to [0, 4 ]]Referred to as Logistic parameter; k is an arbitrary natural number of 1 or more. When mu is not less than 3.57 and not more than 4, XkIs a random number, X, generated iteratively according to the formula-kEntering a chaotic state; and outside this range, the number series X is generated0、X1、X2…XkWill necessarily converge to a certain specific value;
2.2 definition of the region R
Defining the interval length asInterval(s)Corresponding to all pixels in the first line of the image, intervalCorresponding to all pixels in the second row of the imageAll pixels (i is 1, 2 … M) in the ith row of the corresponding image;
2.3 line scrambling algorithm step
Giving Logistic mapping parameter mu and initial value X0(ii) a Mu and X0Corresponding to the time constant T, see table 2 for details.
TABLE 2 Logistic parameters Table
According to the formula II, generating a chaotic value X through one iteration1Judgment of X1The range R, if X1∈RhReplacing the pixel point of the first row with the pixel point of the h row;
after M iterations, the operation is carried out on each row of pixel points, and then the row encryption of the image is completed; recording the encrypted image as P2The matrix of image pixels after line encryption is denoted A2;
The third step: image blocking and center image extraction
Will P2Is divided into blocks with the size of256 pixel blocks; denoted Q (0, 0), Q (0, 1) … … Q (15, 15);
the gray image pixel block matrix is represented as
Thereby completing the preprocessing of the image;
the fourth step: encrypting a center image by line scrambling
4.1 definition of the region R'
Defining the interval length asInterval(s)Corresponding to all pixels in the first column of the image, intervalCorresponding to all pixels in the second row of the imageCorresponding to all pixels in the t-th column of the imaget represents the number of pixel columns of the central image instead of the number of pixel blocks;
4.2 sequence scrambling algorithm step
1. Based on the logistic parameter mu and the initial value X in 2.30;
2. Generating a chaos value X through one iteration1Judgment of X1The range R, if X1∈RhReplacing the pixel point of the first row with the pixel point of the h row; throughAnd performing the operation on each row of pixel points in the second iteration, and finishing the centering of the image P3Scrambling and encrypting the column; the encrypted central image is marked as P4A size ofThe image pixel matrix is denoted as A4;
The fifth step: cat mapping encryption is carried out on central image
On the basis of preprocessing, re-encrypting the intermediate image based on cat mapping;
5.1 generalized cat mapping:
applying the cat mapping to image encryption, and discretizing the original cat mapping; i.e. pn,qnThe values of (n-0, 1, 2 …) are all positive integers, pn、qnRespectively representing the horizontal and vertical coordinates of the pixel points; the following generalized cat mapping is obtained:
wherein a and b are positive integers, a and b are both smaller than M, and the determinant | C | ═ 1;
5.2 encryption step:
step 1: let process parameters
a=mod(M,9)+1;
b=mod(N,9)+1;
k=(mod(M,9)+10)(mod(N,9)+10);
Forming a matrix C;
step 2: using matrix C and positive integer k as algorithm parameter, using formula (C) to image P4Scrambling the pixel point position; for the central image P in the order from line 1 to line N, then from column 1 to column M4Each pixel point A of4(i, j) operating to obtain the initial value (p) of (i, j)0,q0) Performing k iterations as initial values of the generalized cat mapping to obtain new positions (p) of the pixel points (i, j)k,qk) (ii) a Performing the operation on each pixel point of the central image to obtain a new encrypted image; recording the encrypted central image as P5A size ofThe image pixel matrix is denoted A5;
Thus, the whole encryption process is completed, and the encrypted image is marked as P6Size (M x M), the image pixel matrix is denoted A6And outputting the image;
step two, decryption
The first step is as follows: image blocking and central image extraction
Will P6Is divided into blocks with the size of256 pixel blocks; denoted Q (0, 0), Q (0, 1) … … Q (15, 15);
the gray image pixel block matrix is represented as
The second step is that: central image generalized cat mapping pixel scrambling decryption
Step 1: acquiring decryption keys a, b and k which are completely the same as the encryption parameters;
step 2: performing inverse pixel value transform by using inverse transform formula
In a matrix C-1And the positive integer k is an algorithm parameter, and the image P 'is processed by a formula'5Scrambling the pixel point position; for center image P 'in order from bottom to top, right to left'5Of each pixel A'5(i, j) is operated, and the initial value (p 'of (i, j) is set'0,q′0) Performing k iterations as an initial value of the generalized cat mapping to obtain a new position (p ') of the pixel point (i, j)'k,q′k) (ii) a Performing the above operation on each pixel point of the central image to obtain a decrypted image, and recording the decrypted image as P'4;
The third step: central image column decryption
Step 1: obtaining decryption keys mu and X0The encryption parameter is completely the same as the encryption parameter and has the clock synchronization characteristic;
step 2: chaos value X generated by iteration using formula 21、X2…X3M/4Judgment of X3M/4The range R, if X3M/4∈RhThen will beThe pixel point of the row is replaced with the pixel point of the ith row; throughIn the second iteration, the operation is carried out on each row of pixel points from right to left, and the center image P 'is completed'4Performing column scrambling and decryption; recording the decrypted image as P'3The size of the image isImage pixel matrix is represented as A'3;
The fourth step: image line decryption
Chaos value X generated by iteration using formula 21、X2…XMJudgment of XMThe range R, if XM∈RhReplacing the pixel point of the Mth row with the pixel point of the ith row; after M iterations, the operations are carried out on each line of pixel points from bottom to top, and the image P 'is completed'3Line scrambling and decrypting; recording the decrypted image as P'3, P′3A size ofImage pixel matrix is represented as A'2;
Thereby completing the decryption process of the image, outputting the decrypted image P'2。
The invention adopts chaotic encryption, improves the rapidity of image encryption and decryption by a method of extracting a central image, and can complete the whole image transmission process by using a small amount of secret keys. The image encryption method of the invention gives consideration to the rapidity of the encryption process and the attack resistance of the encryption result, can greatly improve the security of image transmission, and can be used for the real-time transmission of missile images.
Drawings
FIG. 1 is a schematic row-column scrambling diagram;
FIG. 2 is an encryption flow chart of an encryption method of an airborne television guidance transmission image based on a chaos sequence according to the invention;
FIG. 3 is an original image to be encrypted;
FIG. 4 is a gray scale image of an original image;
FIG. 5 is a diagram of the effect of row scrambling;
FIG. 6 is a diagram of the effect of scrambling the center image column;
FIG. 7 is a diagram of a center image generalized cat mapping encryption effect;
fig. 8 is a decrypted image.
Detailed Description
The present invention will be described in detail below with reference to the accompanying drawings.
First, encryption step
The first step is as follows: image graying and pixel filling
The original image size M × N to be encrypted is obtained M, N as a non-zero natural number equal to or greater than 16 and as a multiple of 16. Representing pixel points of the image as P (0, 0), P (0, 1).. P (i, j).. P (M, N); in this text, i and j represent the horizontal and vertical coordinates of a pixel point, that is, the pixel point is located in the ith row and the jth column. The original image is processed according to a weighted average formula
P(i,j)=0.299*R(i,j)+0.578G(i,j)+0.114*B(i,j) ①
Carrying out image graying to obtain a grayscale image P0. The boundary complement 0 (black) operation is performed so that the image length and width are equal. The method specifically comprises the following steps: if M is less than or equal to N, supplementing the image into a new image of N x N in a graph supplementing mode; if M > N, the image is complemented into a new image of M by means of a complement. Suppose an image P obtained after supplementation1Size M x M, and pixel value matrix denoted A1。
The second step is that: line scrambling encryption
2.1 logical (Logistic) mapping
Nonlinear iterative equations of the mathematical model of the one-dimensional Logistic mapping:
Xk+1=μXk(1-Xk) ②
wherein, mu belongs to [0, 4 ]]Referred to as Logistic parameters. When mu is not less than 3.57 and not more than 4, XkIs a random number generated by iteration according to a formula II, and k is any natural number more than or equal to 1. XkEntering a chaotic state. And outside this range, the number series X is generated0、X1、X2…XkWill necessarily converge to a certain specific value.
2.2 definition of the region R
Defining the interval length asInterval(s)Corresponding to all pixels in the first line of the image, intervalCorresponding to all pixels in the second row of the imageCorresponding to all pixels in the ith row of the image (i ═ 1, 2 … M).
2.3 line scrambling algorithm step
Giving Logistic mapping parameter mu and initial value X0. (mu with X)0Corresponding to the time constant T, see Table 1 for details
TABLE 1 Logistic parameters Table
According to the formula II, generating a chaotic value X through one iteration1Judgment of X1The range R, if X1∈RhThen, the pixel point of the first row is replaced with the pixel point of the h-th row, and the schematic diagram is shown in fig. one.
After M iterations, the above operation is performed on each row of pixel points, and then the row encryption of the image is completed. Recording the encrypted image as P2The matrix of image pixels after line encryption is denoted A2。
The third step: image blocking and center image extraction
Will P2Is divided into blocks with the size of256 pixel blocks. Is shown as Q(0,0)、Q(0,1)……Q(15,15)。
The gray image pixel block matrix is represented as
Thereby completing the pre-processing of the image.
The fourth step: encrypting a center image by line scrambling
4.1 definition of the region R'
Defining the interval length asInterval(s)Corresponding to all pixels in the first column of the image, intervalCorresponding to all pixels in the second row of the imageCorresponding to all pixels in the t-th column of the imaget represents the number of pixel columns of the central image, not the number of pixel blocks.
4.2 sequence scrambling algorithm step
1. Based on 1OGisti in 2.3c parameter mu, initial value X0。
2. Generating a chaos value X through one iteration1Judgment of X1The range R, if X1∈RhThen the pixel point of the first column is replaced with the pixel point of the h column. ThroughAnd performing the operation on each row of pixel points in the second iteration, and finishing the centering of the image P3Is encrypted. The encrypted central image is marked as P4A size ofThe image pixel matrix is denoted as A4。
The fifth step: cat mapping encryption is carried out on central image
On the basis of preprocessing, the rapidity and the reliability of encryption are considered, and the intermediate image is re-encrypted based on cat mapping.
5.1 generalized cat mapping:
the nature of the cat map makes it very suitable for use in encryption systems, where the original cat map is discretized for application in image encryption. I.e. pn,qnThe values of (n-0, 1, 2 …) are all positive integers, pn、qnRespectively representing the horizontal and vertical coordinates of the pixel points. The following generalized cat mapping is obtained:
wherein a and b are positive integers, a and b are both smaller than M, and the determinant | C | ═ 1. Adding modulo constraints to the cat map is still area-reversible, but this may also result in the map no longer being chaotic. The generalized cat mapping still has the property of stretching and folding in a geometric sense, i.e. the position of the original pixel of the image will be mapped to other positions and can therefore be applied to image encryption.
5.2 encryption step:
step 1: let process parameters
a=mod(M,9)+1;
b=mod(N,9)+1;
k=(mod(M,9)+10)(mod(N,9)+10);
Forming a matrix C.
Step 2: using matrix C and positive integer k as algorithm parameter, using formula (C) to image P4The pixel point positions are scrambled. For the central image P in the order from line 1 to line N, then from column 1 to column M4Each pixel point A of4(i, j) operating to obtain the initial value (p) of (i, j)0,q0) Performing k iterations as initial values of the generalized cat mapping to obtain new positions (p) of the pixel points (i, j)k,qk). And performing the operation on each pixel point of the central image to obtain a new encrypted image. Recording the encrypted central image as P5A size ofThe image pixel matrix is denoted A5。
Thus, the whole encryption process is completed, and the encrypted image is marked as P6Size (M x M), the image pixel matrix is denoted A6And outputs an image.
Step two, decryption
The first step is as follows: image blocking and central image extraction
Will P6Is divided into blocks with the size of256 pixel blocks. Denoted as Q (0, 0), Q (0, 1) … … Q (15, 15).
The gray image pixel block matrix is represented as
The second step is that: central image generalized cat mapping pixel scrambling decryption
Step 1: and acquiring decryption keys a, b and k which are completely the same as the encryption parameters.
Step 2: performing inverse pixel value transform by using inverse transform formula
In a matrix C-1And the positive integer k is an algorithm parameter, and the image P 'is processed by a formula'5The pixel point positions are scrambled. For center image P 'in bottom-to-top, right-to-left order (reverse order of encryption)'5Of each pixel A'5(i, j) is operated, and the initial value (p 'of (i, j) is set'0,q′0) Performing k iterations as an initial value of the generalized cat mapping to obtain a new position (p ') of the pixel point (i, j)'k,q′k). Performing the above operation on each pixel point of the central image to obtain a decrypted image, and recording the decrypted image as P'4。
The third step: central image column decryption
Step 1: obtaining decryption keys mu and X0The encryption parameter is identical to the encryption parameter and has a clock synchronization characteristic.
Step 2: chaos value X generated by iteration using formula 21、X2…X3M/4Judgment of X3M/4The range R, if X3M/4∈RhThen will beAnd the pixel point of the column is replaced with the pixel point of the ith column. ThroughIn the second iteration, the operation is carried out on each row of pixel points from right to left, and the center image P 'is completed'4Is decrypted. Recording the decrypted image as P'3(image size of) Image pixel matrix is represented as A'3。
The fourth step: image line decryption
Chaos value X generated by iteration using formula 21、X2…XMJudgment of XMThe range R, if XM∈RhAnd replacing the pixel point of the M-th row with the pixel point of the ith row. After M iterations, the operations are carried out on each line of pixel points from bottom to top, and the image P 'is completed'3Line scrambling decryption. Recording the decrypted image as P'3, P′3A size ofImage pixel matrix is represented as A'2。
Thereby completing the decryption process of the image, outputting the decrypted image P'2。
Examples of the applications
The encryption and decryption process is now performed by taking 256 × 256 images as an example.
First, decryption step
The first step is as follows: image graying and pixel filling
Acquiring an original image to be encrypted, as shown in fig. 3, the size of the original image is 256 × 256, and pixel points of the image are represented as P (0, 0), P (0, 1).. P (i, j).. P (256 ); the original image is processed according to a weighted average formula
P(i,j)=0.299*R(i,j)+0.578G(i,j)+0.114*B(i,j) ①
The image is grayed. Obtaining a grayscale image P1256 × 256, as shown in FIG. 4, the matrix of pixel values is denoted A1。
The second step is that: line scrambling encryption
2.1 definition of the region R
Defining the interval length asInterval(s)Corresponding to all pixels in the first line of the image, intervalSection corresponding to all pixels in the second row of the imageCorresponding to all pixels in the ith row of the image ( i 1, 2.. 256).
2.2 line scrambling algorithm step
Given Logistic mapping parameter mu is 3.93 and initial value X0=0.6。
Generating a chaos value X through one iteration1When X is 0.9432, X is judged1Interval of belongings, X1∈R242Then the pixel point of the first row is replaced with the pixel point of the 242 th row.
2.3 after 256 iterations, the above operation is performed on each row of pixel points, and then the row replacement of the image is completed. Recording the encrypted image as P2As shown in FIG. 5, the matrix of image pixels after row encryption is denoted A2。
The third step: image blocking and center image extraction
Will P2And partitioning into 256 pixel blocks with the size of 16 x 16. Denoted as Q (0, 0), Q (0, 1) … … Q (15, 15).
The gray image pixel block matrix is represented as
Extracting an intermediate partial image P3(image P)3Size 192 × 192) to construct a new pixel matrix a3。
The pre-processing of the image is completed.
The fourth step: encrypting a center image by line scrambling
4.1 definition of the region R'
Defining the interval length asInterval(s)Corresponding to all pixels in the first column of the image, intervalCorresponding to all pixels in the second row of the imageCorresponding to all pixels in the tth column of the image (t is 1, 2 … M).
4.2 sequence scrambling algorithm step
1. Based on the logistic parameter mu of 2.3 ═ 3.93 and the initial value X0=0.6。
2. Generating a chaos value X through one iteration1When X is 0.9432, X is judged1Interval of belongings, X1∈R′182Then the pixel point in the first column is replaced with the pixel point in the 182 th column. After 192 iterations, the above operation is performed on each row of pixels, and the centering of the image P is completed3Is encrypted. The encrypted central image is marked as P4Size 192 × 192, as shown in fig. 6, the image pixel matrix is denoted as a4。
The fifth step: cat mapping encryption is carried out on central image
Step 1: order to
a=mod(256,9)+1=5;
b=mod(256,9)+1=5;
k=(mod(256,9)+10)(mod(256,9)+10)=225;
Forming a matrix C.
Step 2: using matrix C and positive integer 225 as algorithm parameters, and using formula (C) to image P4The pixel point positions are scrambled. For the central image P in row-to-row order from top to bottom4Each pixel point A of4(i, j) operating to obtain the initial value (p) of (i, j)0,q0) Performing k iterations as initial values of the generalized cat mapping to obtain new positions (p) of the pixel points (i, j)k,qk). And carrying out the operation on each pixel point of the central image to obtain a new encrypted image. Recording the encrypted central image as P5Size 192 × 192, and image pixel matrix denoted as A5。
The whole encryption process is completed, and the encrypted image is marked as P6The size is 256 × 256 and the image pixel matrix is denoted a, as shown in fig. 76And outputs an image.
Step two, decryption
The first step is as follows: image blocking and central image extraction
Will P6And partitioning into 256 pixel blocks with the size of 16 x 16. Denoted as Q (0, 0), Q (0, 1) … … Q (15, 15).
The gray image pixel block matrix is represented as
Extracting an intermediate partial image P'5(image P'5Size 192 x 192) constructs a new pixel matrix a'5。
The second step is that: central image generalized cat mapping pixel scrambling decryption
Step 1: the decryption key a is 5, b is 5, and k is 225.
Step 2: performing inverse pixel value transform by using inverse transform formula
In a matrix C-1And positive integer 225 is an algorithm parameter, and the image P 'is processed by a formula'5The pixel point positions are scrambled. For center image P 'in bottom-to-top, right-to-left order (reverse order of encryption)'5Of each pixel A'5(i, j) is operated, and the initial value (p 'of (i, j) is set'0,q′0) Performing k iterations as an initial value of the generalized cat mapping to obtain a new position (p ') of the pixel point (i, j)'k,q′k). Performing the above operation on each pixel point of the central image to obtain a decrypted image, and recording the decrypted image as P'4。
The third step: central image column decryption
Step 1: obtaining decryption key mu-3.93, X0=0.6
Step 2: using iteratively generated chaotic values X1=0.9432、X2=0.2105448768...X192When X is 0.318312973691692, X is judged192The interval R', if X192∈R′62The pixel point in column 192 is replaced with the pixel point in column 62. After 192 iterations, the operation is performed on each column of pixel points from right to left, and then the center image P 'is completed'4In the column ofAnd (6) decrypting. Recording the decrypted image as P'3(image size 256 x 256) and image pixel matrix denoted A'3。
The fourth step: image line decryption
Using iteratively generated chaotic values X1、X2…X256Judgment of X256In the interval of 0.759766630703317, X256∈R195Then the pixel point of the 256 th row is replaced with the pixel point of the 195 th row. After 256 iterations, the above operation is performed on each row of pixel points from bottom to top, and the image P 'is completed'3Line scrambling decryption. Recording the decrypted image as P'3Size 192, image pixel matrix denoted A'2。
The decryption process of the image is completed, and the decrypted image P 'is output'2(see FIG. 7 below).
The advantages of the invention are not listed, but only two outstanding advantages are given as follows:
1. the method for extracting the intermediate image encryption is adopted to realize rapidity.
2. The number of the keys is reduced, and the memory occupation is reduced.
Claims (1)
1. A chaos sequence-based airborne television guidance transmission image encryption method is characterized by comprising the following steps:
first, encryption step
The first step is as follows: image graying and pixel filling
Acquiring the size M N of an original image to be encrypted, wherein M, N is a non-zero natural number which is greater than or equal to 16 and is a multiple of 16; representing pixel points of the image as P (0, 0), P (0, 1).. P (i, j).. P (M, N); i. j represents the horizontal and vertical coordinates of the pixel point, namely the pixel point is positioned in the ith row and the jth column; the original image is processed according to a weighted average formula
P(i,j)=0.299*R(i,j)+0.578G(i,j)+0.114*B(i,j) ①
Carrying out image graying to obtain a grayscale image P0(ii) a A boundary complement 0 operation is performed, 0 representing black, so that the image length is equal toThe widths are equal; the method specifically comprises the following steps: if M is less than or equal to N, supplementing the image into a new image of N x N in a graph supplementing mode; if M is larger than N, supplementing the image into a new image of M by means of graph supplementing; suppose an image P obtained after supplementation1Size M x M, and pixel value matrix denoted A1;
The second step is that: line scrambling encryption
2.1 logical Logistic mapping
Nonlinear iterative equations of the mathematical model of the one-dimensional Logistic mapping:
Xk+1=μXk(1-Xk) ②
wherein, mu belongs to [0, 4 ]]Referred to as Logistic parameter; k is an arbitrary natural number of 1 or more. When mu is not less than 3.57 and not more than 4, XkIs a random number, X, generated iteratively according to the formula-kEntering a chaotic state; and outside this range, the number series X is generated0、X1、X2…XkWill necessarily converge to a certain specific value;
2.2 definition of the region R
Defining the interval length asInterval(s)Corresponding to all pixels in the first line of the image, intervalCorresponding to all pixels in the second row of the imageAll pixels (i is 1, 2 … M) in the ith row of the corresponding image;
2.3 line scrambling algorithm step
Giving Logistic mapping parameter mu and initial value X0(ii) a Mu and X0Corresponding to the time constant T, see table 2 for details.
TABLE 2 Logistic parameters Table
According to the formula II, generating a chaotic value X through one iteration1Judgment of X1The range R, if X1∈RhReplacing the pixel point of the first row with the pixel point of the h row;
after M iterations, the operation is carried out on each row of pixel points, and then the row encryption of the image is completed; recording the encrypted image as P2The matrix of image pixels after line encryption is denoted A2;
The third step: image blocking and center image extraction
Will P2Is divided into blocks with the size of256 pixel blocks; denoted Q (0, 0), Q (0, 1) … … Q (15, 15);
the gray image pixel block matrix is represented as
Thereby completing the preprocessing of the image;
the fourth step: encrypting a center image by line scrambling
4.1 definition of the region R'
Defining the interval length asInterval(s)Corresponding to all pixels in the first column of the image, intervalCorresponding to all pixels in the second row of the imageCorresponding to all pixels in the t-th column of the imaget represents the number of pixel columns of the central image instead of the number of pixel blocks;
4.2 sequence scrambling algorithm step
1. Based on the logistic parameter mu and the initial value X in 2.30;
2. Generating a chaos value X through one iteration1Judgment of X1The range R, if X1∈RhReplacing the pixel point of the first row with the pixel point of the h row; throughAnd performing the operation on each row of pixel points in the second iteration, and finishing the centering of the image P3Scrambling and encrypting the column; the encrypted central image is marked as P4A size ofThe image pixel matrix is denoted as A4;
The fifth step: cat mapping encryption is carried out on central image
On the basis of preprocessing, re-encrypting the intermediate image based on cat mapping;
5.1 generalized cat mapping:
applying the cat mapping to image encryption, and discretizing the original cat mapping; i.e. pn,qnThe values of (n-0, 1, 2 …) are all positive integers, pn、qnRespectively representing the horizontal and vertical coordinates of the pixel points; the following generalized cat mapping is obtained:
wherein a and b are positive integers, a and b are both smaller than M, and the determinant | C | ═ 1;
5.2 encryption step:
step 1: let process parameters
a=mod(M,9)+1;
b=mod(N,9)+1;
k=(mod(M,9)+10)(mod(N,9)+10);
Forming a matrix C;
step 2: using matrix C and positive integer k as algorithm parameter, using formula (C) to image P4Scrambling the pixel point position; for the central image P in the order from line 1 to line N, then from column 1 to column M4Each pixel point A of4(i, j) operating to obtain the initial value (p) of (i, j)0,q0) Performing k iterations as initial values of the generalized cat mapping to obtain new positions (p) of the pixel points (i, j)k,qk) (ii) a Performing the operation on each pixel point of the central image to obtain a new encrypted image; recording the encrypted central image as P5A size ofThe image pixel matrix is denoted A5;
Thus, the whole encryption process is completed, and the encrypted image is marked as P6Size (M x M), the image pixel matrix is denoted A6And outputting the image;
step two, decryption
The first step is as follows: image blocking and central image extraction
Will P6Is divided into blocks with the size of256 pixel blocks; denoted Q (0, 0), Q (0, 1) … … Q (15, 15);
the gray image pixel block matrix is represented as
The second step is that: central image generalized cat mapping pixel scrambling decryption
Step 1: acquiring decryption keys a, b and k which are completely the same as the encryption parameters;
step 2: performing inverse pixel value transform by using inverse transform formula
In a matrix C-1And the positive integer k is an algorithm parameter, and the image P 'is processed by a formula'5Scrambling the pixel point position; from bottom to top, fromRight to left order for center image P'5Of each pixel A'5(i, j) is operated, and the initial value (p 'of (i, j) is set'0,q′0) Performing k iterations as an initial value of the generalized cat mapping to obtain a new position (p ') of the pixel point (i, j)'k,q′k) (ii) a Performing the above operation on each pixel point of the central image to obtain a decrypted image, and recording the decrypted image as P'4;
The third step: central image column decryption
Step 1: obtaining decryption keys mu and X0The encryption parameter is completely the same as the encryption parameter and has the clock synchronization characteristic;
step 2: chaos value X generated by iteration using formula 21、X2…X3M/4Judgment of X3M/4The range R, if X3M/4∈RhThen will beThe pixel point of the row is replaced with the pixel point of the ith row; throughIn the second iteration, the operation is carried out on each row of pixel points from right to left, and the center image P 'is completed'4Performing column scrambling and decryption; recording the decrypted image as P'3The size of the image isImage pixel matrix is represented as A'3;
The fourth step: image line decryption
Chaos value X generated by iteration using formula 21、X2…XMJudgment of XMThe range R, if XM∈RhReplacing the pixel point of the Mth row with the pixel point of the ith row; after M iterations, the operations are carried out on each line of pixel points from bottom to top, and the image P 'is completed'3Line scrambling and decrypting; recording the decrypted image as P'3,P′3A size ofImage pixel matrix is represented as A'2;
Thereby completing the decryption process of the image, outputting the decrypted image P'2。
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110716616.9A CN113904765B (en) | 2021-06-25 | 2021-06-25 | Chaotic sequence-based airborne television guidance transmission image encryption method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110716616.9A CN113904765B (en) | 2021-06-25 | 2021-06-25 | Chaotic sequence-based airborne television guidance transmission image encryption method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113904765A true CN113904765A (en) | 2022-01-07 |
CN113904765B CN113904765B (en) | 2023-05-26 |
Family
ID=79187518
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110716616.9A Active CN113904765B (en) | 2021-06-25 | 2021-06-25 | Chaotic sequence-based airborne television guidance transmission image encryption method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113904765B (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040202326A1 (en) * | 2003-04-10 | 2004-10-14 | Guanrong Chen | System and methods for real-time encryption of digital images based on 2D and 3D multi-parametric chaotic maps |
US20110311042A1 (en) * | 2008-10-23 | 2011-12-22 | University Of Ulster | Encryption method |
CN106791266A (en) * | 2016-12-08 | 2017-05-31 | 西南大学 | A kind of method and its system of the color image encryption transmission based on optical chaos |
CN107094072A (en) * | 2017-03-28 | 2017-08-25 | 广东工业大学 | A kind of mixed chaos encryption method based on general Henon Map |
CN108898025A (en) * | 2018-06-25 | 2018-11-27 | 河南大学 | New chaotic image encryption method based on dual scramble and DNA encoding |
CN110046513A (en) * | 2019-04-11 | 2019-07-23 | 长安大学 | Plaintext associated images encryption method based on Hopfield chaotic neural network |
-
2021
- 2021-06-25 CN CN202110716616.9A patent/CN113904765B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040202326A1 (en) * | 2003-04-10 | 2004-10-14 | Guanrong Chen | System and methods for real-time encryption of digital images based on 2D and 3D multi-parametric chaotic maps |
US20110311042A1 (en) * | 2008-10-23 | 2011-12-22 | University Of Ulster | Encryption method |
CN106791266A (en) * | 2016-12-08 | 2017-05-31 | 西南大学 | A kind of method and its system of the color image encryption transmission based on optical chaos |
CN107094072A (en) * | 2017-03-28 | 2017-08-25 | 广东工业大学 | A kind of mixed chaos encryption method based on general Henon Map |
CN108898025A (en) * | 2018-06-25 | 2018-11-27 | 河南大学 | New chaotic image encryption method based on dual scramble and DNA encoding |
CN110046513A (en) * | 2019-04-11 | 2019-07-23 | 长安大学 | Plaintext associated images encryption method based on Hopfield chaotic neural network |
Also Published As
Publication number | Publication date |
---|---|
CN113904765B (en) | 2023-05-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Man et al. | Double image encryption algorithm based on neural network and chaos | |
CN111105339B (en) | Image encryption method based on multidimensional chaotic system and Joseph scrambling | |
CN107492064B (en) | Image encryption method based on memristor chaos system, elementary cellular automata and compressed sensing | |
US20220109566A1 (en) | Encryption And Decryption Method And Device Based On Random Hash And Bit Operation | |
CN103491279B (en) | The 4-neighborhood XOR image encryption method of Hyperchaotic Lorenz system | |
CN103442157A (en) | Image encryption method based on Arnold transformations and Henon chaotic system | |
CN106228504B (en) | Digital image encryption method based on plaintext and key structure encryption parameter | |
Ma et al. | A fast hyperchaotic image encryption scheme | |
Telem et al. | A simple and robust gray image encryption scheme using chaotic logistic map and artificial neural network | |
Huang et al. | The design and its application in secure communication and image encryption of a new Lorenz-like system with varying parameter | |
CN115580687B (en) | Multi-image encryption method based on variable parameter hyperchaotic system and S-shaped diffusion | |
CN107590394A (en) | A kind of image encryption method based on chaotic maps and bit recombination | |
CN103440613A (en) | Color-image encryption method for hyperchaotic Rossler system | |
Khan et al. | A new technique for designing 8× 8 substitution box for image encryption applications | |
Wu et al. | Security analysis and improvement on an image encryption algorithm using Chebyshev generator | |
Hashim et al. | Based complex key cryptography: new secure image transmission method utilizing confusion and diffusion | |
Praveen et al. | A Novel Dual Confusion and Diffusion Approach for Grey Image Encryption using Multiple Chaotic Maps | |
CN113904765A (en) | Airborne television guidance transmission image encryption method based on chaotic sequence | |
Jiang et al. | An image encryption scheme based on Lorenz chaos system | |
CN105005961B (en) | Suitable for the information disguising and restoring method of TIN digital elevation model | |
Ahmad et al. | Digital image encryption based on chaotic map for secure transmission | |
CN103079064A (en) | Chaos sequence image encryption algorithm based on current-mode logic (CML) | |
CN114978466A (en) | Fractal-like model and Hilbert synchronous scrambling diffusion encryption method | |
Ye et al. | An image encryption scheme based on chaotic systems with changeable parameters | |
CN108365946B (en) | Energy internet communication safety system and method based on chaotic system array |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |